Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe
Resource
win10v2004-20241007-en
General
-
Target
b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe
-
Size
1.8MB
-
MD5
f5c351937d75a2012675a7d4c3fdcde5
-
SHA1
02aab4705015708b03f8a8c7d1b920ae6607899e
-
SHA256
b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9
-
SHA512
1517add3d14aef90a93ecaeee2ec6fbd470a4a993b9144861a18fa534b0bcb8fbc4c575f7058b38e857810d8a36d90b6bd9f0c8351a46c062a53b6eb31008709
-
SSDEEP
49152:+B0ciGgXPzyz7SIjKx44Muii/AGw0OcRqHnas:K0cpzRKx6ui8PvXRqH
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
https://goalyfeastz.site/api
https://contemteny.site/api
https://dilemmadu.site/api
https://authorisev.site/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 88135b9434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 47e492f501.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 88135b9434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 47e492f501.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 47e492f501.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 47e492f501.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 47e492f501.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 88135b9434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 88135b9434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 88135b9434.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2228 created 3444 2228 Jurisdiction.pif 56 PID 2228 created 3444 2228 Jurisdiction.pif 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 222.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 535bd66d58.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6888c1230e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 34deb4d0d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b5ab76f19.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6888c1230e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 115d71a8db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88135b9434.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 115d71a8db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 47e492f501.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5368 chrome.exe 5112 chrome.exe 4536 chrome.exe 3904 chrome.exe -
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 535bd66d58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 222.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 222.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34deb4d0d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 88135b9434.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34deb4d0d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b5ab76f19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 115d71a8db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88135b9434.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6888c1230e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b5ab76f19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 535bd66d58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6888c1230e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 115d71a8db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 47e492f501.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6888c1230e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 115d71a8db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 47e492f501.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6888c1230e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 115d71a8db.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 34deb4d0d3.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation splwow64.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation FontCreator.tmp Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Updater.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Offnewhere.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation FontCreator.tmp Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Updater.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JavUmar.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url 97f3e3a782.exe -
Executes dropped EXE 49 IoCs
pid Process 2524 skotes.exe 1688 skotes.exe 2336 34deb4d0d3.exe 2640 axplong.exe 4880 stealc_default2.exe 212 Offnewhere.exe 520 8b5ab76f19.exe 2856 Gxtuum.exe 3352 splwow64.exe 4616 88135b9434.exe 2452 new_v8.exe 2228 Jurisdiction.pif 3896 97f3e3a782.exe 976 skotes.exe 4864 axplong.exe 848 FontCreator.exe 1320 Gxtuum.exe 1048 FontCreator.tmp 4928 FontCreator.exe 4092 FontCreator.tmp 3352 FontCreator.exe 4792 FontCreator.tmp 2800 535bd66d58.exe 2504 FontCreator.exe 1032 FontCreator.tmp 1336 GOLD1234.exe 3612 RDX123456.exe 2896 GOLD1234.exe 3004 222.exe 1632 JavUmar.exe 2288 Updater.exe 2936 yxrd0ob7.exe 4428 Updater.exe 4824 6888c1230e.exe 4508 6888c1230e.exe 740 115d71a8db.exe 4944 115d71a8db.exe 4940 yxrd0ob7.exe 3252 d1b2223e35.exe 4208 47e492f501.exe 5440 stail.exe 5476 stail.tmp 6096 blurayplayer32.exe 3532 skotes.exe 4312 axplong.exe 1744 Gxtuum.exe 2580 Updater.exe 5748 Updater.exe 5840 service123.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 535bd66d58.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 8b5ab76f19.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 88135b9434.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 222.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 6888c1230e.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 47e492f501.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 6888c1230e.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 115d71a8db.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 34deb4d0d3.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 115d71a8db.exe -
