Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
436ec8e845cbb9bcd7098b37be1c0610
-
SHA1
5149fff99b5fef0018f704566908816d838c064c
-
SHA256
e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65
-
SHA512
7df98128ab269db1bef8e802f130d3d426133ea72a34f24bb299ec2980f373e7d6f4884d2b296d6633bf5ea82a716c37a8c55a494a9fc8e42f6d798896eac4b3
-
SSDEEP
49152:hHxYCcMZJv29KMiwObbQZwOU5X1kR/AEFktM:hHxYWPUi7vQHUxgEM
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
amadey
5.03
7c4393
http://185.215.113.217
-
install_dir
f9c76c1660
-
install_file
corept.exe
-
strings_key
9808a67f01d2f0720518035acbde7521
-
url_paths
/CoreOPT/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
https://goalyfeastz.site/api
https://contemteny.site/api
https://dilemmadu.site/api
https://authorisev.site/api
https://computeryrati.site/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/3708-1723-0x0000000000170000-0x0000000000470000-memory.dmp family_vidar_v7 behavioral2/memory/3708-1724-0x0000000000170000-0x0000000000470000-memory.dmp family_vidar_v7 behavioral2/memory/3708-1725-0x0000000000170000-0x0000000000470000-memory.dmp family_vidar_v7 behavioral2/memory/3708-1740-0x0000000000170000-0x0000000000470000-memory.dmp family_vidar_v7 behavioral2/memory/3708-1741-0x0000000000170000-0x0000000000470000-memory.dmp family_vidar_v7 -
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 552 created 3540 552 Jurisdiction.pif 56 PID 552 created 3540 552 Jurisdiction.pif 56 PID 3708 created 3540 3708 Plates.pif 56 PID 3708 created 3540 3708 Plates.pif 56 PID 5864 created 3540 5864 BFCFBKKKFH.exe 56 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd83ad61c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe74ccde57.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f822e3f070.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4736 chrome.exe 5224 msedge.exe 5416 msedge.exe 5872 msedge.exe 5856 msedge.exe 5268 msedge.exe 4560 chrome.exe 3520 chrome.exe 4772 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe74ccde57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe74ccde57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd83ad61c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd83ad61c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f822e3f070.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f822e3f070.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 0b44ippu.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation v7wa24td.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Plates.pif Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation splwow64.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url 891d745351.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe -
Executes dropped EXE 25 IoCs
pid Process 2424 axplong.exe 3644 stealc_default2.exe 4336 Offnewhere.exe 4220 splwow64.exe 3644 new_v8.exe 4604 891d745351.exe 552 Jurisdiction.pif 2840 fe74ccde57.exe 3584 GOLD1234.exe 3220 RDX123456.exe 3132 GOLD1234.exe 1640 GOLD1234.exe 1976 GOLD1234.exe 3020 shop.exe 2768 shop.exe 2800 0b44ippu.exe 4764 axplong.exe 4644 f822e3f070.exe 3708 Plates.pif 2100 bd83ad61c9.exe 2636 v7wa24td.exe 3732 tor-real.exe 5372 axplong.exe 5864 BFCFBKKKFH.exe 5704 FCFBFBFBKF.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine f822e3f070.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine bd83ad61c9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine fe74ccde57.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe -
Loads dropped DLL 14 IoCs
