Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/10/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe
Resource
win7-20240903-en
General
-
Target
1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe
-
Size
1.8MB
-
MD5
2bb95070d042293ee003a71c9f37aec3
-
SHA1
b14e8139a5fdd06647633ea0ef1808cdda18c4aa
-
SHA256
1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a
-
SHA512
5d60bd6e94ad6e38701bdc13853b6f3a50f3f02927119658723478fe4ece4c862d4c45f18585bc88636993ff0d500921d6d297ea7744165e1b32d5757c620455
-
SSDEEP
49152:r0kr1xYlUv0VBmrycByGFuJZGhx17xwHRrt1HHNja8+ne+:r3rIE0Vc5VuJZqvwxrt1HHwK
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
stealc
puma
http://185.215.113.206
-
url_path
/e2b1563c6670f193.php
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29155
Extracted
lumma
https://crisiwarny.store/api
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 608768a190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 608768a190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 608768a190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 608768a190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 608768a190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 608768a190.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3736-1648-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4152 created 1192 4152 Jurisdiction.pif 21 PID 4152 created 1192 4152 Jurisdiction.pif 21 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9fb4de9c62.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 608768a190.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d3c19d0280.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 77ea41b2d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ee5fe4a64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gold.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e97c150d7c.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4216 chrome.exe 2548 chrome.exe 4756 chrome.exe 3916 chrome.exe 3824 chrome.exe 3484 chrome.exe 3992 chrome.exe 4608 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ee5fe4a64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9fb4de9c62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gold.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d3c19d0280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 77ea41b2d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 77ea41b2d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 608768a190.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d3c19d0280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e97c150d7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9fb4de9c62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ee5fe4a64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 608768a190.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e97c150d7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gold.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url c18c78286f.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe -
Executes dropped EXE 25 IoCs
pid Process 2628 skotes.exe 2888 9fb4de9c62.exe 1576 axplong.exe 2032 zxcv.exe 1860 stealc_default2.exe 2488 608768a190.exe 1652 zxcv.exe 2548 bwr04ql4wU.exe 2840 Nu5hew6BoM.exe 2140 e97c150d7c.exe 1076 gold.exe 4220 d3c19d0280.exe 4520 d6a88dcd38.exe 4976 num.exe 2496 Offnewhere.exe 3636 myrdx.exe 4240 1.exe 1056 12.exe 2888 splwow64.exe 2220 12.exe 3676 service123.exe 1272 c18c78286f.exe 4152 Jurisdiction.pif 4588 77ea41b2d7.exe 1768 0ee5fe4a64.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine e97c150d7c.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine d3c19d0280.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 77ea41b2d7.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 9fb4de9c62.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 608768a190.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 0ee5fe4a64.exe -