Loads dropped DLL 12 IoCs
pid Process 1048 FontCreator.tmp 1048 FontCreator.tmp 4092 FontCreator.tmp 4092 FontCreator.tmp 4792 FontCreator.tmp 4792 FontCreator.tmp 1032 FontCreator.tmp 1032 FontCreator.tmp 4880 stealc_default2.exe 4880 stealc_default2.exe 5476 stail.tmp 5840 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 47e492f501.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8b5ab76f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 88135b9434.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d1b2223e35.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003262001\\d1b2223e35.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\47e492f501.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003263001\\47e492f501.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8b5ab76f19.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001735001\\8b5ab76f19.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6888c1230e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001558001\\6888c1230e.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\115d71a8db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001559001\\115d71a8db.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6888c1230e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003260001\\6888c1230e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\115d71a8db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003261001\\115d71a8db.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023d46-1273.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 14 IoCs
pid Process 4116 tasklist.exe 4508 tasklist.exe 4764 tasklist.exe 752 tasklist.exe 3864 tasklist.exe 1072 tasklist.exe 2712 tasklist.exe 1116 tasklist.exe 932 tasklist.exe 896 tasklist.exe 824 tasklist.exe 848 tasklist.exe 1468 tasklist.exe 4864 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 2260 b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe 2524 skotes.exe 1688 skotes.exe 2336 34deb4d0d3.exe 2640 axplong.exe 520 8b5ab76f19.exe 4616 88135b9434.exe 976 skotes.exe 4864 axplong.exe 2800 535bd66d58.exe 3004 222.exe 4824 6888c1230e.exe 4508 6888c1230e.exe 740 115d71a8db.exe 4944 115d71a8db.exe 4208 47e492f501.exe 3532 skotes.exe 4312 axplong.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2524 set thread context of 1688 2524 skotes.exe 99 PID 1336 set thread context of 2896 1336 GOLD1234.exe 148 PID 3896 set thread context of 3004 3896 97f3e3a782.exe 214 PID 2936 set thread context of 4940 2936 yxrd0ob7.exe 221 PID 2580 set thread context of 5148 2580 Updater.exe 278 PID 5748 set thread context of 4708 5748 Updater.exe 279 -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\HomelessLaser splwow64.exe File opened for modification C:\Windows\EauOfficial splwow64.exe File created C:\Windows\Tasks\skotes.job b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe File created C:\Windows\Tasks\axplong.job 34deb4d0d3.exe File opened for modification C:\Windows\LuggageRepresentations splwow64.exe File opened for modification C:\Windows\AdditionsSalvation splwow64.exe File created C:\Windows\Tasks\Gxtuum.job Offnewhere.exe File opened for modification C:\Windows\SixCream splwow64.exe File opened for modification C:\Windows\ActuallyFtp splwow64.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023d02-1138.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 852 1336 WerFault.exe 145 3960 2896 WerFault.exe 148 724 3004 WerFault.exe 150 4332 3612 WerFault.exe 147 384 2936 WerFault.exe 180 4536 4940 WerFault.exe 221 5684 1632 WerFault.exe 170 5844 5148 WerFault.exe 278 1992 5148 WerFault.exe 278 3788 4708 WerFault.exe 279 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 535bd66d58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD1234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Offnewhere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDX123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1b2223e35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new_v8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxrd0ob7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxrd0ob7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD1234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavUmar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6888c1230e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 115d71a8db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b5ab76f19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6888c1230e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blurayplayer32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34deb4d0d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 115d71a8db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jurisdiction.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47e492f501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4784 cmd.exe 3492 PING.EXE 5752 cmd.exe 5384 PING.EXE -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JavUmar.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JavUmar.