pid Process 3644 stealc_default2.exe 3644 stealc_default2.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3732 tor-real.exe 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f822e3f070.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001508001\\f822e3f070.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bd83ad61c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001509001\\bd83ad61c9.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 143 ip-api.com -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3040 tasklist.exe 952 tasklist.exe 2308 tasklist.exe 3160 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1668 file.exe 2424 axplong.exe 2840 fe74ccde57.exe 4764 axplong.exe 4644 f822e3f070.exe 2100 bd83ad61c9.exe 5372 axplong.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3584 set thread context of 1976 3584 GOLD1234.exe 134 PID 3020 set thread context of 2768 3020 shop.exe 145 PID 4604 set thread context of 3704 4604 891d745351.exe 155 PID 5864 set thread context of 6288 5864 BFCFBKKKFH.exe 248 PID 5704 set thread context of 6744 5704 FCFBFBFBKF.exe 250 -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\LuggageRepresentations splwow64.exe File opened for modification C:\Windows\AdditionsSalvation splwow64.exe File opened for modification C:\Windows\HomelessLaser splwow64.exe File opened for modification C:\Windows\BookmarkRolling 0b44ippu.exe File opened for modification C:\Windows\HimselfConsumption 0b44ippu.exe File created C:\Windows\Tasks\axplong.job file.exe File opened for modification C:\Windows\SixCream splwow64.exe File opened for modification C:\Windows\ActuallyFtp splwow64.exe File opened for modification C:\Windows\EauOfficial splwow64.exe File opened for modification C:\Windows\SanyoToday 0b44ippu.exe File opened for modification C:\Windows\DeletedWilliam 0b44ippu.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x000400000001da4f-88.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 4548 3584 WerFault.exe 128 2320 1976 WerFault.exe 134 4484 1976 WerFault.exe 134 4292 3020 WerFault.exe 139 1152 3220 WerFault.exe 130 1244 2768 WerFault.exe 145 6796 5704 WerFault.exe 243 -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD1234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tor-real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Offnewhere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jurisdiction.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD1234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd83ad61c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f822e3f070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new_v8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FCFBFBFBKF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b44ippu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plates.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDX123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe74ccde57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BFCFBKKKFH.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1524 cmd.exe 960 netsh.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Plates.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Plates.pif Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3908 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133749350808253711" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1288 schtasks.exe 4076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 file.exe 1668 file.exe 2424 axplong.exe 2424 axplong.exe 3644 stealc_default2.exe 3644 stealc_default2.exe 3644 stealc_default2.exe 3644 stealc_default2.exe 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 2840 fe74ccde57.exe 2840 fe74ccde57.exe 4764 axplong.exe 4764 axplong.exe 4644 f822e3f070.exe 4644 f822e3f070.exe 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 3040 tasklist.exe Token: SeDebugPrivilege 952 tasklist.exe Token: SeDebugPrivilege 4604 891d745351.exe Token: SeDebugPrivilege 2308 tasklist.exe Token: SeDebugPrivilege 3160 tasklist.exe Token: SeDebugPrivilege 2636 v7wa24td.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeDebugPrivilege 5864 BFCFBKKKFH.exe Token: SeDebugPrivilege 5864 BFCFBKKKFH.exe Token: SeDebugPrivilege 6288 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 1668 file.exe 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe 5416 msedge.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 552 Jurisdiction.pif 552 Jurisdiction.pif 552 Jurisdiction.pif 3708 Plates.pif 3708 Plates.pif 3708 Plates.