Loads dropped DLL 58 IoCs
pid Process 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 2628 skotes.exe 2888 9fb4de9c62.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 2628 skotes.exe 2032 zxcv.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 1652 zxcv.exe 1652 zxcv.exe 2924 WerFault.exe 2628 skotes.exe 2628 skotes.exe 1576 axplong.exe 1860 stealc_default2.exe 1860 stealc_default2.exe 2628 skotes.exe 2628 skotes.exe 4416 WerFault.exe 4416 WerFault.exe 4416 WerFault.exe 4416 WerFault.exe 4416 WerFault.exe 2628 skotes.exe 2628 skotes.exe 2628 skotes.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 3908 WerFault.exe 3908 WerFault.exe 3908 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 1576 axplong.exe 2496 Offnewhere.exe 2496 Offnewhere.exe 3616 WerFault.exe 3616 WerFault.exe 1576 axplong.exe 3616 WerFault.exe 2644 cmd.exe 1576 axplong.exe 1576 axplong.exe 3676 service123.exe 1576 axplong.exe 1576 axplong.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0005000000019d98-278.dat themida behavioral1/memory/1076-297-0x00000000003C0000-0x0000000000CD8000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 608768a190.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 608768a190.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\e97c150d7c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001772001\\e97c150d7c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\d3c19d0280.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001773001\\d3c19d0280.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\d6a88dcd38.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001774001\\d6a88dcd38.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\num.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001775001\\num.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\77ea41b2d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000845001\\77ea41b2d7.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\0ee5fe4a64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000846001\\0ee5fe4a64.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\608768a190.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001735001\\608768a190.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gold.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001a4db-1425.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3252 tasklist.exe 3320 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 2628 skotes.exe 2888 9fb4de9c62.exe 1576 axplong.exe 2488 608768a190.exe 2140 e97c150d7c.exe 1076 gold.exe 4220 d3c19d0280.exe 4588 77ea41b2d7.exe 1768 0ee5fe4a64.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2032 set thread context of 1652 2032 zxcv.exe 38 PID 3636 set thread context of 3736 3636 myrdx.exe 72 PID 1272 set thread context of 3624 1272 c18c78286f.exe 114 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 9fb4de9c62.exe File opened for modification C:\Windows\LuggageRepresentations splwow64.exe File opened for modification C:\Windows\AdditionsSalvation splwow64.exe File opened for modification C:\Windows\SixCream splwow64.exe File opened for modification C:\Windows\HomelessLaser splwow64.exe File opened for modification C:\Windows\ActuallyFtp splwow64.exe File opened for modification C:\Windows\EauOfficial splwow64.exe File created C:\Windows\Tasks\skotes.job 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe -
Embeds OpenSSL 2 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x000500000001a4d2-1599.dat embeds_openssl behavioral1/files/0x000500000001c8c8-1766.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 2924 2032 WerFault.exe 34 4416 1076 WerFault.exe 45 3908 3636 WerFault.exe 71 3800 4976 WerFault.exe 61 3616 2496 WerFault.exe 69 -