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4268 taskkill.exe 4556 taskkill.exe 3128 taskkill.exe 740 taskkill.exe 4744 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3492 PING.EXE 5384 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe 6092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe 2260 b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe 2524 skotes.exe 2524 skotes.exe 1688 skotes.exe 1688 skotes.exe 2336 34deb4d0d3.exe 2336 34deb4d0d3.exe 2640 axplong.exe 2640 axplong.exe 4880 stealc_default2.exe 4880 stealc_default2.exe 520 8b5ab76f19.exe 520 8b5ab76f19.exe 4616 88135b9434.exe 4616 88135b9434.exe 520 8b5ab76f19.exe 520 8b5ab76f19.exe 520 8b5ab76f19.exe 4616 88135b9434.exe 4616 88135b9434.exe 4616 88135b9434.exe 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 976 skotes.exe 976 skotes.exe 4864 axplong.exe 4864 axplong.exe 4092 FontCreator.tmp 4092 FontCreator.tmp -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 520 8b5ab76f19.exe Token: SeDebugPrivilege 4616 88135b9434.exe Token: SeDebugPrivilege 848 tasklist.exe Token: SeDebugPrivilege 752 tasklist.exe Token: SeDebugPrivilege 4116 tasklist.exe Token: SeDebugPrivilege 4508 tasklist.exe Token: SeDebugPrivilege 2712 tasklist.exe Token: SeDebugPrivilege 3896 97f3e3a782.exe Token: SeDebugPrivilege 1116 tasklist.exe Token: SeDebugPrivilege 932 tasklist.exe Token: SeDebugPrivilege 896 tasklist.exe Token: SeDebugPrivilege 824 tasklist.exe Token: SeDebugPrivilege 4764 tasklist.exe Token: SeDebugPrivilege 4864 tasklist.exe Token: SeDebugPrivilege 3864 tasklist.exe Token: SeDebugPrivilege 1072 tasklist.exe Token: SeDebugPrivilege 1468 tasklist.exe Token: SeDebugPrivilege 4268 taskkill.exe Token: SeDebugPrivilege 4556 taskkill.exe Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 740 taskkill.exe Token: SeDebugPrivilege 4744 taskkill.exe Token: SeDebugPrivilege 544 firefox.exe Token: SeDebugPrivilege 544 firefox.exe Token: SeDebugPrivilege 4208 47e492f501.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 4092 FontCreator.tmp 1032 FontCreator.tmp 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 5476 stail.tmp 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2228 Jurisdiction.pif 2228 Jurisdiction.pif 2228 Jurisdiction.pif 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 544 firefox.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe 3252 d1b2223e35.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 544 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2524 2260 b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe 87 PID 2260 wrote to memory of 2524 2260 b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe 87 PID 2260 wrote to memory of 2524 2260 b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe 87 PID 2524 wrote to memory of 2140 2524 skotes.exe 94 PID 2524 wrote to memory of 2140 2524 skotes.exe 94 PID 2524 wrote to memory of 2140 2524 skotes.exe 94 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 1688 2524 skotes.exe 99 PID 2524 wrote to memory of 2336 2524 skotes.exe 101 PID 2524 wrote to memory of 2336 2524 skotes.exe 101 PID 2524 wrote to memory of 2336 2524 skotes.exe 101 PID 2336 wrote to memory of 2640 2336 34deb4d0d3.exe 102 PID 2336 wrote to memory of 2640 2336 34deb4d0d3.exe 102 PID 2336 wrote to memory of 2640 2336 34deb4d0d3.exe 102 PID 2640 wrote to memory of 4880 2640 axplong.exe 103 PID 2640 wrote to memory of 4880 2640 axplong.exe 103 PID 2640 wrote to memory of 4880 2640 axplong.exe 103 PID 2640 wrote to memory of 212 2640 axplong.exe 104 PID 2640 wrote to memory of 212 2640 axplong.exe 104 PID 2640 wrote to memory of 212 2640 axplong.exe 104 PID 2524 wrote to memory of 520 2524 skotes.exe 105 PID 2524 wrote to memory of 520 2524 skotes.exe 105 PID 2524 wrote to memory of 520 2524 skotes.exe 105 PID 212 wrote to memory of 2856 212 Offnewhere.exe 106 PID 212 wrote to memory of 2856 212 Offnewhere.exe 106 PID 212 wrote to memory of 2856 212 Offnewhere.exe 106 PID 2640 wrote to memory of 3352 2640 axplong.exe 107 PID 2640 wrote to memory of 3352 2640 axplong.exe 107 PID 2640 wrote to memory of 3352 2640 axplong.exe 107 PID 2524 wrote to memory of 4616 2524 skotes.exe 108 PID 2524 wrote to memory of 4616 2524 skotes.exe 108 PID 2524 wrote to memory of 4616 2524 skotes.exe 108 PID 3352 wrote to memory of 2212 3352 splwow64.exe 109 PID 3352 wrote to memory of 2212 3352 splwow64.exe 109 PID 3352 wrote to memory of 2212 3352 splwow64.exe 109 PID 2212 wrote to memory of 848 2212 cmd.exe 111 PID 2212 wrote to memory of 848 2212 cmd.exe 111 PID 2212 wrote to memory of 848 2212 cmd.exe 111 PID 2212 wrote to memory of 3076 2212 cmd.exe 112 PID 2212 wrote to memory of 3076 2212 cmd.exe 112 PID 2212 wrote to memory of 3076 2212 cmd.exe 112 PID 2212 wrote to memory of 752 2212 cmd.exe 113 PID 2212 wrote to memory of 752 2212 cmd.exe 113 PID 2212 wrote to memory of 752 2212 cmd.exe 113 PID 2212 wrote to memory of 1776 2212 cmd.exe 114 PID 2212 wrote to memory of 1776 2212 cmd.exe 114 PID 2212 wrote to memory of 1776 2212 cmd.exe 114 PID 2212 wrote to memory of 1412 2212 cmd.exe 116 PID 2212 wrote to memory of 1412 2212 cmd.exe 116 PID 2212 wrote to memory of 1412 2212 cmd.exe 116 PID 2212 wrote to memory of 4780 2212 cmd.exe 117 PID 2212 wrote to memory of 4780 2212 cmd.exe 117 PID 2212 wrote to memory of 4780 2212 cmd.exe 117 PID 2640 wrote to memory of 2452 2640 axplong.exe 118 PID 2640 wrote to memory of 2452 2640 axplong.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe"C:\Users\Admin\AppData\Local\Temp\b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\1001698001\34deb4d0d3.exe"C:\Users\Admin\AppData\Local\Temp\1001698001\34deb4d0d3.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\10000020101\JavUmar.exe"C:\Users\Admin\AppData\Local\Temp\10000020101\JavUmar.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"9⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff95259cc40,0x7ff95259cc4c,0x7ff95259cc5810⤵PID:5400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:210⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:310⤵PID:5724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:810⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:110⤵
