Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe
Resource
win7-20240903-en
General
-
Target
1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe
-
Size
1.8MB
-
MD5
2bb95070d042293ee003a71c9f37aec3
-
SHA1
b14e8139a5fdd06647633ea0ef1808cdda18c4aa
-
SHA256
1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a
-
SHA512
5d60bd6e94ad6e38701bdc13853b6f3a50f3f02927119658723478fe4ece4c862d4c45f18585bc88636993ff0d500921d6d297ea7744165e1b32d5757c620455
-
SSDEEP
49152:r0kr1xYlUv0VBmrycByGFuJZGhx17xwHRrt1HHNja8+ne+:r3rIE0Vc5VuJZqvwxrt1HHwK
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
puma
http://185.215.113.206
-
url_path
/e2b1563c6670f193.php
Extracted
stealc
LogsDiller
http://94.141.122.159
-
url_path
/baf27292fb61e144.php
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
5.03
7c4393
http://185.215.113.217
-
install_dir
f9c76c1660
-
install_file
corept.exe
-
strings_key
9808a67f01d2f0720518035acbde7521
-
url_paths
/CoreOPT/index.php
Extracted
lumma
https://crisiwarny.store/api
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 65c723620f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 65c723620f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 65c723620f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 65c723620f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 65c723620f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 65c723620f.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5372 created 3472 5372 Jurisdiction.pif 56 PID 5372 created 3472 5372 Jurisdiction.pif 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45ba0790f2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e1e35025d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b4941edbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 46133b8733.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65c723620f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ af89384caf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5464 chrome.exe 1572 chrome.exe 4308 chrome.exe 448 chrome.exe -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46133b8733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion af89384caf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e1e35025d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45ba0790f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b4941edbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion af89384caf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45ba0790f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e1e35025d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b4941edbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65c723620f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65c723620f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46133b8733.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 2b4941edbc.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation splwow64.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Jurisdiction.pif -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url e174408656.exe -
Executes dropped EXE 24 IoCs
pid Process 760 skotes.exe 3440 2b4941edbc.exe 4928 axplong.exe 4764 axplong.exe 1080 skotes.exe 3640 65c723620f.exe 4980 e1e35025d6.exe 368 1.exe 2956 46133b8733.exe 2420 12.exe 2292 splwow64.exe 4472 12.exe 208 44233049b7.exe 4468 e174408656.exe 2240 af89384caf.exe 4512 45ba0790f2.exe 4032 num.exe 5372 Jurisdiction.pif 5692 service123.exe 5960 skotes.exe 3056 axplong.exe 5776 axplong.exe 3300 skotes.exe 5804 service123.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 46133b8733.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 65c723620f.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine e1e35025d6.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 45ba0790f2.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2b4941edbc.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine af89384caf.exe -
Loads dropped DLL 2 IoCs