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language num.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6a88dcd38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ee5fe4a64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e97c150d7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jurisdiction.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608768a190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language myrdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77ea41b2d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Offnewhere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c19d0280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fb4de9c62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 num.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString num.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Offnewhere.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Offnewhere.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4452 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 6 IoCs
pid Process 2684 taskkill.exe 4548 taskkill.exe 4624 taskkill.exe 4668 taskkill.exe 4712 taskkill.exe 4756 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 e97c150d7c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e97c150d7c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e97c150d7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0ee5fe4a64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0ee5fe4a64.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3772 schtasks.exe 4208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 2628 skotes.exe 2888 9fb4de9c62.exe 1576 axplong.exe 2488 608768a190.exe 2488 608768a190.exe 2488 608768a190.exe 2548 bwr04ql4wU.exe 1860 stealc_default2.exe 2840 Nu5hew6BoM.exe 2140 e97c150d7c.exe 1076 gold.exe 1860 stealc_default2.exe 4220 d3c19d0280.exe 1076 gold.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 3736 MSBuild.exe 4976 num.exe 4756 chrome.exe 4756 chrome.exe 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4588 77ea41b2d7.exe 1768 0ee5fe4a64.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeBackupPrivilege 2548 bwr04ql4wU.exe Token: SeBackupPrivilege 2840 Nu5hew6BoM.exe Token: SeSecurityPrivilege 2548 bwr04ql4wU.exe Token: SeSecurityPrivilege 2840 Nu5hew6BoM.exe Token: SeSecurityPrivilege 2548 bwr04ql4wU.exe Token: SeSecurityPrivilege 2840 Nu5hew6BoM.exe Token: SeSecurityPrivilege 2548 bwr04ql4wU.exe Token: SeSecurityPrivilege 2840 Nu5hew6BoM.exe Token: SeSecurityPrivilege 2548 bwr04ql4wU.exe Token: SeSecurityPrivilege 2840 Nu5hew6BoM.exe Token: SeDebugPrivilege 2488 608768a190.exe Token: SeDebugPrivilege 2548 bwr04ql4wU.exe Token: SeDebugPrivilege 2840 Nu5hew6BoM.exe Token: SeDebugPrivilege 1076 gold.exe Token: SeDebugPrivilege 1076 gold.exe Token: SeDebugPrivilege 4548 taskkill.exe Token: SeDebugPrivilege 4624 taskkill.exe Token: SeDebugPrivilege 4668 taskkill.exe Token: SeDebugPrivilege 4712 taskkill.exe Token: SeDebugPrivilege 4756 taskkill.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 3736 MSBuild.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeShutdownPrivilege 4756 chrome.exe Token: SeDebugPrivilege 3252 tasklist.exe Token: SeDebugPrivilege 3320 tasklist.exe Token: SeDebugPrivilege 1272 c18c78286f.exe Token: SeDebugPrivilege 2684 taskkill.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 2888 9fb4de9c62.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4808 firefox.exe 4520 d6a88dcd38.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4756 chrome.exe 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4808 firefox.exe 4520 d6a88dcd38.exe 4808 firefox.exe 4808 firefox.exe 4520 d6a88dcd38.exe 4520 d6a88dcd38.exe 4152 Jurisdiction.pif 4152 Jurisdiction.pif 4152 Jurisdiction.