- Uses browser remote debugging
PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:110⤵
- Uses browser remote debugging
PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3472,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:110⤵
- Uses browser remote debugging
PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4544,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:810⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4680,i,12698440708688924988,3706864032836970792,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:810⤵PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:6092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 7689⤵
- Program crash
PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000061101\stail.exe"C:\Users\Admin\AppData\Local\Temp\10000061101\stail.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5440 -
C:\Users\Admin\AppData\Local\Temp\is-C6607.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-C6607.tmp\stail.tmp" /SL5="$E0114,5239339,56832,C:\Users\Admin\AppData\Local\Temp\10000061101\stail.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:5476 -
C:\Users\Admin\AppData\Local\BluRay Player 1.2.16\blurayplayer32.exe"C:\Users\Admin\AppData\Local\BluRay Player 1.2.16\blurayplayer32.exe" -i10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6096
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1970368⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv8⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T8⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pifJurisdiction.pif T8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2228
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\1000833001\97f3e3a782.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\97f3e3a782.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:4480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000857001\535bd66d58.exe"C:\Users\Admin\AppData\Local\Temp\1000857001\535bd66d58.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 12848⤵
- Program crash
PID:3960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 2647⤵
- Program crash
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 12607⤵
- Program crash
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\yxrd0ob7.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\yxrd0ob7.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\1001527001\yxrd0ob7.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\yxrd0ob7.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 12408⤵
- Program crash
PID:4536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2527⤵
- Program crash
PID:384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001558001\6888c1230e.exe"C:\Users\Admin\AppData\Local\Temp\1001558001\6888c1230e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\1001559001\115d71a8db.exe"C:\Users\Admin\AppData\Local\Temp\1001559001\115d71a8db.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001735001\8b5ab76f19.exe"C:\Users\Admin\AppData\Local\Temp\1001735001\8b5ab76f19.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\1001776101\88135b9434.exe"C:\Users\Admin\AppData\Local\Temp\1001776101\88135b9434.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:848 -
C:\Users\Admin\AppData\Local\Temp\is-PIEL3.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-PIEL3.tmp\FontCreator.tmp" /SL5="$1601F2,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe" /VERYSILENT6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\is-HF1A2.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-HF1A2.tmp\FontCreator.tmp" /SL5="$1701F2,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4092 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"8⤵PID:1848
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"9⤵PID:1564
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"8⤵PID:1912
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"9⤵PID:4524
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"8⤵PID:1072
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"9⤵PID:944
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"8⤵PID:1740
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"9⤵PID:4132
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"8⤵PID:4824
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"9⤵PID:1404
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"8⤵PID:3368
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"9⤵PID:4300
-
-
-
