Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe
Resource
win10v2004-20241007-en
General
-
Target
45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe
-
Size
1.8MB
-
MD5
2d19492cf956ebf1ce662e5912b07367
-
SHA1
dea9da4251fefcf2d49759177f89675fb4ed32b9
-
SHA256
45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452
-
SHA512
ae1649fff4f87322a54c6394e1ebd0439201648bc88fd5f9984bd0e88ef690c16c5957f18afd4b290a435f8778cd9f96328c2ab570b5dfd5c834fcae25c0b749
-
SSDEEP
49152:fjR6USUBfqc1I3Dk711hKTu75O5AEF+qJtXcmoR:fj9/yI71TKTaQaEYmX
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
lumma
https://drawwyobstacw.sbs
https://condifendteu.sbs
https://ehticsprocw.sbs
https://vennurviot.sbs
https://resinedyw.sbs
https://enlargkiw.sbs
https://allocatinow.sbs
https://mathcucom.sbs
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
4.41
1176f2
http://185.215.113.19
-
install_dir
417fd29867
-
install_file
ednfoki.exe
-
strings_key
183201dc3defc4394182b4bff63c4065
-
url_paths
/CoreOPT/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ff06f8f9e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ff06f8f9e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ff06f8f9e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ff06f8f9e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ff06f8f9e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ff06f8f9e7.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2276-254-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc74e404e3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9305d339ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b8b64e31e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6303ec316f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff06f8f9e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc74e404e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff06f8f9e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6303ec316f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b8b64e31e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff06f8f9e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b8b64e31e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6303ec316f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc74e404e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9305d339ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9305d339ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation processclass.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation app.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Hkbsse.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 6303ec316f.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Nework.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sqdqsd.vbs app.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Office Manager.url splwow64.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Office Manager.url context.exe -
Executes dropped EXE 26 IoCs
pid Process 2968 axplong.exe 804 gold.exe 3208 legas.exe 4628 iLFrehSxNU.exe 5116 zBmqxA13oB.exe 3596 stealc_default2.exe 216 2b8b64e31e.exe 4084 6303ec316f.exe 4396 skotes.exe 2712 MK.exe 4120 Nework.exe 552 Hkbsse.exe 912 processclass.exe 3316 splwow64.exe 3156 num.exe 3980 fc74e404e3.exe 3416 9305d339ae.exe 3944 ff06f8f9e7.exe 4532 context.exe 5108 Hkbsse.exe 4600 axplong.exe 2084 skotes.exe 3100 app.exe 5980 JavUmar.exe 6296 skotes.exe 6300 axplong.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2b8b64e31e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine fc74e404e3.