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2636 v7wa24td.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2424 1668 file.exe 87 PID 1668 wrote to memory of 2424 1668 file.exe 87 PID 1668 wrote to memory of 2424 1668 file.exe 87 PID 2424 wrote to memory of 3644 2424 axplong.exe 88 PID 2424 wrote to memory of 3644 2424 axplong.exe 88 PID 2424 wrote to memory of 3644 2424 axplong.exe 88 PID 2424 wrote to memory of 4336 2424 axplong.exe 98 PID 2424 wrote to memory of 4336 2424 axplong.exe 98 PID 2424 wrote to memory of 4336 2424 axplong.exe 98 PID 2424 wrote to memory of 4220 2424 axplong.exe 103 PID 2424 wrote to memory of 4220 2424 axplong.exe 103 PID 2424 wrote to memory of 4220 2424 axplong.exe 103 PID 4220 wrote to memory of 4424 4220 splwow64.exe 104 PID 4220 wrote to memory of 4424 4220 splwow64.exe 104 PID 4220 wrote to memory of 4424 4220 splwow64.exe 104 PID 2424 wrote to memory of 3644 2424 axplong.exe 106 PID 2424 wrote to memory of 3644 2424 axplong.exe 106 PID 2424 wrote to memory of 3644 2424 axplong.exe 106 PID 4424 wrote to memory of 3040 4424 cmd.exe 108 PID 4424 wrote to memory of 3040 4424 cmd.exe 108 PID 4424 wrote to memory of 3040 4424 cmd.exe 108 PID 4424 wrote to memory of 3568 4424 cmd.exe 109 PID 4424 wrote to memory of 3568 4424 cmd.exe 109 PID 4424 wrote to memory of 3568 4424 cmd.exe 109 PID 2424 wrote to memory of 4604 2424 axplong.exe 110 PID 2424 wrote to memory of 4604 2424 axplong.exe 110 PID 4424 wrote to memory of 952 4424 cmd.exe 111 PID 4424 wrote to memory of 952 4424 cmd.exe 111 PID 4424 wrote to memory of 952 4424 cmd.exe 111 PID 4424 wrote to memory of 3948 4424 cmd.exe 112 PID 4424 wrote to memory of 3948 4424 cmd.exe 112 PID 4424 wrote to memory of 3948 4424 cmd.exe 112 PID 4424 wrote to memory of 4412 4424 cmd.exe 113 PID 4424 wrote to memory of 4412 4424 cmd.exe 113 PID 4424 wrote to memory of 4412 4424 cmd.exe 113 PID 4424 wrote to memory of 4528 4424 cmd.exe 114 PID 4424 wrote to memory of 4528 4424 cmd.exe 114 PID 4424 wrote to memory of 4528 4424 cmd.exe 114 PID 4424 wrote to memory of 1152 4424 cmd.exe 115 PID 4424 wrote to memory of 1152 4424 cmd.exe 115 PID 4424 wrote to memory of 1152 4424 cmd.exe 115 PID 4424 wrote to memory of 552 4424 cmd.exe 116 PID 4424 wrote to memory of 552 4424 cmd.exe 116 PID 4424 wrote to memory of 552 4424 cmd.exe 116 PID 4424 wrote to memory of 2348 4424 cmd.exe 117 PID 4424 wrote to memory of 2348 4424 cmd.exe 117 PID 4424 wrote to memory of 2348 4424 cmd.exe 117 PID 552 wrote to memory of 1572 552 Jurisdiction.pif 118 PID 552 wrote to memory of 1572 552 Jurisdiction.pif 118 PID 552 wrote to memory of 1572 552 Jurisdiction.pif 118 PID 552 wrote to memory of 996 552 Jurisdiction.pif 120 PID 552 wrote to memory of 996 552 Jurisdiction.pif 120 PID 552 wrote to memory of 996 552 Jurisdiction.pif 120 PID 1572 wrote to memory of 1288 1572 cmd.exe 122 PID 1572 wrote to memory of 1288 1572 cmd.exe 122 PID 1572 wrote to memory of 1288 1572 cmd.exe 122 PID 2424 wrote to memory of 2840 2424 axplong.exe 124 PID 2424 wrote to memory of 2840 2424 axplong.exe 124 PID 2424 wrote to memory of 2840 2424 axplong.exe 124 PID 2424 wrote to memory of 3584 2424 axplong.exe 128 PID 2424 wrote to memory of 3584 2424 axplong.exe 128 PID 2424 wrote to memory of 3584 2424 axplong.exe 128 PID 2424 wrote to memory of 3220 2424 axplong.exe 130 PID 2424 wrote to memory of 3220 2424 axplong.exe 130 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"6⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1970366⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv6⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T6⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pifJurisdiction.pif T6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\1000833001\891d745351.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\891d745351.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000857001\fe74ccde57.exe"C:\Users\Admin\AppData\Local\Temp\1000857001\fe74ccde57.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"5⤵