C:\Users\Admin\AppData\Local\hangbird\Updater.exe"C:\Users\Admin\AppData\Local\hangbird\\Updater.exe" "C:\Users\Admin\AppData\Local\hangbird\\caliculus.csv"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\iaeaqn9.a3x && del C:\ProgramData\\iaeaqn9.a3x9⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4784 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.110⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3492
-
-
C:\Users\Admin\AppData\Local\hangbird\Updater.exeupdater.exe C:\ProgramData\\iaeaqn9.a3x10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe11⤵
- System Location Discovery: System Language Discovery
PID:5148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5148 -s 122412⤵
- Program crash
PID:5844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5148 -s 119212⤵
- Program crash
PID:1992
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\is-4CH29.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-4CH29.tmp\FontCreator.tmp" /SL5="$30254,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe" /VERYSILENT6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\is-3M3S3.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-3M3S3.tmp\FontCreator.tmp" /SL5="$40254,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1032 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"8⤵PID:2452
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"9⤵PID:3124
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"8⤵PID:4380
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"9⤵PID:2020
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"8⤵PID:4812
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"9⤵PID:4008
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"8⤵PID:4732
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"9⤵PID:4988
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"8⤵PID:3924
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"9⤵PID:1204
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"8⤵PID:4000
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"9⤵PID:1116
-
-
-
C:\Users\Admin\AppData\Local\hangbird\Updater.exe"C:\Users\Admin\AppData\Local\hangbird\\Updater.exe" "C:\Users\Admin\AppData\Local\hangbird\\caliculus.csv"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\ALPHjXTc.a3x && del C:\ProgramData\\ALPHjXTc.a3x9⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5752 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.110⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5384
-
-
C:\Users\Admin\AppData\Local\hangbird\Updater.exeupdater.exe C:\ProgramData\\ALPHjXTc.a3x10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe11⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 119612⤵
- Program crash
PID:3788
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003238001\222.exe"C:\Users\Admin\AppData\Local\Temp\1003238001\222.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 14885⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003260001\6888c1230e.exe"C:\Users\Admin\AppData\Local\Temp\1003260001\6888c1230e.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\1003261001\115d71a8db.exe"C:\Users\Admin\AppData\Local\Temp\1003261001\115d71a8db.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\1003262001\d1b2223e35.exe"C:\Users\Admin\AppData\Local\Temp\1003262001\d1b2223e35.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3252 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:1992
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e32e70b-94b4-46b4-85a7-228545d4bd27} 544 "\\.\pipe\gecko-crash-server-pipe.544" gpu7⤵PID:3696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d82c537c-7923-43e7-b3b5-2d4220a08795} 544 "\\.\pipe\gecko-crash-server-pipe.544" socket7⤵PID:1952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2692 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 2908 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f74d92cf-41c3-486a-ba48-ceaf340a732a} 544 "\\.\pipe\gecko-crash-server-pipe.544" tab7⤵PID:4412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3832 -childID 2 -isForBrowser -prefsHandle 3836 -prefMapHandle 3168 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36d560b4-86ff-4905-a16d-a2beb4a54153} 544 "\\.\pipe\gecko-crash-server-pipe.544" tab7⤵PID:2172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4480 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4472 -prefMapHandle 4468 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3b1f92f-dcc3-4368-bd74-accee2c37153} 544 "\\.\pipe\gecko-crash-server-pipe.544" utility7⤵
- Checks processor information in registry
PID:5896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5244 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5252 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18dc94f7-09f5-4ec4-b29b-ab8b738dbfca} 544 "\\.\pipe\gecko-crash-server-pipe.544" tab7⤵PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 4 -isForBrowser -prefsHandle 5452 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f505a75-0f14-4134-98fa-5e4a92b3cecb} 544 "\\.\pipe\gecko-crash-server-pipe.544" tab7⤵PID:5536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5752 -prefMapHandle 5748 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d4aca21-d4ec-41f6-8856-00589b2fcddc} 544 "\\.\pipe\gecko-crash-server-pipe.544" tab7⤵PID:5548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003263001\47e492f501.exe"C:\Users\Admin\AppData\Local\Temp\1003263001\47e492f501.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:976