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 9305d339ae.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine ff06f8f9e7.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 6303ec316f.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 3596 stealc_default2.exe 3596 stealc_default2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ff06f8f9e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ff06f8f9e7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2b8b64e31e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000354001\\2b8b64e31e.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6303ec316f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000355001\\6303ec316f.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\num.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000336001\\num.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc74e404e3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000349001\\fc74e404e3.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 740 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe 2968 axplong.exe 216 2b8b64e31e.exe 4084 6303ec316f.exe 4396 skotes.exe 3980 fc74e404e3.exe 3416 9305d339ae.exe 3944 ff06f8f9e7.exe 2084 skotes.exe 4600 axplong.exe 6296 skotes.exe 6300 axplong.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 804 set thread context of 4608 804 gold.exe 88 PID 3208 set thread context of 1980 3208 legas.exe 94 PID 2712 set thread context of 2276 2712 MK.exe 113 PID 3316 set thread context of 3508 3316 splwow64.exe 145 PID 3100 set thread context of 3704 3100 app.exe 162 PID 4532 set thread context of 6364 4532 context.exe 165 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe File created C:\Windows\Tasks\skotes.job 6303ec316f.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe -
pid Process 4752 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2424 804 WerFault.exe 87 3224 3208 WerFault.exe 93 4372 4608 WerFault.exe 88 2072 3980 WerFault.exe 121 4448 3980 WerFault.exe 121 3192 3980 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language num.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9305d339ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language legas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6303ec316f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavUmar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b8b64e31e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff06f8f9e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc74e404e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language context.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5412 timeout.exe 6668 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 5400 taskkill.exe 6580 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 740 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe 740 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe 2968 axplong.exe 2968 axplong.exe 3596 stealc_default2.exe 3596 stealc_default2.exe 216 2b8b64e31e.exe 216 2b8b64e31e.exe 5116 zBmqxA13oB.exe 4628 iLFrehSxNU.exe 4084 6303ec316f.exe 4084 6303ec316f.exe 4396 skotes.exe 4396 skotes.exe 3596 stealc_default2.exe 3596 stealc_default2.exe 3980 fc74e404e3.exe 3980 fc74e404e3.exe 2276 RegAsm.exe 2276 RegAsm.exe 2276 RegAsm.exe 3416 9305d339ae.exe 3416 9305d339ae.exe 3944 ff06f8f9e7.exe 3944 ff06f8f9e7.exe 2084 skotes.exe 2084 skotes.exe 4600 axplong.exe 4600 axplong.exe 3944 ff06f8f9e7.exe 3944 ff06f8f9e7.exe 3944 ff06f8f9e7.exe 4752 powershell.exe 4752 powershell.exe 4752 powershell.exe 5440 powershell.exe 5440 powershell.exe 5440 powershell.exe 3100 app.exe 3100 app.exe 3100 app.exe 4532 context.exe 4532 context.exe 6296 skotes.exe 6296 skotes.exe 6300 axplong.exe 6300 axplong.