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2628 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 30 PID 2400 wrote to memory of 2628 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 30 PID 2400 wrote to memory of 2628 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 30 PID 2400 wrote to memory of 2628 2400 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 30 PID 2628 wrote to memory of 2888 2628 skotes.exe 32 PID 2628 wrote to memory of 2888 2628 skotes.exe 32 PID 2628 wrote to memory of 2888 2628 skotes.exe 32 PID 2628 wrote to memory of 2888 2628 skotes.exe 32 PID 2888 wrote to memory of 1576 2888 9fb4de9c62.exe 33 PID 2888 wrote to memory of 1576 2888 9fb4de9c62.exe 33 PID 2888 wrote to memory of 1576 2888 9fb4de9c62.exe 33 PID 2888 wrote to memory of 1576 2888 9fb4de9c62.exe 33 PID 1576 wrote to memory of 2032 1576 axplong.exe 34 PID 1576 wrote to memory of 2032 1576 axplong.exe 34 PID 1576 wrote to memory of 2032 1576 axplong.exe 34 PID 1576 wrote to memory of 2032 1576 axplong.exe 34 PID 1576 wrote to memory of 1860 1576 axplong.exe 36 PID 1576 wrote to memory of 1860 1576 axplong.exe 36 PID 1576 wrote to memory of 1860 1576 axplong.exe 36 PID 1576 wrote to memory of 1860 1576 axplong.exe 36 PID 2628 wrote to memory of 2488 2628 skotes.exe 37 PID 2628 wrote to memory of 2488 2628 skotes.exe 37 PID 2628 wrote to memory of 2488 2628 skotes.exe 37 PID 2628 wrote to memory of 2488 2628 skotes.exe 37 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 1652 2032 zxcv.exe 38 PID 2032 wrote to memory of 2924 2032 zxcv.exe 39 PID 2032 wrote to memory of 2924 2032 zxcv.exe 39 PID 2032 wrote to memory of 2924 2032 zxcv.exe 39 PID 2032 wrote to memory of 2924 2032 zxcv.exe 39 PID 1652 wrote to memory of 2548 1652 zxcv.exe 40 PID 1652 wrote to memory of 2548 1652 zxcv.exe 40 PID 1652 wrote to memory of 2548 1652 zxcv.exe 40 PID 1652 wrote to memory of 2548 1652 zxcv.exe 40 PID 1652 wrote to memory of 2840 1652 zxcv.exe 41 PID 1652 wrote to memory of 2840 1652 zxcv.exe 41 PID 1652 wrote to memory of 2840 1652 zxcv.exe 41 PID 1652 wrote to memory of 2840 1652 zxcv.exe 41 PID 2628 wrote to memory of 2140 2628 skotes.exe 43 PID 2628 wrote to memory of 2140 2628 skotes.exe 43 PID 2628 wrote to memory of 2140 2628 skotes.exe 43 PID 2628 wrote to memory of 2140 2628 skotes.exe 43 PID 1576 wrote to memory of 1076 1576 axplong.exe 45 PID 1576 wrote to memory of 1076 1576 axplong.exe 45 PID 1576 wrote to memory of 1076 1576 axplong.exe 45 PID 1576 wrote to memory of 1076 1576 axplong.exe 45 PID 2628 wrote to memory of 4220 2628 skotes.exe 46 PID 2628 wrote to memory of 4220 2628 skotes.exe 46 PID 2628 wrote to memory of 4220 2628 skotes.exe 46 PID 2628 wrote to memory of 4220 2628 skotes.exe 46 PID 1076 wrote to memory of 4416 1076 gold.exe 47 PID 1076 wrote to memory of 4416 1076 gold.exe 47 PID 1076 wrote to memory of 4416 1076 gold.exe 47 PID 1076 wrote to memory of 4416 1076 gold.exe 47 PID 2628 wrote to memory of 4520 2628 skotes.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe"C:\Users\Admin\AppData\Local\Temp\1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\1001698001\9fb4de9c62.exe"C:\Users\Admin\AppData\Local\Temp\1001698001\9fb4de9c62.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\bwr04ql4wU.exe"C:\Users\Admin\AppData\Roaming\bwr04ql4wU.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Users\Admin\AppData\Roaming\Nu5hew6BoM.exe"C:\Users\Admin\AppData\Roaming\Nu5hew6BoM.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 967⤵
- Loads dropped DLL
- Program crash