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1336 -ip 13361⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2896 -ip 28961⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3004 -ip 30041⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3612 -ip 36121⤵PID:1720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2936 -ip 29361⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4940 -ip 49401⤵PID:2960
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3532
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4312
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1632 -ip 16321⤵PID:5704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5148 -ip 51481⤵PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5148 -ip 51481⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4708 -ip 47081⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD526e02e7b8ab2ecd227b08621ee1b909e
SHA153843f7acd46a1f097bc6a6add5ed9fe29c21a20
SHA256ea191a536763ccdb899b0ad95a0c50bc894d7e245c35ea1f12a9cd4e1f4da1df
SHA512998d7ec00deaf0eb618edaba0aef6fdee0af9c679028a257c0528e7b1ed5fc273136a482ab43907cfcf71a0e6ad5187529a601d6c1aeccf9ba6db841697fb231
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5c8a88dfd731570564be245380275944c
SHA174d85c97a6fd855ab35904dd47623ba3e11002c6
SHA2569c3e0504726d21dc76a265e5de43353c8456010f376e5e218aff29b11c7c1ace
SHA512373415bc78917bbd7626d78232718da7c8fcde7eede43e357c118b8359b4bfcff6be493ce13a436447c5106c94ed4285e33d809552ac928057dabbdebf713724
-
Filesize
6.4MB
MD5331990a29afa36193295a7b63ea4e712
SHA15bd7935dccb305cad7c1f2026b8f6629eb2e61e4
SHA25680c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487
SHA512b7ce03289ec5339fcbe116538734ada73763fa18a42b3c95f63106bd0f85dc60111fc555eb6b5d6950d5b1fdd65f26cd4f5450bf82d330059d8184fafd52b4f2
-
Filesize
5.3MB
MD5dcf45a3386d6e8a1efa6b2040125c3ca
SHA16a7e356507bd3777b6cd9677627e31ce6be7d9cf
SHA256e709b26315714057ce041823f8a63f38064790a4a2af8fa00a9b63ea19d82329
SHA512c32ecdc9ec8aaab6c1fd12eff22e83b74f9300e66d9cdfce1f1cf182a944e54a9f4e1a3ee6508aadc7927691760faa89591da6ba8b4298e5eb5cd513bdad6ae8
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
1.2MB
MD55d97c2475c8a4d52e140ef4650d1028b
SHA1da20d0a43d6f8db44ff8212875a7e0f7bb223223
SHA256f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf
SHA51222c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee
-
Filesize
5.7MB
MD55009b1ef6619eca039925510d4fd51a1
SHA122626aa57e21291a995615f9f6bba083d8706764
SHA256fbc8c32bf799a005c57540a2e85dd3662ed5795a55f11495f0ba569bbb09df59
SHA5122b5bbd9449be00588058966db487c0adfac764827a6691f6a9fc6c3a770a93bda11c732d2eb2a3c660697cbc69b1c71a2bf76d2957f65cd2599fb28098b24f14
-
Filesize
514KB
MD526d8d52bac8f4615861f39e118efa28d
SHA1efd5a7ccd128ffe280af75ec8b3e465c989d9e35
SHA2568521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f
SHA5121911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733
-
Filesize
2.9MB
MD5296b2f9630b608ee9ae21c5df5faa1e0
SHA152093bc422addafb3f7b7f78a9b63e55c4cba174
SHA256fdace9dbae9a6ea420ecc8ffd84031e7a02ed13f4fdfbd4d338d43cec9a4767d
SHA5126924522c1a76862e599d3a7f5ba5597204df0bac8bfe26d17f12dc51707a5f1faa6e8fbf2ff37bb99f0ac9aa3e075288c1604a8bc0b9e34247e6b743bec5790f
-
Filesize
645KB
MD5bdf3c509a0751d1697ba1b1b294fd579
SHA13a3457e5a8b41ed6f42b3197cff53c8ec50b4db2
SHA256d3948ae31c42fcba5d9199e758d145ff74dad978c80179afb3148604c254be6d
SHA512aa81ccbae9f622531003f1737d22872ae909b28359dfb94813a39d74bde757141d7543681793102a1dc3dcaecea27cffd0363de8bbb48434fcf8b6dafef320b3
-
Filesize
327KB
MD5fba8f56206955304b2a6207d9f5e8032
SHA1f84cbcc3e34f4d2c8fea97c2562f937e1e20fe28
SHA25611227ead147b4154c7bd21b75d7f130b498c9ad9b520ca1814c5d6a688c89b1b
SHA51256e3a0823a7abe08e1c9918d8fa32c574208b462b423ab6bde03345c654b75785fdc3180580c0d55280644b3a9574983e925f2125c2d340cf5e96b98237e99fa
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
-
Filesize
731KB
MD598d80ccce4381776207b8a09f7cf0c11
SHA1d5d98427cfd1108ceb60354f5d2bbb0c564eda93
SHA256963a20f6631013a1c9b0f17a3d15ed9546dae5b5f347789dbde36d02a51ee3de
SHA512ee6ab1686b48565a10bed17451d37273234f6c55c2e2b990521547453a09d27574077a7c88f9750d83dd9b6b51c109248f67b3d4c0f662ed9c9a63806f02d1ee
-
Filesize
2.0MB
MD5085a80e000927c8630f0c850e1b4371e
SHA11f56af38f6f4c1233ab9ebda8657888b8b1c339d
SHA256b58b167e871b1b7d45c597b883fd34e0269f11287249f9ccb393bb51f963909c
SHA512daa396f21d45a04e3b2471b58f0c94b71deacaabf978831783512a2d61204b43cf0e766fa5de35a5c304e74e5ead0176846c3dee4ebf1412e0a6ed5be23a9eb8
-
Filesize
1.8MB
MD57d5922a20915f89d9428ff50b879eeaf
SHA17619841446fba5b189422f4c17a6cd2acb8b3cd2
SHA256703978b1393b365c1938e5115280c77e9fee8323c66f9cd71644f3f1c2e7a159
SHA512b63f445d1923e4b689d385d2539515622642e225949f6c3ce7f5a17a9a7157b8becc036a0d0a378fb9b81bbd3566845cf818522b34acf1ecaed31f3147283ae5
-
Filesize
2.7MB
MD5b811664c759cbb95fc340415c2a70d16
SHA13a3b322c65ea24cf4eae3e9741f5fac080ed868e
SHA256998aa0c5353e3c8ce62030da71811aa18efb90c5553717608971b84a5a7b00d0
SHA51222260807677941b2230eb0ea1c9c9c37bded0407e0c53f6a912612afcbafaf018bc9884e549b752cda724b7c7c8db60fd4f32cdc3699fb8ca9c5db1e81a55345
-
Filesize
5.9MB
MD56fdf2cdf68ab1880aa76e7938e241fa3
SHA1affc9a0aea771ad101357cc728951f5938b5e4e6
SHA256e61ce90df13402909985f5312fdef798736eb10e0b5b6b280fb826538e7a597a
SHA5127e649db70d39a135cd86a837308fb304f16c904456ca3b97a70b8f8b1fd617291de8974aab3808ac67e5d2f7e9efa3840bbdeba1e3558de33587c7ff94ce231d
-
Filesize
2.9MB