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeBackupPrivilege 4628 iLFrehSxNU.exe Token: SeSecurityPrivilege 4628 iLFrehSxNU.exe Token: SeSecurityPrivilege 4628 iLFrehSxNU.exe Token: SeSecurityPrivilege 4628 iLFrehSxNU.exe Token: SeSecurityPrivilege 4628 iLFrehSxNU.exe Token: SeBackupPrivilege 5116 zBmqxA13oB.exe Token: SeSecurityPrivilege 5116 zBmqxA13oB.exe Token: SeSecurityPrivilege 5116 zBmqxA13oB.exe Token: SeSecurityPrivilege 5116 zBmqxA13oB.exe Token: SeSecurityPrivilege 5116 zBmqxA13oB.exe Token: SeDebugPrivilege 4628 iLFrehSxNU.exe Token: SeDebugPrivilege 5116 zBmqxA13oB.exe Token: SeDebugPrivilege 2276 RegAsm.exe Token: SeDebugPrivilege 912 processclass.exe Token: SeDebugPrivilege 3944 ff06f8f9e7.exe Token: SeDebugPrivilege 3316 splwow64.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeDebugPrivilege 3100 app.exe Token: SeDebugPrivilege 5032 firefox.exe Token: SeDebugPrivilege 5032 firefox.exe Token: SeDebugPrivilege 5400 taskkill.exe Token: SeDebugPrivilege 5440 powershell.exe Token: SeDebugPrivilege 3100 app.exe Token: SeDebugPrivilege 3704 AppLaunch.exe Token: SeDebugPrivilege 4532 context.exe Token: SeDebugPrivilege 6580 taskkill.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe 5032 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5032 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 2968 740 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe 86 PID 740 wrote to memory of 2968 740 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe 86 PID 740 wrote to memory of 2968 740 45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe 86 PID 2968 wrote to memory of 804 2968 axplong.exe 87 PID 2968 wrote to memory of 804 2968 axplong.exe 87 PID 2968 wrote to memory of 804 2968 axplong.exe 87 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 804 wrote to memory of 4608 804 gold.exe 88 PID 2968 wrote to memory of 3208 2968 axplong.exe 93 PID 2968 wrote to memory of 3208 2968 axplong.exe 93 PID 2968 wrote to memory of 3208 2968 axplong.exe 93 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 3208 wrote to memory of 1980 3208 legas.exe 94 PID 1980 wrote to memory of 4628 1980 MSBuild.exe 97 PID 1980 wrote to memory of 4628 1980 MSBuild.exe 97 PID 1980 wrote to memory of 5116 1980 MSBuild.exe 98 PID 1980 wrote to memory of 5116 1980 MSBuild.exe 98 PID 2968 wrote to memory of 3596 2968 axplong.exe 100 PID 2968 wrote to memory of 3596 2968 axplong.exe 100 PID 2968 wrote to memory of 3596 2968 axplong.exe 100 PID 2968 wrote to memory of 216 2968 axplong.exe 104 PID 2968 wrote to memory of 216 2968 axplong.exe 104 PID 2968 wrote to memory of 216 2968 axplong.exe 104 PID 2968 wrote to memory of 4084 2968 axplong.exe 108 PID 2968 wrote to memory of 4084 2968 axplong.exe 108 PID 2968 wrote to memory of 4084 2968 axplong.exe 108 PID 4084 wrote to memory of 4396 4084 6303ec316f.exe 110 PID 4084 wrote to memory of 4396 4084 6303ec316f.exe 110 PID 4084 wrote to memory of 4396 4084 6303ec316f.exe 110 PID 2968 wrote to memory of 2712 2968 axplong.exe 111 PID 2968 wrote to memory of 2712 2968 axplong.exe 111 PID 2968 wrote to memory of 2712 2968 axplong.exe 111 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2712 wrote to memory of 2276 2712 MK.exe 113 PID 2968 wrote to memory of 4120 2968 axplong.exe 114 PID 2968 wrote to memory of 4120 2968 axplong.exe 114 PID 2968 wrote to memory of 4120 2968 axplong.exe 114 PID 4120 wrote to memory of 552 4120 Nework.exe 115 PID 4120 wrote to memory of 552 4120 Nework.exe 115 PID 4120 wrote to memory of 552 4120 Nework.exe 115 PID 2968 wrote to memory of 912 2968 axplong.exe 117 PID 2968 wrote to memory of 912 2968 axplong.exe 117 PID 2968 wrote to memory of 3316 2968 axplong.