- Executes dropped EXE
PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"5⤵
- Executes dropped EXE
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 12566⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 12886⤵
- Program crash
PID:2320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 2365⤵
- Program crash
PID:4548
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 12605⤵
- Program crash
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 12406⤵
- Program crash
PID:1244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2685⤵
- Program crash
PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001475001\0b44ippu.exe"C:\Users\Admin\AppData\Local\Temp\1001475001\0b44ippu.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Treat Treat.bat & Treat.bat5⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"6⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6467516⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "AffiliateRobotsJoinedNewsletter" Purse6⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suitable + ..\Johnson + ..\July + ..\Firmware + ..\Invalid + ..\Baby + ..\Bar + ..\Continental + ..\Ruled + ..\Gay + ..\Hop + ..\Clearance + ..\Wisdom + ..\January + ..\Denmark + ..\Bull c6⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\646751\Plates.pifPlates.pif c6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff80db1cc40,0x7ff80db1cc4c,0x7ff80db1cc588⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1972,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:28⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1948,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:38⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:88⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:18⤵
- Uses browser remote debugging
PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:18⤵
- Uses browser remote debugging
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:18⤵
- Uses browser remote debugging
PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4568,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:88⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3180,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:88⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5012,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:88⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,11467952906497606975,10858820665847156190,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:88⤵PID:5124
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80db246f8,0x7ff80db24708,0x7ff80db247188⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:28⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:38⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:88⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:18⤵
- Uses browser remote debugging
PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:18⤵
- Uses browser remote debugging
PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:18⤵
- Uses browser remote debugging
PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:18⤵
- Uses browser remote debugging
PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:28⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:28⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2840 /prefetch:28⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3924 /prefetch:28⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2396 /prefetch:28⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3624 /prefetch:28⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13901469248305700815,1157619878850685192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3928 /prefetch:28⤵PID:3428
-
-
-
C:\ProgramData\BFCFBKKKFH.exe"C:\ProgramData\BFCFBKKKFH.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
-
C:\ProgramData\FCFBFBFBKF.exe"C:\ProgramData\FCFBFBFBKF.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
PID:6744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 2608⤵
- Program crash
PID:6796