MD5e470e1efdf057bf0cb67f5f8e7d146f5
SHA19c1db682706e84bc5c62eb94ba286d040d21bd16
SHA256cb15ac6b923950cc436643ca20417973952a9bee1c80d1c0f1bd9c564bd55b0a
SHA51249eaafe4840d8244aab845e762e1027cb32130c7b3f8891c259512429ba1fff69fe27a94fc604f9d4bf01d17e05ab6bad91cfe46476c175034d7b4d40b968220
-
Filesize
2.9MB
MD5eb775b44f7010dbc2749b3c54ae6c88b
SHA134c253a0f3c5f0b358ebf87dede93b863b7a452d
SHA2560d1af38dfe71f73f6f27771ebd8fba5298732792b12c447e756cc657e3242bf7
SHA512f74ee9c90cf460c0108092e1b0cd919a57ed9d13e3007506f81648e34e5b249dffce609d8bef1a1046052dc3cd036bb4e9d1ea38d42e09a82cdf98b728fc9304
-
Filesize
898KB
MD55067d6e5026cf991ab47a1c144c0995a
SHA1578a5bfc864dc524e793cda6e77c6a9ac0e3d221
SHA256ca07b9e893e6cdb1babd38f92cba2a804effe23839dacdd1998596fda4fff141
SHA51271349f7f8a6754550920d96d5aa58974fe65746be7b1a1e36e9b0e08cf0d43dd8c23cc0a2db43bf915db2ab21532977c1b9441fe6f08127a46e484f9dd15eb60
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
580KB
MD54b0812fabc1ba34d8d45d28180f6c75f
SHA1b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950
SHA25673312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103
SHA5127f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158
-
Filesize
87KB
MD56905f3837ba5a07ff038d01ca9368478
SHA1b8ab8ffef4f1e448448fab8d5ab24bdb876ca737
SHA2563701018961bdbd0a6e4fa856571197f549d1b6f71eb611dcb7d49e8525d3c74e
SHA5121f145aa7f92f2b48127744acb567a8244c700939917b451674250332738b99ea78beb81c9c2100e2dc24a7246c9b4ad87f90ba85bfbb91cec5a22cae49c19e64
-
Filesize
24KB
MD52a84a77ad125a30e442d57c63c18e00e
SHA168567ee0d279087a12374c10a8b7981f401b20b8
SHA2560c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769
SHA5129d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a
-
Filesize
62KB
MD546a51002cdbe912d860ce08c83c0376b
SHA16d0ae63850bd8d5c86e45cba938609a7f051f59b
SHA25618070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017
SHA512ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44
-
Filesize
69KB
MD58ca4bbb4e4ddf045ff547cb2d438615c
SHA13e2fc0fdc0359a08c7782f44a5ccebf3a52b5152
SHA2564e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed
SHA512b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9
-
Filesize
7KB
MD5f3d7abb7a7c91203886dd0f2df4fc0d6
SHA160ffbb095fceeb2ea2b9e65355e9dbf1de736d6c
SHA2565867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3
SHA5129af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367
-
Filesize
58KB
MD584c831b7996dfc78c7e4902ad97e8179
SHA1739c580a19561b6cde4432a002a502bea9f32754
SHA2561ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575
SHA512ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991
-
Filesize
80KB
MD50814e2558c8e63169d393fac20c668f9
SHA152e8b77554cc098410408668e3d4f127fa02d8bd
SHA256cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d
SHA51280e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319
-
Filesize
71KB
MD56785e2e985143a33c5c3557788f12a2b
SHA17a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0
SHA25666bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7
SHA5123edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91
-
Filesize
865KB
MD56cee6bd1b0b8230a1c792a0e8f72f7eb
SHA166a7d26ed56924f31e681c1af47d6978d1d6e4e8
SHA25608ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab
SHA5124d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193
-
Filesize
95KB
MD5ba8c4239470d59c50a35a25b7950187f
SHA1855a8f85182dd03f79787147b73ae5ed61fb8d7b
SHA256a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b
SHA5121e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0
-
Filesize
92KB
MD52759c67bccd900a1689d627f38f0a635
SHA1d71b170715ed2b304167545af2bd42834ccf1881
SHA256510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05
SHA512aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e
-
Filesize
53KB
MD579156afddd310be36f037a8f0708a794
SHA109ef36ae22b5eab65d1f62166542601b8919399d
SHA2567faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503
SHA512d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01
-
Filesize
1.8MB
MD5f5c351937d75a2012675a7d4c3fdcde5
SHA102aab4705015708b03f8a8c7d1b920ae6607899e
SHA256b61d94fc68b720d98ad25cfc2be2fd1d5ba40a4cc63bd75094eb0f5f239dbde9
SHA5121517add3d14aef90a93ecaeee2ec6fbd470a4a993b9144861a18fa534b0bcb8fbc4c575f7058b38e857810d8a36d90b6bd9f0c8351a46c062a53b6eb31008709
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
3.2MB
MD5945ec37b9971c5e9f26fafad6edfd46e
SHA135aeeedfab069194aa41f64df0e96780c30837b4
SHA256c2e55aa7241dde41ed9690bd369e62a49d78ad2662c500509ff88ff8342a487f
SHA512283f3e98def0b0f249c5b7cb1d6c0deb6fe922d3d4a68edf180e791a96f7c18c678e7b4848b5fb03b6c25038be9850b815b426674a93ea410c430cb261a3f226
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
61KB
MD5025c4f4147cdf2a529aba92b249a86aa
SHA1a83259f31f6e78acb9f01eb5880c72dd9ce435e7
SHA2565620e7c13f5c8b19c02fb1c1c27eceeb88fea23598411704563c3129093b862d
SHA5126a2f4443700e0ab26247c923287ac2a78cbb032457398951877f75d1cdfbcc1f417833d083dccc37e2d772b0dc36cda3e71ec41f0ddc451aecc6bafc15157419
-
Filesize
498KB
MD5bd2302f160b9895dd7bcf9c7dfa9bea7
SHA18fcb264280a30cc5f959d54ae75ae394054ca5a0
SHA2563eaff063360a89395b52681248a64aa2a8acca6da13eaa0194db004fa2a612c0
SHA5122847c9e4233a5f5a662027d46ee04eb4d79ad937fbdddc54b16e72547e34414094ff56bc08016fcf31ba5769cfca2d7849ad3edea438c57b34402f1e105852e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize7KB
MD50c86775788761b03eb75a6ad825bb440