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\1000474001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000474001\gold.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 6367⤵
- Loads dropped DLL
- Program crash
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7849758,0x7fef7849768,0x7fef78497788⤵PID:2564
-
-
C:\Windows\system32\ctfmon.exectfmon.exe8⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:28⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:88⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:88⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1364 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:28⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3252 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 7487⤵
- Loads dropped DLL
- Program crash
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000569001\myrdx.exe"C:\Users\Admin\AppData\Local\Temp\1000569001\myrdx.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 527⤵
- Loads dropped DLL
- Program crash
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7849758,0x7fef7849768,0x7fef78497788⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:28⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:88⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1476 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:88⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1208 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:28⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2256 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3496 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:88⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3516 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:88⤵PID:4524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe"C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1970368⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv8⤵
- System Location Discovery: System Language Discovery
PID:3868
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T8⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pifJurisdiction.pif T8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4152
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000828001\12.exe"C:\Users\Admin\AppData\Local\Temp\1000828001\12.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\1000833001\c18c78286f.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\c18c78286f.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "RegAsm.exe" && timeout 1 && del RegAsm.exe && Exit"8⤵
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "RegAsm.exe"9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\timeout.exetimeout 19⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000845001\77ea41b2d7.exe"C:\Users\Admin\AppData\Local\Temp\1000845001\77ea41b2d7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\1000846001\0ee5fe4a64.exe"C:\Users\Admin\AppData\Local\Temp\1000846001\0ee5fe4a64.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001735001\608768a190.exe"C:\Users\Admin\AppData\Local\Temp\1001735001\608768a190.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\1001772001\e97c150d7c.exe"C:\Users\Admin\AppData\Local\Temp\1001772001\e97c150d7c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\1001773001\d3c19d0280.exe"C:\Users\Admin\AppData\Local\Temp\1001773001\d3c19d0280.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Users\Admin\AppData\Local\Temp\1001774001\d6a88dcd38.exe"C:\Users\Admin\AppData\Local\Temp\1001774001\d6a88dcd38.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4520 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:4800