pid Process 5692 service123.exe 5804 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 65c723620f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 65c723620f.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65c723620f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001735001\\65c723620f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e1e35025d6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001772001\\e1e35025d6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\46133b8733.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001773001\\46133b8733.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\44233049b7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001774001\\44233049b7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af89384caf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000845001\\af89384caf.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45ba0790f2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000846001\\45ba0790f2.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\num.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001775001\\num.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d15-242.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4580 tasklist.exe 5672 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 760 skotes.exe 3440 2b4941edbc.exe 4928 axplong.exe 4764 axplong.exe 1080 skotes.exe 3640 65c723620f.exe 4980 e1e35025d6.exe 2956 46133b8733.exe 2240 af89384caf.exe 4512 45ba0790f2.exe 3056 axplong.exe 5960 skotes.exe 5776 axplong.exe 3300 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4468 set thread context of 5324 4468 e174408656.exe 167 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\LuggageRepresentations splwow64.exe File opened for modification C:\Windows\AdditionsSalvation splwow64.exe File opened for modification C:\Windows\SixCream splwow64.exe File opened for modification C:\Windows\HomelessLaser splwow64.exe File opened for modification C:\Windows\ActuallyFtp splwow64.exe File opened for modification C:\Windows\EauOfficial splwow64.exe File created C:\Windows\Tasks\skotes.job 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe File created C:\Windows\Tasks\axplong.job 2b4941edbc.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023cf6-110.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1940 2420 WerFault.exe 110 4760 4472 WerFault.exe 117 5456 4032 WerFault.exe 129 5864 368 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45ba0790f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1e35025d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46133b8733.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jurisdiction.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65c723620f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44233049b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b4941edbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af89384caf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language num.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 num.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString num.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5804 timeout.exe 5664 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 7 IoCs
pid Process 1140 taskkill.exe 2288 taskkill.exe 4760 taskkill.exe 4764 taskkill.exe 3944 taskkill.exe 4204 taskkill.exe 4672 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5800 schtasks.exe 3084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 760 skotes.exe 760 skotes.exe 3440 2b4941edbc.exe 3440 2b4941edbc.exe 4928 axplong.exe 4928 axplong.exe 4764 axplong.exe 4764 axplong.exe 1080 skotes.exe 1080 skotes.exe 3640 65c723620f.exe 3640 65c723620f.exe 3640 65c723620f.exe 3640 65c723620f.exe 3640 65c723620f.exe 4980 e1e35025d6.exe 4980 e1e35025d6.exe 2956 46133b8733.exe 2956 46133b8733.exe 2240 af89384caf.exe 2240 af89384caf.exe 208 44233049b7.exe 208 44233049b7.exe 4512 45ba0790f2.exe 4512 45ba0790f2.exe 208 44233049b7.exe 208 44233049b7.exe 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 3640 65c723620f.exe Token: SeDebugPrivilege 1140 taskkill.exe Token: SeDebugPrivilege 2288 taskkill.exe Token: SeDebugPrivilege 4760 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 3944 taskkill.exe Token: SeDebugPrivilege 3340 firefox.exe Token: SeDebugPrivilege 3340 firefox.exe Token: SeDebugPrivilege 5672 tasklist.exe Token: SeDebugPrivilege 4580 tasklist.exe Token: SeDebugPrivilege 4468 e174408656.exe Token: SeShutdownPrivilege 5464 chrome.exe Token: SeCreatePagefilePrivilege 5464 chrome.exe Token: SeShutdownPrivilege 5464 chrome.exe Token: SeCreatePagefilePrivilege 5464 chrome.exe Token: SeDebugPrivilege 4204 taskkill.exe Token: SeDebugPrivilege 4672 taskkill.exe Token: SeDebugPrivilege 3340 firefox.exe Token: SeDebugPrivilege 3340 firefox.exe Token: SeDebugPrivilege 3340 firefox.