SHA150c28cd6f16dcbb62213bc77c761621e29931daf
SHA256a0675dd4d47cfe395cd248b50320abc84a5589ede9eef09eb2dad3acfab42fe5
SHA512c238802572c631549c133fe61eebc4546c908caca6de60f790f45577e28010bef2a03ba3d55b477da13cea9a493558b11e9f3641ebebabbb56488c0d328a87e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD566f4c183b140897158854e5be7f2db3c
SHA1ebe9e0bcd37f8e81cb80c9a777a9977094e90def
SHA2564ccd4b7387cfd7374381140cbd022aebda172214532d988f1668b4aeac943e4d
SHA512f1a76867dff6cfebf5a1b0a8b65e03fb901feb507f8bca28553884a3026805cd2511e6f38cf6d523657f43c2bc0068725c30cf233452a3a27657ac0c71711f7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD530dd94ae2b26797d64d0a072b1771a66
SHA1e8ac83872e9058e6b8ebb34b82a6a4a969d6e059
SHA2569fdef32d6ca0e79b6f4ed5a74ccc877106cced2a5007db408137f3f5b35821c5
SHA5123c4827834ea6766e0f45d8ab782b42d571f0eb6f286960d1414d5dd3c79c5531d857b967641f33f5ab95c7254992ab0eb0d480c300685f6b4d540a679c5629cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51421a9ed880632dc1ffffa3e4ccd6d76
SHA1909705be13f41ee46754589829e603e703c5cb42
SHA25607c531fd4b42ac0d4f2ca98a66396df869fe4faae25ee8a411338a086d38b7a7
SHA5129026097cef9f0a0e82e04a567ce0937ec2c1e915ba427fd674aabfc111bda34e3d1c1c2a6d6ae7d6b821bbc5944df0e5e67554b86ad3be12bf9aae841e53ab9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD507919964c31da622124c1eb4fafead3a
SHA101064cbbd3733f9703cc9f775483b2452aefd2a7
SHA25669a225daf2d1403bec6088c12e58b4c1b1caf8e0e3d5e2e4acda34dbd2a99c4c
SHA512b2cbe9580afb8c4776e6abcb34997226a153c5676ba05e3932480b48d2d900d965c4e68b188a85c4dac72ba103f223009950c067252e890a397786e2dcfff2ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD520c3691d958d8ddd680fcdb9825026f5
SHA1098205d57e1139db3b677b3efb6527982dc256f8
SHA25609bef9de24e6455319d2944900a0de430a6d33b6cfd38a40f8d51694f4b7dd7c
SHA512114ee251929826c32bc2f7374a4b9ebb96de1e284c53f5571a1fab719e6e5ba8f276b5b431de2c76cdb17966b143baa430157bc739220413efca3921c14d04d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5448fbecd5f1fda4455c39c456d986c32
SHA1324e41ca5bc8c55dbe3372acf3ef18e664a2ba6c
SHA25692af443c4cf62f10dfb65ca5dc8c3a6370d418d39f9b58ffe908ab15a84c4933
SHA51202ef19e8e757606f25751602cb3ecaaeff33559a74e390ac6ceb31f1c1b6bd3dbe6ee26f5fb1fbcd37042bf6ab9304451687802014f3c08c81bae678f5442e0f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\144e10ec-053b-4923-a686-56017e8f721c
Filesize25KB
MD538e0c9bc775e362fffa357d6668204b7
SHA13cecf7a6e4b7672932800648f101f45164aa454a
SHA256107cb9a433098716780ab4d6e22518bf53511c1937749dab6a14d058ce6e24b8
SHA512331a2f205d887d78f9911ae785fe04fca93a5e5f9fdcf184cfd35a0892860bee733196f41b1cfc64af7a9b487a67ac932e6afb3e1f67304f7220a7521473ffec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\199d72b9-09d4-4d1e-b2b9-d42165f6d8df
Filesize982B
MD502332a3fb685cee237d21efcb45408ec
SHA193977eab998eaad897ffbfd153680cb73a690293
SHA2565ed3a649930385c803d2ccc92435fe5b49e556451ec7172b40ec48826efe46ae
SHA512a59cd4962729e814582f4baac21e4fc647cea5b45b65c5f7698bc20e1a2b31653b61d09036e8941bf154ca03efaae4e44703d3be91f2984ca474af033887b9d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\fcfbfcd1-4012-470c-b09e-e32cfae88b07
Filesize671B
MD5ca832c340b7904f63d41e09a7a71b492
SHA17344a98fc26e40da743d1f98657ee764373378db
SHA2564c82f6a5bd9fb8796935fb5b940a2b657647fc51e31920092d117b8f3a01f597
SHA51226443d81431c4eb3eabde4d29b378a6a46f8bdeb4def18038880cc5efc3a4155d6a32d3a1af32bb827accb4b2ff48253d9ad8a1ce3796844b17af27a1cc78788
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5b28ea49a46931c57a7503fd720839fdf
SHA1b89816c093e882d27edbc9b915f6a41c296f8b6e
SHA256bedc69bffca7329c556a75f15de61192ed4eab01d2a48be24a0173939bf27732
SHA51291232304512a8cd6d146060ac4ba49d481cd3d2a2d7585f6f897224c7b0a6b3ea56bea23325e14e1f25608a1d7970cdb5c8a79fae14319899ca441bb0388bcdd
-
Filesize
15KB
MD50674abb7b3e0681036a40aa88ce2ba4b
SHA1cad3fe23061f44cd9cae59b7d36284168ccccf56
SHA256cdbdb79e04fd5d0481332d1667b3580f58fe30385f3003dd072d5e9c42b65878
SHA5129252c101e71bffc3bbd4d3c58bdcf6e6c52d0e55546dad32d2479069ee8a0666bc51087ad6166a5d8633fbebeb7bcf5961c24500824fc1891e9f9d1312d14836
-
Filesize
10KB
MD59afacdde1bfc5e0313fbf2def97e2479
SHA103686cc4ddb5f70e7e53c99ccde71f91235887d9
SHA256cd3a9b3a2979318e49626286b48f2b193b2d5dc8b24d28968a26cd86b78480b9
SHA51260479ae98f31541db8548aa40f5792746a3d0edf8a1c645d774218d192937ab9ab4b49793c70c0632fc1adf7a03313fbf171f373d351a8df73cf489d24c3a05d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD5c39313381ef69f51ac29a9d86350fcf4
SHA1f30800164fc4a636dd347e18028fd2f0331291d2
SHA256e8dff8a4129d7bac59b7ba651049eb404e0d4ba8ab9d245cb1192c25f7aad1fe
SHA512ae1a55a39238759e6ec67bbae3a906c9b2dc116befd3712a9c60355d57a70c42f5047740ea76629a294b126cc6c9036385936bc3c4f73509272486ff16009fe7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD57c6e9637e0cc395f9796f1f4ffb41cb5
SHA1face6a8020abe285d9c3e9a005522a33f7432d72
SHA256a2192e98061f8c34a212b79c91fef6b4f9c1bcb878e8676cdefa6db472b44922
SHA5120813f33ded3d9dbee56ad2dbce7d83eba5148d5dbc581e34ff77fc1f8539e95e559696bf20868b8765740d6d924f6d6d9aee5548c3f24cc16595dd7008ee043f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD5bfc5ba6cd63c02b386376606a4c9d8c8
SHA1ea04d966a95701784eb5886bb216b32e8c18e5b5
SHA25649cfd74189dcec1b21f15a6cda1c5f31a87dae96901ef4f22c193908fdeab4e7
SHA51242c4240bed2d43541d669e2d053ae6d6dabd33dad28e0c2bdaa858b7894beb08767f2097847abe80871a8ebffa7d1031679e05dd1a7ca2c0cffdb84262cdddd5