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4808 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.0.1866607962\364655573" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1156 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c3eafac-c90f-4f3a-a026-f14c80c8c97a} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 1356 121d6158 gpu7⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.1.725568066\1966424711" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e7e3113-9e63-4122-99a2-6c6f810649a3} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 1536 d72d58 socket7⤵PID:3092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.2.1350364167\1074899871" -childID 1 -isForBrowser -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7fb18e2-bb7b-4d4d-b4ee-f276a30db7ae} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 2104 1a8cb058 tab7⤵PID:3420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.3.220171737\218816142" -childID 2 -isForBrowser -prefsHandle 2772 -prefMapHandle 2768 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fa8c3dc-8a9e-46cb-aeba-37a4dfaa99c3} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 2812 1d558258 tab7⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.4.1884515193\1193139479" -childID 3 -isForBrowser -prefsHandle 3728 -prefMapHandle 3724 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9997b144-ed89-4c0c-a913-8913fd188fd9} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 3740 d65258 tab7⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.5.1420585966\1524955536" -childID 4 -isForBrowser -prefsHandle 3844 -prefMapHandle 3848 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd0b6030-0a11-47c6-a860-44d668eccf9d} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 3832 1ecfcf58 tab7⤵PID:764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.6.1685314437\1518908435" -childID 5 -isForBrowser -prefsHandle 4012 -prefMapHandle 4016 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {276e6a71-6961-4f34-b2b7-b5d6eb1619c0} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 4000 1ecfd558 tab7⤵PID:2724
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe"C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 7285⤵
- Loads dropped DLL
- Program crash
PID:3800
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3396
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e71a58157d2009a5b644f4c410652f
SHA1cac1b5406bec9ad6eedc670a45ef1c27f34ae662
SHA256b21cdfd7ba7f306e14647da58c701dba9088e90098612460b3e2420ad97befc7
SHA512a51e81f6eb58efe75ca6c7d9a5ca757445ae73c4de5c2d99b523d0eec74b619430250b078c75088c201be1a6d5c15afeec20fb222b51271fe5b4ea5e90d64d83
-
Filesize
40B
MD59ca337524816226bf5da651706d62f51
SHA16f8a551c620e75e45b2340aac6720452d2886a26
SHA256ba3dc56f607d63a68f065d56b69cefc8ab6dd4991fa972d80a1ff4ee388f4877
SHA51297d45a79a646fe20a2ac9ef7aa142fe9483d95a6d2d9d007e7043f1b0776fbdf10616ba3fc93acd15404549bdd8c6e58706a76774fba18958dc8c1e76acc6e88
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD51d56d0a5c5aff58ea0d4a7bbca0d252b
SHA1f8b55161f3b954de734902868c9bf3f1cd72efdb
SHA2560c7f6eaec6e15bd98339c231d7df16fbbc1b87d8ecc28b3d763ade54d8358652
SHA512361b249f81c7c9247f7762c1d380e9b37f616d6fc6f8031b2e89b9a79019795a4deed9fcaf75bbeeaa18955f282ff999ec54033e5c1c1bbcf572c779513099c8
-
Filesize
45KB
MD5d55ed9a681bd127a172730e860046123
SHA1c45ab760909762449614f2c32d9d549ba4fdcc5f
SHA256a19308c48fd7dbe6725e7a2d20c9a95539770ee14ef6777e08d7349924ec34e0
SHA512140dad641d69ffe7bc4b45db20f8b67b0265438f9bd9f2a4aa3ec3c54cbb70e949e88062f78c89aeaba5e75ba472a8834ecc5de8a39201fb88243bc01c283a95
-
Filesize
1.1MB
MD5a5cf5de46ec3f0a677e94188b19e7862
SHA1d07e3fd100c423662dbb3ed85713ff7b87c52e60
SHA256450ac7367b33ac0d26ee08c5371ba668d9d3331a8c119520eb5ca4a46f91973c
SHA5121d2d91625f971f71670a36340092ab9ac0a35a4ac791a46ee8b055894cdf3b7fc7030e4d27f973d738b85295c31a4bfbe5c033b07a5f7ebf10508d75043c1ab1
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
4.1MB