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe 5464 chrome.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 208 44233049b7.exe 5372 Jurisdiction.pif 5372 Jurisdiction.pif 5372 Jurisdiction.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3340 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 760 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 89 PID 4884 wrote to memory of 760 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 89 PID 4884 wrote to memory of 760 4884 1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe 89 PID 760 wrote to memory of 3440 760 skotes.exe 95 PID 760 wrote to memory of 3440 760 skotes.exe 95 PID 760 wrote to memory of 3440 760 skotes.exe 95 PID 3440 wrote to memory of 4928 3440 2b4941edbc.exe 98 PID 3440 wrote to memory of 4928 3440 2b4941edbc.exe 98 PID 3440 wrote to memory of 4928 3440 2b4941edbc.exe 98 PID 760 wrote to memory of 3640 760 skotes.exe 105 PID 760 wrote to memory of 3640 760 skotes.exe 105 PID 760 wrote to memory of 3640 760 skotes.exe 105 PID 760 wrote to memory of 4980 760 skotes.exe 106 PID 760 wrote to memory of 4980 760 skotes.exe 106 PID 760 wrote to memory of 4980 760 skotes.exe 106 PID 4928 wrote to memory of 368 4928 axplong.exe 108 PID 4928 wrote to memory of 368 4928 axplong.exe 108 PID 4928 wrote to memory of 368 4928 axplong.exe 108 PID 760 wrote to memory of 2956 760 skotes.exe 109 PID 760 wrote to memory of 2956 760 skotes.exe 109 PID 760 wrote to memory of 2956 760 skotes.exe 109 PID 4928 wrote to memory of 2420 4928 axplong.exe 110 PID 4928 wrote to memory of 2420 4928 axplong.exe 110 PID 4928 wrote to memory of 2420 4928 axplong.exe 110 PID 4928 wrote to memory of 2292 4928 axplong.exe 111 PID 4928 wrote to memory of 2292 4928 axplong.exe 111 PID 4928 wrote to memory of 2292 4928 axplong.exe 111 PID 2292 wrote to memory of 1056 2292 splwow64.exe 114 PID 2292 wrote to memory of 1056 2292 splwow64.exe 114 PID 2292 wrote to memory of 1056 2292 splwow64.exe 114 PID 4928 wrote to memory of 4472 4928 axplong.exe 117 PID 4928 wrote to memory of 4472 4928 axplong.exe 117 PID 4928 wrote to memory of 4472 4928 axplong.exe 117 PID 760 wrote to memory of 208 760 skotes.exe 119 PID 760 wrote to memory of 208 760 skotes.exe 119 PID 760 wrote to memory of 208 760 skotes.exe 119 PID 208 wrote to memory of 1140 208 44233049b7.exe 120 PID 208 wrote to memory of 1140 208 44233049b7.exe 120 PID 208 wrote to memory of 1140 208 44233049b7.exe 120 PID 4928 wrote to memory of 4468 4928 axplong.exe 122 PID 4928 wrote to memory of 4468 4928 axplong.exe 122 PID 4928 wrote to memory of 2240 4928 axplong.exe 125 PID 4928 wrote to memory of 2240 4928 axplong.exe 125 PID 4928 wrote to memory of 2240 4928 axplong.exe 125 PID 208 wrote to memory of 2288 208 44233049b7.exe 126 PID 208 wrote to memory of 2288 208 44233049b7.exe 126 PID 208 wrote to memory of 2288 208 44233049b7.exe 126 PID 4928 wrote to memory of 4512 4928 axplong.exe 128 PID 4928 wrote to memory of 4512 4928 axplong.exe 128 PID 4928 wrote to memory of 4512 4928 axplong.exe 128 PID 760 wrote to memory of 4032 760 skotes.exe 129 PID 760 wrote to memory of 4032 760 skotes.exe 129 PID 760 wrote to memory of 4032 760 skotes.exe 129 PID 208 wrote to memory of 4760 208 44233049b7.exe 130 PID 208 wrote to memory of 4760 208 44233049b7.exe 130 PID 208 wrote to memory of 4760 208 44233049b7.exe 130 PID 208 wrote to memory of 4764 208 44233049b7.exe 133 PID 208 wrote to memory of 4764 208 44233049b7.exe 133 PID 208 wrote to memory of 4764 208 44233049b7.exe 133 PID 208 wrote to memory of 3944 208 44233049b7.exe 135 PID 208 wrote to memory of 3944 208 44233049b7.exe 135 PID 208 wrote to memory of 3944 208 44233049b7.exe 135 PID 208 wrote to memory of 4364 208 44233049b7.exe 137 PID 208 wrote to memory of 4364 208 44233049b7.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe"C:\Users\Admin\AppData\Local\Temp\1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\1001698001\2b4941edbc.exe"C:\Users\Admin\AppData\Local\Temp\1001698001\2b4941edbc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbf3edcc40,0x7ffbf3edcc4c,0x7ffbf3edcc588⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1976 /prefetch:28⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:38⤵PID:5700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2636 /prefetch:88⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:18⤵