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe"C:\Users\Admin\AppData\Local\Temp\45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 12525⤵
- Program crash
PID:4372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 2884⤵
- Program crash
PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\iLFrehSxNU.exe"C:\Users\Admin\AppData\Roaming\iLFrehSxNU.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Users\Admin\AppData\Roaming\zBmqxA13oB.exe"C:\Users\Admin\AppData\Roaming\zBmqxA13oB.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 2644⤵
- Program crash
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\1000354001\2b8b64e31e.exe"C:\Users\Admin\AppData\Local\Temp\1000354001\2b8b64e31e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\1000355001\6303ec316f.exe"C:\Users\Admin\AppData\Local\Temp\1000355001\6303ec316f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\1000349001\fc74e404e3.exe"C:\Users\Admin\AppData\Local\Temp\1000349001\fc74e404e3.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 15126⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 14926⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 10406⤵
- Program crash
PID:3192
-
-
-
C:\Users\Admin\1000350002\9305d339ae.exe"C:\Users\Admin\1000350002\9305d339ae.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\1000357001\ff06f8f9e7.exe"C:\Users\Admin\AppData\Local\Temp\1000357001\ff06f8f9e7.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000360041\do.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵PID:3148
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aaaca048-8e37-40fb-ace4-dc1ff0024742} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" gpu8⤵PID:1092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea6c4f47-25ff-4ac1-b45b-9358ef94a2e1} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" socket8⤵PID:900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3348 -childID 1 -isForBrowser -prefsHandle 3340 -prefMapHandle 3336 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf3eb73e-83c6-4c9c-acdf-03599fc35322} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab8⤵PID:5948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 2 -isForBrowser -prefsHandle 2616 -prefMapHandle 3256 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1107231a-87f6-4728-b15f-ae809aff2500} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab8⤵PID:3212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4212 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4168 -prefMapHandle 4204 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b195ed15-f03b-4c5b-a047-92665075f233} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" utility8⤵
- Checks processor information in registry