MD59e675bbaf944eeee4f1e7428a5b22c95
SHA16714982450cc5d21b6c1df2a0603755f6bc41d07
SHA256deddd900cd271a593bc41f4218b1e2aab3465f210ec92d4597c44bb79414e755
SHA512a853288db2c220b8e3fca72a01cdc147055b58a336fc1c58120c3973462ae83d510c7da5e1073d225e7aa122fcd3354c6e23b1d48de9d2e24c5cc26d1d7cd2c0
-
Filesize
7.5MB
MD5563e12ffd633cfb480ab1f3153676d22
SHA128f104d5d1336c20a99d5bc3208d74351e3d8c90
SHA256b7439cb886010a0f42601044ff3b1ff2cd11873a6e16b6682cba31e052f5865d
SHA5121a2bcaa8b42a25f8a014d2549787430046814a72baf16e798b21226b8003abef6a71e4831d92a90b8b810e47257beb79e18a4c1930c2f0ea2817a2ace8676e6c
-
Filesize
515KB
MD5a904ae8b26c7d421140be930266ed425
SHA1c2e246b9197c18d6d40d9477a8e9a2d74a83b0e2
SHA2569d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84
SHA5122dbd601a564f7ffc1609bfb05ed55d57afb9bdd9bec1e9091deb53fcfa9fa02a7ba59825f2b9c3777d2016d724a8263808331356f569a1ecae585422e040f3be
-
Filesize
7.0MB
MD5bf43acacd11d09300691cf9449c386d1
SHA1ff7d6f2fbad4851cea65811fb1f5df83184510f5
SHA2569415e13f69bce584aa0e94ba833d689f892d27960f6b6b353f439e4aee32b1aa
SHA512170a2695ac6c918c4f3b5da6d59b2de4bbf454f3abe9fe4ffb9b32314f8e4731773923fe04acb66c31ddb47877a9dbd500d8a561532fa1a152feb69f4a945cdb
-
Filesize
392KB
MD566eeb677cf7f1d2adeb2e9e399352221
SHA167aa141f061cd105d94feebcb9ed9fc04d74dee6
SHA256b40577b666e050337e96d5147d32f5195d3cdee4f2b56b854dd3a29543281aa0
SHA512b4dc8e5976a5ce0adc66f70e033b29a228eb6a555a72b01be6336418dff22072e288b4da20fe5e51f0811d09b73df9c40f212480b4822dfbae99e074efde4e42
-
Filesize
1.2MB
MD55d97c2475c8a4d52e140ef4650d1028b
SHA1da20d0a43d6f8db44ff8212875a7e0f7bb223223
SHA256f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf
SHA51222c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee
-
Filesize
514KB
MD526d8d52bac8f4615861f39e118efa28d
SHA1efd5a7ccd128ffe280af75ec8b3e465c989d9e35
SHA2568521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f
SHA5121911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733
-
Filesize
1.8MB
MD58b2720771b1238a002e8426d2f59607b
SHA1af72719f9fdcf58ee444c1fafb18820a158f6121
SHA25669f227d861d3959beb039721e2dad6b4f68e652ba74671f90b877cd01c866dda
SHA5126f64d7340b085ccd98996a3326f940855d7b8cd96d0ddfdf348709f56d7ddf5b3ec754c08a9012add3d74b68e7133215985bd11b82e6321334573f9d7a20a50e
-
Filesize
2.6MB
MD52d0218072ae23eb7b7ec78dfdec917ca
SHA1cff62e0bc78dd1a196ac01137dc87117c93c5804
SHA2563110a198fe21039ba773c8228b43ec38dfd3927a52012fddad5131c833bcd62a
SHA5123e66a09f338710f258f07f92d9745623aab17d32153960e2c77840d317d592b39755b0f3a8709583b0c4136ae1d8bda6a250b0abba666a0829d46966a1b79dd3
-
Filesize
2.9MB
MD534303ae95155e9f0086d41a36d81cada
SHA177353b7f8ff4e2fd8496d868a80b275e010a3165
SHA256381ecf04c61ee4081f7663931d1cb6502cb54927f412ad4792b08ed5a43ca682
SHA5126beaf50d0859d7330e127b83d5b5991b2a957a3dd1f6072a664185ef8fd89fb963b56c8b5f2355d7bd966d71ac95a33642788650259cafee602f467c79e83df5
-
Filesize
898KB
MD573633e9e983c8ccce2723e45bbf94ed6
SHA1acd2f4c59ff82886b820374bc2c9c68628c1eb5b
SHA2561b0594fc43ee290c3b2dd5a1a2739b6f9f411ee0c5c3e36e8db3f7a17269a85e
SHA512a5b344c709022af93c11d738fc6bb9c2399e00c9b79229614846e5c911ca541f56ced5bbf2d3b983cf5eb1c5dcd7ad204994a0a810269b8c5d8bdbf77013cfda
-
Filesize
307KB
MD5791fcee57312d4a20cc86ae1cea8dfc4
SHA104a88c60ae1539a63411fe4765e9b931e8d2d992
SHA25627e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d
SHA5122771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
24KB
MD52a84a77ad125a30e442d57c63c18e00e
SHA168567ee0d279087a12374c10a8b7981f401b20b8
SHA2560c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769
SHA5129d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1.8MB
MD52bb95070d042293ee003a71c9f37aec3
SHA1b14e8139a5fdd06647633ea0ef1808cdda18c4aa
SHA2561401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a