- Uses browser remote debugging
PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:18⤵
- Uses browser remote debugging
PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3628,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:18⤵
- Uses browser remote debugging
PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:88⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,5317552623651417410,7229631449015963447,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:88⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5692
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 10927⤵
- Program crash
PID:5864
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe"C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 13007⤵
- Program crash
PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat7⤵
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:5696
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1970368⤵
- System Location Discovery: System Language Discovery
PID:5932
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv8⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T8⤵
- System Location Discovery: System Language Discovery
PID:5324
-
-
C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pifJurisdiction.pif T8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Jurisdiction.pif" && timeout 1 && del Jurisdiction.pif && Exit"9⤵
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "Jurisdiction.pif"10⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 110⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5664
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:5564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000828001\12.exe"C:\Users\Admin\AppData\Local\Temp\1000828001\12.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 10487⤵
- Program crash
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000833001\e174408656.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\e174408656.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:5368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "RegAsm.exe" && timeout 1 && del RegAsm.exe && Exit"8⤵
- System Location Discovery: System Language Discovery
PID:5564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "RegAsm.exe"9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\timeout.exetimeout 19⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000845001\af89384caf.exe"C:\Users\Admin\AppData\Local\Temp\1000845001\af89384caf.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\1000846001\45ba0790f2.exe"C:\Users\Admin\AppData\Local\Temp\1000846001\45ba0790f2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001735001\65c723620f.exe"C:\Users\Admin\AppData\Local\Temp\1001735001\65c723620f.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\1001772001\e1e35025d6.exe"C:\Users\Admin\AppData\Local\Temp\1001772001\e1e35025d6.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\1001773001\46133b8733.exe"C:\Users\Admin\AppData\Local\Temp\1001773001\46133b8733.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\1001774001\44233049b7.exe"C:\Users\Admin\AppData\Local\Temp\1001774001\44233049b7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:4364
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3340 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab55a048-5447-47ff-aa0c-c7868a826843} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" gpu7⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b60932fd-8ebe-4bda-ade7-5191d890621f} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" socket7⤵PID:1944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3364 -childID 1 -isForBrowser -prefsHandle 3036 -prefMapHandle 2944 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccc2b5d0-4e3c-4327-81f7-1cd17a6d95e1} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -childID 2 -isForBrowser -prefsHandle 3848 -prefMapHandle 3012 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a4423fc-81a8-4457-9df9-95164f6fcd7f} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:2784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4464 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4500 -prefMapHandle 4496 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89fb7e4f-43ff-472b-ac18-45f4fe0f4df3} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" utility7⤵