PID:5880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5076 -childID 3 -isForBrowser -prefsHandle 5072 -prefMapHandle 4968 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cd3d772-5bfc-49fe-8593-2d76976354c6} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab8⤵PID:7020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5236 -childID 4 -isForBrowser -prefsHandle 5312 -prefMapHandle 5308 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71c0024b-a54a-48c7-92e2-a8ba6aa713df} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab8⤵PID:7032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 5 -isForBrowser -prefsHandle 5412 -prefMapHandle 5416 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80456bec-452c-47ef-b6bb-b20799237d22} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab8⤵PID:7044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵PID:3652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe"C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe"C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start context.exe4⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\context.execontext.exe5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"6⤵PID:6352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"6⤵
- System Location Discovery: System Language Discovery
PID:6364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "InstallUtil.exe" && timeout 1 && del InstallUtil.exe && Exit"7⤵
- System Location Discovery: System Language Discovery
PID:6540 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "InstallUtil.exe"8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 18⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6668
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "InstallUtil.exe" && timeout 1 && del InstallUtil.exe && Exit"5⤵
- System Location Discovery: System Language Discovery
PID:6716 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "InstallUtil.exe"6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5400
-
-
C:\Windows\SysWOW64\timeout.exetimeout 16⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000424001\app.exe"C:\Users\Admin\AppData\Local\Temp\1000424001\app.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 804 -ip 8041⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3208 -ip 32081⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4608 -ip 46081⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3980 -ip 39801⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3980 -ip 39801⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3980 -ip 39801⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1000086001\JavUmar.exe"C:\Users\Admin\AppData\Local\Temp\1000086001\JavUmar.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6300
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
16KB
MD5741d5aecdeddcb8e3fd36d08d663b9ee
SHA1fe6c78df084b2d99b5d1600738d2cf6e26927477
SHA2564d3aa792a9dea97412e05d1dd21da6ca2af5505cd8cd115fb3cef199efd146fb
SHA512e452dc08f7806c3967c9a5238a5e2146479374bb0509b50c2b2f3974007a7df3fafc18aeeb15974a3b20a8cdfd24278d4f27e7a62cf49b0da28c270864ad2b1e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD57ad8a99d6c71985f87951dfb2ef8bba4
SHA184864b9747e5db912d58d56b1f0631bfe828ea41
SHA2566dcaf2cd8e4db898bf6329169854a8ec1fe379c2488a5f5523b7ee7b9b172689
SHA512df7e3cf99ee7118c23b29760b91d705123384e86ec2a53ecc07d08a520aa937cd82f7ee20eb3ff137d9c15e3857942d51d464d7687327e263d2ba373ff04c18d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\0305BF7FE660AF5F32B4319E4C7EF7A7B70257A3
Filesize13KB
MD5ec588975d51a74c00a61e70ebfe90d3f
SHA14cfc253bf923bfa6e08bab0686243dcf002cf499
SHA256852331b5ab6ff47bd14b8924ae01c35ef3118db14c3f3ab470eee99b83c66c08
SHA512e102076d232e1d9951dc8a08f64b59b78cf8f16d4eaba56fa2a793072c40e59163f8798c84d2c21f9cce4320563c8419de6af6203f2f07419f228b1ca1470538
-
Filesize
566KB