SHA5125d60bd6e94ad6e38701bdc13853b6f3a50f3f02927119658723478fe4ece4c862d4c45f18585bc88636993ff0d500921d6d297ea7744165e1b32d5757c620455
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5d32f0b2ae3e0b50bf2ae5e75487a4bd6
SHA16c3c3c7e304a64c14af194f7cd80e3bed4cc14dd
SHA2568bb6339169904186b0d6e10f427e0bf033fbb91fad2d3f8db3cfea5d1397f925
SHA5123f87555e1b2d32e03c4c450db9c8b7c42f194ebdca43488a874414ddbebfed0967e522ce092fa748193326944fc257a18d61e5409b24031015b736a8a75ba7f4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD53bfbd15af42a01841124ad4e56cf6320
SHA1b00f8c1a0fd0434f83630cfec8d5504454e77154
SHA2565322341ba0751b44f1e9eabf9dca536263e95bace1035cf0e2e14feed1d11271
SHA5123f16726efae1cf4339f213a6a6ae0dd06567fd0a3b75b15ab1e09d14bfe9c23e2ad24900db3169457a0aaaf6194abef129c283530a29c4a721d18f56b95c7643
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50e846b58cfbaf3a47baa10c9d4e6a4f2
SHA18e8746cb2a218c4098767fe93906bfc7bef26445
SHA256e717de4fd3c828469cebb9ac29e2cc52b2b62a082a72663df4838a52192ae6ac
SHA512dbfce70b24be39e0fc00f4ff78d2b833ef9ae5655cbfe4c597df8289c03c9dd171697580b744a0182cd1fe48d650a44717748b1bc5f1da7137c5375700162a3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\16b7b7a3-e0c9-4410-8edd-2ebb4dc798e5
Filesize745B
MD5623d79d7daf2e3aa746529acbb0bb518
SHA16a22a11b9c6e1d83020bde59632dfee314adeb04
SHA256ef3211f7ab2799d30118fc781cb71745715afe0aa1ea6234c433a95bac3717c4
SHA512c9fea4bf47a3dcd644ba8ce86b5897592b44b901d77cb58f455349ae7576bd7fff0abcb777832287d831ebdf268a30b1b43aa4240bc9ad44f5f19f62e4f3cd0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\789a60d2-f266-4cba-9e17-ec97affff4fd
Filesize12KB
MD5c2e784f54cf0d96b3c5b7eca97bcb87c
SHA1c26b07b1875573c2b08345e6ec8b194d82f9d147
SHA256e8dbb506fee489498b7327ca986a7abe269deaa8f8f713e5f6f54a8dc6e0c47f
SHA51262b6f6622a6df9cbce23cf7c92ed4b3efd018160e7c56d21a97da9532408a3f7577b381e2247318c16f4e294d178ab4563d5c54eb0eb7469f5eafb7ae9f8ea45
-
Filesize
6KB
MD56760c29b0a4044f02b4da5394318f830
SHA1f23fa93e773847bbeb03fb652b15c80d0429f679
SHA256e4f7635198143818d8624cca0800cd60ea72e8062013c6db06e78ed75759b1f6
SHA5126fab1726c1b8995da5e1b2970979d0004164584827a708a42e639aa16b33d4f8407cc7678a41cc92da077f23e4032f513f1de0383804c476e0340af6689c19cf
-
Filesize
6KB
MD5022edeaaa5abebb432a93d8e7b6bf587
SHA186d6636a9027c971a5e4ee78f18a61887f2925db
SHA256d4365e17ec609553b9ea9862808ed193d2c43281d5d2848a3b7ec4d7a6affd53
SHA512215030495bc69e50ddf1ee373f09ecea239a4410e08d1b37be76d614a09b85c7550e1f1b5e62b68b524196336212d5caaea19c1184d230121201c647c7771f2d
-
Filesize
6KB
MD59b6cc5f01ee8dada9838c4275cd83cbd
SHA158cf5ec12885d4051216dbcd4fa6e3bd7875f274
SHA256e47580019ab7ecfab9848a0cb8395f53d15015dc418b4caf344ced9400de8d0a
SHA512744bc65cec5eb0abfd43e9457ea4aa7baddf055aa9a080127f62d075a2c145d0db68690c267d15a33bdb1e9230e04d2218d359de28618c53f6d9ec80f02b0983
-
Filesize
340KB
MD5131d164783db3608e4b2e97428e17028
SHA1c00064a0f4952f5a37093cd7631f5921f9c00387
SHA25605053f2a6db0f5352295ce4ca7146618ddb175f1ff4cdcd93a055a039c098e5f
SHA512020b22527d0e555509897ce2df876bf2a30e3fc976cd86e52335104cf0f9db152caa8b46650a8bd0022b3cbaf3d20e0201322e3617e00eb0f25c6fcba245c505
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.8MB
MD5aa9612d185f329e0f4b0a9525de3b0e1
SHA121ad52db3ebef421c02c82070c1ee13ad6c03620
SHA256c732cac1942cf6a53dbad592bd7599b3410b8f9f090f79060ddd0f6e4d3abd6b
SHA5125df5ba18ba7a1ea921e3953859010712a776ea598a7e5f169716ccd0b68bf4ab57d8cb451f42277965b59e816f4664d1c4356726f7600837c464816c3c13aa66
-
Filesize
331KB
MD5fd381b2627904d8365229d1ddd7e221f
SHA1d7bcbabb6cd84875cc76f8170833ac679cd7d915
SHA256ed5ac0c0d07595eb99ccc7346faab8504eb03000da1012abc1009c0cfbd4d4b9
SHA5122b1e15b539d55b92f31c61cff954dafa61a44f7ccf75d113ab57ad54e9a8cbde304a285d0583663a206f648fd4f3b63257dbedf3df608d0391353ffb4aa78daf