- Checks processor information in registry
PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 3 -isForBrowser -prefsHandle 5536 -prefMapHandle 5560 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {318c34d5-93fe-4558-8360-827478ed0464} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 4 -isForBrowser -prefsHandle 5716 -prefMapHandle 5720 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8915e5c6-1c2d-4d21-a8c6-f6622ea272dd} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:5976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5936 -childID 5 -isForBrowser -prefsHandle 5856 -prefMapHandle 5860 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9db411f7-a779-4600-9204-bd87795730e6} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:6020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe"C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 13005⤵
- Program crash
PID:5456
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:5536 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2420 -ip 24201⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4472 -ip 44721⤵PID:4688
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4032 -ip 40321⤵PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 368 -ip 3681⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5960
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3056
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3300
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5776
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5804
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD516cfeb35e87734f21892d724b4b33e44
SHA1da75208d6cd1b3be6d1c21efa885f7555b5f6d65
SHA256d0ee74a42c6d9c97e7ad22702b2d1168dfc522794a57f8632ffac6b03d0b11b7
SHA5127172fea9adee255e1abe275b38bdeb6ab06abed36fadb6190500c44f2d54fe109175458e91ceffd49e8fe994fde05c24fe20aa81f86dd1e4cc045155e979df65
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD56c339c730ad3c653c0368fe0d71e3ff5
SHA18dc58a5bf732452794f7b330c5505be54d991730
SHA256cfec9468f6196a67a95497d43a6ce42ce4db2e4bed9c907bc54fcc2b4243519c
SHA512f6e466b9d8eb0ad86653f322797b446ec79e8874849ec8e97c4c04a8236ee1af519885b670f92491aea3fb4d74e09509861b1c90f82932c5d56ce346fff05247
-
Filesize
7.0MB
MD5bf43acacd11d09300691cf9449c386d1
SHA1ff7d6f2fbad4851cea65811fb1f5df83184510f5
SHA2569415e13f69bce584aa0e94ba833d689f892d27960f6b6b353f439e4aee32b1aa
SHA512170a2695ac6c918c4f3b5da6d59b2de4bbf454f3abe9fe4ffb9b32314f8e4731773923fe04acb66c31ddb47877a9dbd500d8a561532fa1a152feb69f4a945cdb
-
Filesize
392KB
MD566eeb677cf7f1d2adeb2e9e399352221
SHA167aa141f061cd105d94feebcb9ed9fc04d74dee6
SHA256b40577b666e050337e96d5147d32f5195d3cdee4f2b56b854dd3a29543281aa0
SHA512b4dc8e5976a5ce0adc66f70e033b29a228eb6a555a72b01be6336418dff22072e288b4da20fe5e51f0811d09b73df9c40f212480b4822dfbae99e074efde4e42
-
Filesize
1.2MB
MD55d97c2475c8a4d52e140ef4650d1028b
SHA1da20d0a43d6f8db44ff8212875a7e0f7bb223223
SHA256f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf
SHA51222c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee
-
Filesize
514KB
MD526d8d52bac8f4615861f39e118efa28d
SHA1efd5a7ccd128ffe280af75ec8b3e465c989d9e35
SHA2568521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f
SHA5121911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733
-
Filesize
1.8MB
MD58b2720771b1238a002e8426d2f59607b
SHA1af72719f9fdcf58ee444c1fafb18820a158f6121
SHA25669f227d861d3959beb039721e2dad6b4f68e652ba74671f90b877cd01c866dda
SHA5126f64d7340b085ccd98996a3326f940855d7b8cd96d0ddfdf348709f56d7ddf5b3ec754c08a9012add3d74b68e7133215985bd11b82e6321334573f9d7a20a50e
-
Filesize
2.6MB
MD52d0218072ae23eb7b7ec78dfdec917ca
SHA1cff62e0bc78dd1a196ac01137dc87117c93c5804
SHA2563110a198fe21039ba773c8228b43ec38dfd3927a52012fddad5131c833bcd62a
SHA5123e66a09f338710f258f07f92d9745623aab17d32153960e2c77840d317d592b39755b0f3a8709583b0c4136ae1d8bda6a250b0abba666a0829d46966a1b79dd3
-
Filesize
2.9MB
MD534303ae95155e9f0086d41a36d81cada
SHA177353b7f8ff4e2fd8496d868a80b275e010a3165
SHA256381ecf04c61ee4081f7663931d1cb6502cb54927f412ad4792b08ed5a43ca682
SHA5126beaf50d0859d7330e127b83d5b5991b2a957a3dd1f6072a664185ef8fd89fb963b56c8b5f2355d7bd966d71ac95a33642788650259cafee602f467c79e83df5