MD5049b6fe48a8cfb927648ad626aba5551
SHA19555d23104167e4fad5a178b4352831ce620b374
SHA256b78402483c46cd37e2c204d95690aa2a213616a1f904d779ceec0e22fcdd6531
SHA512ed787f90966ca1ea4b1e67c4026dd44393c7d312cd52e376f4ba5e5c49616938ec9e913044def29b40b441eb4c913a5134bb78317a179f62067bef3f9d913c7e
-
Filesize
1.4MB
MD5e6d27b60afe69ac02b1eaec864c882ae
SHA1a72b881867b7eaa9187398bd0e9e144af02ffff4
SHA256aac36ff20ea7bfc0591c1d6b145b456bad394ee8e619343ec10d1809188edd75
SHA5124f11fc2b36589fc9ff7dc5afd27cb91614f6a89bfd60942baebef025f53cb56ed7413abeff57fc7c85b3a2a4b0feec2649d5c5a856d3e2e9c13f6a0d8c777764
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
7.2MB
MD53195fa517818ae805403fc975213e9b4
SHA143f5dbcd65c3e8fcbf106f4acd95ee26acd5c5ac
SHA256d8689dcc36f611d77d6f6d1eb1ed8b872104a38568740936209114835a441048
SHA5128c6036e280f7d201563ad0d7cf6050d581641741ce2a9a1380ceddae6791ea8ec73b49e6f3ba2ecca912dc8bdace75d43874d3e59699d22a46108c727650f17d
-
Filesize
307KB
MD5791fcee57312d4a20cc86ae1cea8dfc4
SHA104a88c60ae1539a63411fe4765e9b931e8d2d992
SHA25627e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d
SHA5122771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c
-
Filesize
1.8MB
MD5d19345cd180657fc5e0f539927f4706b
SHA16ac5758e35620fdfef31f4bc80eba03fff331788
SHA2560ca0ec137646d7269694093511a02f57650d7c35b40d6a403a935582931a546d
SHA5129304640806230190f286d06429b425b572dc7b81b715e0e0001d209a3ca529185e7c6e52e0948e5d56f749854a81b70e9cb80d86ce31246b284aa7520e061cef
-
Filesize
1.8MB
MD55dfa05b60c45476fdd8f39b1e93fc8a1
SHA106a4d1a3410b1e6909e22025aab5de356469d950
SHA2561507aa5ff5c2a39351daed1d71ea68d1f069f3f6c4cacd11fffc27173cb6f495
SHA51205755a8d7c23a5f160c0cc3a7f43303638e7b83542808257de88539e56955678a234d738f7f9b291ef8d4c0929cc9228e9f495840c7b89855c115c06a250b0d8
-
Filesize
1.8MB
MD59d56af6516a7e9070041d692733b7a2d
SHA164e80f2c78f94c696b0dfd74a9b9904a785bb7be
SHA256699ecf232e1e83f0518f035771c993bdf4a2937753e7f939b9bc7cda7b928a63
SHA5125bb0853dc3e95613158f2147c8fc74e9ba3df5ae9b5809ac250eba5325f812b06784b216130a60ed560f1a7dd21abee24dc465ad671485fd9bcc467681ffd4bf
-
Filesize
1.6MB
MD59f875cd80ee26b55a71c2f795eb01c33
SHA1e71f7e13477c83c59c50cb975c3d893dae12d2ff
SHA256a599f8e501bc4a1a7f1ed10b05b5b6fe4c6f13c40c1065af952740880123bfb9
SHA512811ab159ef2868b6458f53784e639020eff3411f5063d76497d91a519ed78976e139d9deb726aef6acf2c6cc06838abf302875905dc9d4c1ef4f5e8802602394
-
Filesize
2KB
MD565d1b33f6758ea511e3ed01f2cb74e53
SHA1efa0e4d34c0d9bc719ef98ed5e145d8e50164916
SHA256233dc91536e57adbb2153512f56f098db701e43a7768508c9e9f290c952f1319
SHA5122772e2659aa2ffb6f86b1198d2a1652d7cb7a07ccfb249a96f7cb649594ba5ab1cc44389d505c9aca9f6ad9afda59d2abc565db5ae89b77f675155afe069103d
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
6KB
MD5c042782226565f89ce3954489075e516
SHA1256dd5ba42837a33c7aa6cb71cef33d5617117ee
SHA256a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6
SHA5129f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd
-
Filesize
1.1MB
MD5ed9393d5765529c845c623e35c1b1a34
SHA1d3eca07f5ce0df847070d2d7fe5253067f624285
SHA25653cd2428c9883acca7182781f22df82c38f8cc115dc014b68e32f8b1cdbf246a
SHA512565f66ef604b10d5be70920d9813e58f5bde174d6a6d30eb8654f467775da8a665c555b7e4127fc22f8a5a5b54466137bde228fd932335517dd017d0ea51f3f8
-
Filesize
20.4MB
MD57172ee8de6490094d4a5112eceaaaa90
SHA146a82d7628f31d91fb883056dfbd4d15d26bbd77
SHA25611cabbb368deb30bc1f45feb6509b222c2b360707ff31c8b1e056c617477f28e
SHA51291e2da0921f8d2596ac2e99e91b108e4d7dba6a97800c775bc9d9b4411fae3b7f0d811f48b107054664aff69c7cdd2c052220960cec9c525470f7266de5780d8