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KEGCBFCBFBKF" & exit7⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3908
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001508001\f822e3f070.exe"C:\Users\Admin\AppData\Local\Temp\1001508001\f822e3f070.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\1001509001\bd83ad61c9.exe"C:\Users\Admin\AppData\Local\Temp\1001509001\bd83ad61c9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe"C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2636 -
C:\Users\Admin\AppData\Local\dp3s81isgn\tor\tor-real.exe"C:\Users\Admin\AppData\Local\dp3s81isgn\tor\tor-real.exe" -f "C:\Users\Admin\AppData\Local\dp3s81isgn\tor\torrc.txt"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1524 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3672
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:960
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"6⤵PID:4592
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"5⤵PID:3492
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:3836
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid6⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2208
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"6⤵PID:3116
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:996
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & echo URL="C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3584 -ip 35841⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1976 -ip 19761⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1976 -ip 19761⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3020 -ip 30201⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3220 -ip 32201⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2768 -ip 27681⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5704 -ip 57041⤵PID:6756
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
7System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5dd980e857e3b36c2e5b3a52d00f97d8d
SHA1f85a4ab603ed8372e1768b01409e36a735ca81fb
SHA256b519b6e0536ab8d52e9119c6a4b20788fdccd0a8d6307c5dcfdafcf59039e95c
SHA5127991c33ffd3bb357dc8109732d3f46a67811ba2698720138271c28aff412d2f2e92d54c4a6ada96e016547e6cbbe7fc256c5029224b3f5fa1a386ea3d1b1b531
-
Filesize
718KB
MD5daceaac9206af6ace3d7f6d6ee966034
SHA1b509d769b8f5dc8e867209e2c43ef8766e82db4f
SHA256f3a81242770cf865faf7f59309a3f1127f3d4d21ba5cdc4957e2a2fdf435681f
SHA5120b8353cdc9cf90da7844962d633ba620662533b7ad5b72b2c83b4f10fd87dc037f8431f906737b3d5e6d0a62db88e0388f45b382f9df24e56ede2f3ba6bf462c
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD59a3be5cb8635e4df5189c9aaa9c1b3c0
SHA19a7ce80c8b4362b7c10294bb1551a6172e656f47
SHA256958f70959a70caf02c0063fe80f12c4d4d3f822a9fd640a6685c345d98708c26
SHA5125c538513eba7ebaf7028b924d992b4c32ca323ad44f7a31e21970ed6852ea8b54cf71b2f811e8bf97f2744ee151e001ea52ba43b61cd032cc5a4c886292aac65
-
Filesize
11KB
MD52dd7b552a456d440f571c49e7f4cbc9d
SHA1f4d6346b48c97f4a45452aa361908fac08de44df
SHA256f9fc2dcef1037864706d3ae64a1a5b5661cacbb9a694435e76d670cfa91a5684
SHA5122aba193381b8d70f476746c35974710197eaa20684ec8a959638fb56d49a573fb634d6622bb115d2c23c859a6853bd6e31ed580f86f7d6319fe020d9b4dad73e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD558efd4918627b564df9ffc73b6825eab
SHA1c537933b6c0e3880e332e1a07cf975f03866a5e5
SHA256ac6c3d503981810a8a9d52be81481f108b74e408ed96fc346c8c60f82f25dcf0
SHA512e56d61abcd50aa8499603fdbf8f3150877fe9613a573c0f9490841cade79a6190df5ceb4e49ef28a48fb9be8aa4e78492c2e387cbfc58e7aeac13fdef891bbc2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
150B
MD5bc741e8f5f8479c92e26391ffb1a5740
SHA1b6bd2e9d3e8ac83eb6987d2d5c3e94dcf0f8c853
SHA2568856f04cb8721098ab8157b0d04d408b88682327466683d0f11493a7a9f494b6
SHA512cb7c8d0a62f5f3bffa53c2c428ac9616fd8faf407617622f2373ec891a2a2c028d44dcf102d3f8943c33758ec13b8df84265bfdc55f1b63faca17afb56b97055
-
Filesize
552B
MD59c3fa1f4c996adcf33ff7ca95ae6a7f4
SHA12375a2e3ecc34edad89e91a7d9743600862545ad
SHA256c2c5ae2bfa0d5e74c036cb23517fa37750d8b2a74ce9cba98d887cbcd1dd6edc