-
Filesize
1.8MB
MD5aa9612d185f329e0f4b0a9525de3b0e1
SHA121ad52db3ebef421c02c82070c1ee13ad6c03620
SHA256c732cac1942cf6a53dbad592bd7599b3410b8f9f090f79060ddd0f6e4d3abd6b
SHA5125df5ba18ba7a1ea921e3953859010712a776ea598a7e5f169716ccd0b68bf4ab57d8cb451f42277965b59e816f4664d1c4356726f7600837c464816c3c13aa66
-
Filesize
898KB
MD573633e9e983c8ccce2723e45bbf94ed6
SHA1acd2f4c59ff82886b820374bc2c9c68628c1eb5b
SHA2561b0594fc43ee290c3b2dd5a1a2739b6f9f411ee0c5c3e36e8db3f7a17269a85e
SHA512a5b344c709022af93c11d738fc6bb9c2399e00c9b79229614846e5c911ca541f56ced5bbf2d3b983cf5eb1c5dcd7ad204994a0a810269b8c5d8bdbf77013cfda
-
Filesize
307KB
MD5791fcee57312d4a20cc86ae1cea8dfc4
SHA104a88c60ae1539a63411fe4765e9b931e8d2d992
SHA25627e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d
SHA5122771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
580KB
MD54b0812fabc1ba34d8d45d28180f6c75f
SHA1b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950
SHA25673312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103
SHA5127f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158
-
Filesize
96KB
MD5b6e8aab80d33d6626168cd877583ef3e
SHA1d7f40b1b5c16ac33112d71183686c12285775033
SHA2569eacbd721e6faee08ce06b2ce74a460f4e21af70d065e53de688ee626819de83
SHA5124a6c26fb4c9f4833f3e8e14bace8d19ac48bba6914d6d9f5d15bb37e566e43699d06a32004020d89f531444201c4729a6a02d23ac37536898d8d76c92045b84f
-
Filesize
24KB
MD52a84a77ad125a30e442d57c63c18e00e
SHA168567ee0d279087a12374c10a8b7981f401b20b8
SHA2560c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769
SHA5129d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a
-
Filesize
62KB
MD546a51002cdbe912d860ce08c83c0376b
SHA16d0ae63850bd8d5c86e45cba938609a7f051f59b
SHA25618070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017
SHA512ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44
-
Filesize
69KB
MD58ca4bbb4e4ddf045ff547cb2d438615c
SHA13e2fc0fdc0359a08c7782f44a5ccebf3a52b5152
SHA2564e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed
SHA512b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9
-
Filesize
7KB
MD5f3d7abb7a7c91203886dd0f2df4fc0d6
SHA160ffbb095fceeb2ea2b9e65355e9dbf1de736d6c
SHA2565867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3
SHA5129af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367
-
Filesize
58KB
MD584c831b7996dfc78c7e4902ad97e8179
SHA1739c580a19561b6cde4432a002a502bea9f32754
SHA2561ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575
SHA512ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991
-
Filesize
80KB
MD50814e2558c8e63169d393fac20c668f9
SHA152e8b77554cc098410408668e3d4f127fa02d8bd
SHA256cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d
SHA51280e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319
-
Filesize
71KB
MD56785e2e985143a33c5c3557788f12a2b
SHA17a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0
SHA25666bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7
SHA5123edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91
-
Filesize
865KB
MD56cee6bd1b0b8230a1c792a0e8f72f7eb
SHA166a7d26ed56924f31e681c1af47d6978d1d6e4e8
SHA25608ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab
SHA5124d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193
-
Filesize
95KB
MD5ba8c4239470d59c50a35a25b7950187f
SHA1855a8f85182dd03f79787147b73ae5ed61fb8d7b
SHA256a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b
SHA5121e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0
-
Filesize
92KB
MD52759c67bccd900a1689d627f38f0a635
SHA1d71b170715ed2b304167545af2bd42834ccf1881
SHA256510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05
SHA512aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e
-
Filesize
53KB
MD579156afddd310be36f037a8f0708a794
SHA109ef36ae22b5eab65d1f62166542601b8919399d
SHA2567faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503
SHA512d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01
-
Filesize
1.8MB
MD52bb95070d042293ee003a71c9f37aec3
SHA1b14e8139a5fdd06647633ea0ef1808cdda18c4aa
SHA2561401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a
SHA5125d60bd6e94ad6e38701bdc13853b6f3a50f3f02927119658723478fe4ece4c862d4c45f18585bc88636993ff0d500921d6d297ea7744165e1b32d5757c620455
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize12KB
MD50f4e47e7dff5197d258a14b57105e795