-
Filesize
83KB
MD5a60c51269a8ef5af12ab94790887fcc6
SHA1dc0580b8c6712a35b1680a3a22c796c5ece6d5f0
SHA25630579a593384988575d1721558287951666fd06005960bbdc893fd26cc960c39
SHA512495e76e014ce4218a997503559c0fd80f9269ee21d9a904e73791ebafc0b715a6d07f269456e8ad41eca6db0ec94ce72691616dbaca09130a31a1579faad94ec
-
Filesize
1.8MB
MD52d19492cf956ebf1ce662e5912b07367
SHA1dea9da4251fefcf2d49759177f89675fb4ed32b9
SHA25645fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452
SHA512ae1649fff4f87322a54c6394e1ebd0439201648bc88fd5f9984bd0e88ef690c16c5957f18afd4b290a435f8778cd9f96328c2ab570b5dfd5c834fcae25c0b749
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
70B
MD51c5c0d2105718982915d88e1e34b7c24
SHA1ecb11df5274a3a37c81fc19b95ec316d39bb6f03
SHA256b5fd05a1a23d90dee32a1f61158a1e0859fde6882b289267c90845bb995b0c09
SHA5129e1f86ca561c034078acbce22e6b3b2dc938a883f4897167c96ad7c61f28d30075d66557335825c18a00f96467fbd1dee067bb756388ba60b21443ba964ba331
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize8KB
MD5e844e2319d55dd3e717e7a4d3694efcb
SHA1d243056e872e19c45fd11df6c18bec799ad847ab
SHA256103720874ea030d6924e9ebf9dbb2f481a2c2bdcb299c317c16ed99546acd3b8
SHA512b5e2a71d4bedf4402fe4fee0ec2bc923665b6bbf98eaea3768fac7841dc72c4bc136aabbcacdf463d6c6e2160503aa7a86b949d6c57734f2cfd60b89ec16ef90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize13KB
MD530127f0d1df91cc5b0eb8cfeaafd2a4c
SHA1a1901d07c03ce0d5b261edaf0cd90f6bf5dce12a
SHA2561ec63b3ddf5147c582bcc77ac40bb177f2693750db3c0cd284116ce91e0a1bfb
SHA512b53b00f6bd3f52b09e59cadba04848891fca70d040d648f784937b801b0ccc37093af85ba3201ffa7eb5c3032b0ddcb5ec9f2f3afe22a74145c21a1d3db2770b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5fe11d30784579ad113b525f6d494f831
SHA1ef97ce93e080baa77e33bb2312f32f48f0b3dc31
SHA25667718d67a5dc4f4ff90533835fa0f93ffc19379ff08f6564df5cccf37b0c9503
SHA51213ddbe826aa7fc96bf086fe64b77aaabcd2f2c0503f683410d783eec9e12f5663beb7ad8b7a91ba1742292c9f3c5315ac36f87c689306b8eaf76a2055fcb17bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d824dbb73be44830e49846aafc304c5f
SHA18cd2d224085b4981750b01552ca0ff8d6f3ce012
SHA25609675a5e2b6ed0347dabcd810aedd177bb0a1f3c8f95b30b1b1e0a0c8b9f73ba
SHA512f621148752824e14aea082d5e1911e6386e869805a2b0e82c6e2c4de5d482b686666e06c22c86ccc66030b64e975818517d6c0d07221d71341fc0b2386c16103
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f3703d46cc7d56be59a7dada5dfb6066
SHA13f51137a949a3b7dcb1b83b2abe4d3c95687742d
SHA256ae8c5a59e62bcd828589ed76c3280bb0a0806cab7fd749be4f16b027fe809321
SHA512d10d21f6207d1020dea9ca2c3db80f6e27edea1b2542ae886887d26ca23e7d23ef7f83a940e1884e4fd1bc5976cedc578f7cb814ffd514affdf7e2537d32eb12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f2317155eda080198129b8688d80d9c1
SHA1adeffa276db981efb55b8340528a45bca4411980
SHA25693ea7a8924964bd6b14db57a84201a419ef1f4c75c4c622bba7f22555b2fc78d
SHA512645ea2c0ebeeb78c1ba994df265f65fd45d7acfa74a768e20ef405c456b0a32a1c37e72fa4b4ff0374bd876d90a458a15959703fccf55ecab44db72326badceb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD58fe2b7559bcb324d2db6278664ba9fbc
SHA13014c7317b6ba2a6f6e45c8b5468011afac67485
SHA256c3e7ff4ab504e099d1cf7e743081962db7469b4e86dce6c4ae07fe938726b2b1
SHA512363deaeb094816857fe3d48493b0e9ac50ed131abbe10ee1b3c468544a05c3c3bdea4f506a3d4562b34f69fa5a5199f7291831e38a532346b482a009f346edf0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1385d8a2-6434-424c-bc34-459622d1c20e
Filesize28KB
MD57782dcec599593cd30a23338d2f4970a