SHA17ceea33c3fd93e51dccafb3fe726e3dc0d47450a
SHA2568728125fa813f20dcfa99219d6eec76853b718c2e19089502c199ff01eda5e9e
SHA512270758d550bb512f9a2f339f5fb1dee776092f9e38f9864dbad2bb06d2cbfd728cbb694ce187cffab6e9ac960468b632979b5a9235be8dae225cc636a82792a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a1e948c59b2feb2d3e5ba7b84fa734fc
SHA1ba831a27c57c101821fea19f5df3dac74d3b8ff6
SHA256c2ff472f63f277a02c33640eef71fbdf0e4a1b2b9114e7c7c7ba6e107d14a0e2
SHA51250538c2446fda37fd8ba654bf023a88c951e2fed90d2882d248beb210ed79056801cb6eed44d39b87d36447a2ca3d72ec40a6a83fcc9638eb03858f0b7673088
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50fa853e1f845a6f8a261f1b36508ad17
SHA13036cba08d7cb160ab64bdd60bcc997ddd1e1b11
SHA2561bd19bf9e8005e9ff043769bef156ff7a29ed6be8fbe3360c00b919225c743ae
SHA512446ea4b9e8cb58dd89ca4c561badde30745a4e4a01794aa4b945fcc72fdbcd224bcc7d1cee2679e08ed6e621f4f06b98a2b389e5a46bff3007ced23dbe53d9a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50b4f88bd9ac8bbd65ea3f804e803baad
SHA17c6e92e2a4b22815965facb533515108a485f85b
SHA2569715e98a28783ac965f4c0ccad5621a57429618bd5295816dcafe8eab8459d11
SHA5125ac9444e7ed3d72e0edd77c44eceec11d4d0074842f5501e7a159f44ee60266e4a58d42d3ff79c120f6cb63f639971ca3696c8e82827b23f66a9cdefb971fa71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\718ba829-d760-4a19-ac3b-24211e221383
Filesize671B
MD592f7b5bacdad3f231b881c776ff363cf
SHA17ddaba6f503f6f23595840e0caeec5a78b30cac9
SHA256d753423c44ff0de28a5df426ca94660807591c744b7c83273172311a6d71c982
SHA512e52aeac812effa015277a4ad29a5225f859bfdf3e84ba4a88017c4bdcbf8bb7684884cc74399456b86316c4ea3b61f32b32fc0425b46624c39f5997c4a729828
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9a4c06d3-b134-4282-84aa-fb400cd6e4b4
Filesize982B
MD52e61af03385dfcf4703420bd0d6af6f4
SHA127d4ed4d41dae2fa1d3aec7c2949f6df605a9e5f
SHA256e2750c06c1477a092135a8322d9ccd47aab689f69a21436c4fd2dde126caf956
SHA5126ab7b9e06b3b976d78582fcb969b479edbe06d9cd05f2d219b09fe35ed9d36771aa5eb2218cef820447d51e53169a9bc7b792e34132fea8e1b09f15e0b91bf53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\f4741eb4-25f2-4f2a-b857-12f6ec5fa202
Filesize25KB
MD55ccea7f37121dd78e42c6450ec3f2d1a
SHA1cf31a5f71b5a51c397dd42cdbdbc034eeedfa145
SHA2569c52352626c9a44c98433a8502dfab781f5f8d7d082e0b4c21fa9f221e904715
SHA512d720030db3bb36f22d51d830449e3126effd92261d54b7d402d7f7214810fcdf952838a111035a43e7f4d3773e6f79524d186375bfed6c34cb9888b705b10427
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD529b03f5122fb974418f6829be76cbeaa
SHA16af8147b0f08f90b48bc3c7af286ab767256b902
SHA25606a39d8652b6f5ebb57aec8d62881cc73bac7be083228750aa75137c0532283b
SHA512edcc773eb6d7e5c420ece9810d7167837ce47e74bab69766e7f3db72d3bd02de0ad0e7a390a769eb386d962cadb069a66b9cb7fe248e43fc605fc1ee327c750b
-
Filesize
16KB
MD59d4db86f84652a7850daa8524baeadd5
SHA1ff98b88cba14ef2cf02abc6eceee595fd78344cd
SHA256765bb381d791fde36ef47949137f3829502edce08a3927c8bbd7c20dd853ad4a
SHA512ab860429bfa7d3506c047ea3023575e386634f3644180e72b799feff832ee689e6622eb4e37fb76f726c261ffe52e74921d1a9881703f5521c3b75d07d94e599
-
Filesize
10KB
MD5c3b0ada99a0aaaa4f3b1f80f6e6f549b
SHA1be0d6792efd2ee0ad01f7f2d673b803577497cf9
SHA256f5044dfce12650cf2e4eb85ad65c0d9fe7eb8c5464fe775fcc85362713ffcdeb
SHA51299fc5d1023cd994f7dd6c77858f9eb1acd4c911e094ce849861727a8a186d83453bcbbd3a775b9476cb47c26f7f7e7fe9a4b0f78707afede44cc04a7c843de0a
-
Filesize
12KB
MD5b0afa8581c35f63c086bb6013719567a
SHA166cbd7895326e90d1cc922f6db8d092349a04167
SHA25619cc7d3975e7ced470e5910512c89e71dd6be4a9130adc921914368ef97a15e5
SHA512658cb51b88b195f64913d5ce58f5c2d614fb760350f81f62e27063acecda00074db5da9722e9b822c88045db4fa092d72e044ab8e1244d7bb9f2db6ed3bdfded
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD59aacefc45c29a20ebc2f445dac841702
SHA1707041814ca85d3998e9ae6f4485c788bb79873d
SHA2560893ea385132d347e2d4f340089cb566a3584613c07b525f13aa02e9c61a2a0d
SHA512493cace4e583114a32e5b1cea07f0ac1f8f4ba822e236fab56af0b98bd9f7f6ea1880966b4881b2fad5e6bd0d37afe6c56bc14d280e535f778a544800ddb9388
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD53211d3c32c849ceaae8f2c88e4d7e5c2
SHA1f09246b417023719a19ef17083fc4c672255a3dc
SHA256b5f7262074f080176324f933f4555809000c5eec67f22bbf92e9ac3bb258b6be
SHA512ba20d74210f3a2a95169e6881b72a4deee4d17c6ef9f244ab5e363526a9b80e554b36f508547d4b335d8bbb328b220898f38012adcdd45d486d0538263ca55a4