SHA146aa8ebc5616ad22222ccfe608758da5c6502ca4
SHA2564e948dde67ec03a3147e9ba16e2cfe5e3dd5e7e6c58c1d43baa8983301573baa
SHA512393609804bbe159600ba59046cee4dc0ec6b4e956bdce5e00d81d2ce94d3bb6b654b5f5a0171626afd420f54167c5a021247f76c254bc7e983ad71c019620eab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\3e30f049-2add-4275-bdfd-f591bfb34514
Filesize671B
MD5193ef28a4dcf786e984b2f1bb767bb71
SHA109140aef0ae7875753163e32ea21de9d5bead2e3
SHA25650915c5e311badc355dfa080045403b9d606c155eec09bd36ddcf107a8f302e7
SHA512f3d7f5b726cc10b35c936c54794444d61ab7cf268c87ee29137b02f5d2fa5e140c5f92dc74e68b566d07ea5dcf47f76055940a809d38d0651f317680dd217b0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\5743b9a7-3c21-428a-b3e0-e72bee56b953
Filesize982B
MD52dd02f30c5b02622327d396a9eadbec7
SHA1282f59caa6e75ddbcd33106cf4a02918ae86531c
SHA25640f12839903d3c5f3db106910000d4c05603bdd7464a31d995d7e2bfac1a98e8
SHA51258dad75ab634be3b5c66393224d078cb85e3b9a8db3396e35ad45b9c302c482e5b9ed0c42c38c90e8801931c2c8eefbc4feb45d0d99a578f6df75ac26656d532
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5c24417f86f52b44c62d96daa4c6e06bc
SHA1dbc293125aa7d62660f0ce4ff3bba374f918f36a
SHA2568172b4a27d9d95fa29fc9d926cb2aac1b486ff21a4edd093daaa937e4e6f1908
SHA512b8037af3b921a49d722b9537012e493688d8b536b2ced59e93303961af9e4a05791cd93d342db83486563c4461def94c64c251918a40e1cf88d81d5916e212e8
-
Filesize
10KB
MD55bee7e1e421f45751d20c30a7b2ff840
SHA1d94ff0460a7f3e0fc818bfd0d90428fe5269fa35
SHA256e3db0989a52e97e74ac230be0e9ebc078c6677d57119f8d11f353b98f7927033
SHA512cd344d2aa429a996e5f789698749b306c04b3ccfb82e53cadc85a99f729ec5bc6693f114d662c53dc94a4b9cdebda983aa1b7a7c3edf299626612f9bfc635fc5
-
Filesize
15KB
MD5dc78b2411a8250875a08e76ae7006d88
SHA1bc3188acead6dea79e744ed5b8ff04e4be541c06
SHA256445bfbccedfea1429ebedffcdd957f4abff9398fa964c3f05f8240df609d9f36
SHA5124bf4486cab56909ea6b18a9c6693ad81b0c368f9561a000c659083a8d9a62bc6da6c8b356ec81deacf6cf8a707089a838d9014b0c17fd8bcff4d299a0db314e7
-
Filesize
10KB
MD5cb625cba421d6277f5f109d0692f0f26
SHA14e765c8f80dc273c2c189842ca1b6317eb3de225
SHA256288d4ac1bac9eacf28d22255520d5269374b31e257fda093e2e5d8cb34690282
SHA512c802e58a2049b0e01ced6ad7b1932823e685861eee1bddae2486a807030d3534bbc3204522f12c115c6e70c06d00e9a8e0b3f2bedd93a165852a867a7ca9e0fb
-
Filesize
10KB
MD528b7a9c7b8e0eff01275158f10362e34
SHA1688a4f6e7d5fffc19f553ccfa121d4c49f61df2a
SHA256504117085fb58885e82bcd8e632b1e4f41bd22cd521e379a95291a83c24fd267
SHA51214a700501dcf7c82429facecc1b117be66e5acaff338cd0b02ea4ccda14a1609468a3cdca00242d70fb9d4183d4bbb37b9bba7dab76bc4b69cdc9f1203a3edeb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.3MB
MD58f06f969b5797f4747661289508a8147
SHA1a525cfcf8836ddd7376f6763cb7c50fb937f1dda
SHA2563dc8edb33acc3b1e45fe9d7f59618c3f7fa66613873b858eb1c2622cc0b74090
SHA512380d7e1ad1f69a79d850945ee304089151b32b83123b4637e9d2008b56340a9637b1b2264745fa87bfd38d552533523d65c3774e688e98e5aa75b3e58dd6b81c
-
Filesize
602KB
MD5e4fc58d334930a9d6572c344e5129f6b
SHA1d38fbd0c4c86eee14722f40cc607e2128c01b00f
SHA256973a9056040af402d6f92f436a287ea164fae09c263f80aba0b8d5366ed9957a
SHA512a69f5da8de8c9782769cca2e2fc5b28bbeba0c0d0027954dbe47b15610d82277abbe912f0e5921a18000f1a3a3c54eb5922f70c773537a22f4b35ff926d17a59
-
Filesize
393KB
MD57d7366ab79d6d3d8d83d13a8b30de999
SHA175c6c49a6701d254c3ce184054a4a01329c1a6f3
SHA2563d66fed04c76d055c6149b33dcfda544b509c57087c57a861e1d6256b59f8465
SHA51264f4551b3be1c21ce7c2d49608463e5aec4166e3e6893883c33a5b7d1109ef0fc8ab6bd15c70d9d606e2706f12a937c2d90d5bc8f6c629ad6f30f212dc25f022