SHA512a4532d0198d5d9f1ee9da4580b79f2d6fafc592f9824eb39834bcc269bb2d757678b889ef2bb6a04068505fde1899acaba4dd1c351078d247c03ca800df9e36d
-
Filesize
686B
MD51a444cbea57c8dbb2b350955451351a7
SHA1b62f2c5f6d1d932dc2ccff4b51a4d5abf71d168a
SHA256b0ec7db7d5a5d273a83c652ce1fa46b23f977de079b157f44a0377702ebccfcb
SHA512bcc8bb2e1babc589812cb57ff4aacd581ab7593fcd5a2c823dc98cc708289bcf314d5e87d2b32d4315c8420a34d40aa1d2ea285b00ec793bcc1439ff9cb25090
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0547678e-204e-4cac-a77a-bb690d8fdfdc.dmp
Filesize826KB
MD5861ed4677a24f51008f13badca1962d4
SHA16288774f8b5a7d6bc6a8ef5f9b3a98023fbc7d5f
SHA2562982f74314c52ca540cf049a00f6d341325f8a783172b801138ff6f5b1bd2faa
SHA5123f6ebc82ff5b6e014257c3b64f84895bcf51b55787a667d159cc8ad7fca3aac16c2d38a895545dba5d00af7bbc29d36344409a795e75a38393ba9b4111d6dcea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\35ba3a2c-54cd-4977-858d-9ddfddcf4945.dmp
Filesize830KB
MD55beedb36bb329ca74d85066aaf81635d
SHA1abf1597e958184b1f6ecdbcb45cc7644138737f0
SHA256d2fc95b52012eb3e65502db33e2181e1ffc7455c5fd03d8b580de32a84c5f386
SHA5127985cb64fc3d05683870b4f59e7e9f38f675f89b3a609ae0cbc1dbb78fcddbf2845af5cd42ba07d8fef4e064755134cb6e9cc8d6d1de64c8e2b51ee76e9de595
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\37c50000-92f2-46f9-a9f6-42202815f967.dmp
Filesize838KB
MD5c36ec3f6e3e5d0f43175480ac09a250d
SHA18174f5a35161dbad51a8bc07f1d2b2f2a8721fbf
SHA256e52427826a490864680c3a9e9fe88d40f1bb9f90d05a9827db70283c28887a0b
SHA5120ac5b44b2b87bee16dfc3f67df98872389f80919420bf91e3214b3d150e72f9029529d6e7542c0209071bebe89eea84711963384ab3fc2ca907e8babf2ece440
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\47150317-a059-4474-9954-f3f845a4253f.dmp
Filesize830KB
MD50549e421fde28d1982e71f5cf6b01e6f
SHA19c7016cfba5d4e6d5b8b658520db6226e491e6f2
SHA25641cbc38d0f9baa083fff4ea7f0da979796279251532997b436a61e96912b06ff
SHA512dce1a057312733cd0d511c8533c73c8236c202ad01ac00e213ebb7ae74e3ed8ffda781587cd41fa64c30e462a8aa52e2e55e891ece784ce5c02d88151e70678a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\8e454970-9381-40f3-a8a0-c25f89dac9ac.dmp
Filesize838KB
MD50f89f779c7df61b727d9635aaf0df530
SHA19ec1e4888b36dffbfda1d7cac816e7eb5e24c2d3
SHA25656b42ec196f858c1d01562773f9a96245b431264c0f09b3077a2c468b40d4c45
SHA51296f9b6db97cf591bf3121cdab5b2c189667d958dcc344110db7ce767c2a564810dd400448c4ae5e67eb62fc730c7ce30b1fd13a5faf9331900cd6d5eff75de32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c7959aff-60f0-4293-b4fa-ae5326c6dc3e.dmp
Filesize826KB
MD566ef8df861b2384066b8df571243cac8
SHA17484d8bf03e7615faddc93d3b61a6cc225e66332
SHA256c2e5b19912a4e403dd68296afbe5ded09e185f6e7fc539a37e26f79579a541ff
SHA51279ccced1d2078d8023d33281d8fb17816d1feddaf8da6c8f71d003ee075c9b76d457ec99be4b9375d2cd89ac54143dea7c6c2f28aa319b2695c4f9e4dcc7bc63
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\fba76e35-f35b-4e91-ba81-be6d00f8a572.dmp
Filesize838KB
MD5f9136064b5ebf5f254014ac59c5a74f3
SHA17014e29511c754a4510ffe2eb1b2a23c74e005fd
SHA256c39babacdd4df90f8f05b5a7977450b217b9ddd2b34ffb224849fe5609b632bf
SHA51209958ab90c24f645dad4b092c8e1be0ee761ac0a739cb8011bfb9062854495b11dc1c69c3a2edb5d331687bed62efdd26f020e1be06de5f0ba5e2333f444976e
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5c82b955392e7ce346800a9e5cf7ea22c
SHA1943ef498c73c80b169085e96a05e5347b5e3be07
SHA2562701aa2364c431bd55d683aa5694a70f2cf9df6d789f05179ab12f304d1f6481
SHA512224af0a7fecb48494bc69ab9478bfaab407510790c86757d7ec4ee5726289ef6cb8e2412575c4e192708205ac2b3d10df0cf4d2f11924343b1b6c89239e2b1be
-
Filesize
152B
MD5c4b206ad5e1489626b8e4b1d71baf901
SHA1a2932045e4efd990afcbdfd64d0edb1928bbf54d
SHA256fe2356e2391d7d82a8be335d23a069a598c6e54cbaefa00a05761535d03ac7b6
SHA512fdb9990e57ac07ce5235fb01fc05bb2d390afe3ea6ad42bacc4afa261b5984827f0688a3016bf73fb19bb87789bd41737b761d1471cec2e6446f90230e8cb883
-
Filesize
5KB
MD5ee3aa3753d85e5c7dec7600f0fecbf54
SHA158c50e2e714868a8ffc4bc6fba7fca7a26976fd9
SHA2564417224d847fa6153b83abd81ce4cd972dc593c36676c928daf08df541f2bff9
SHA5129f2ddc0c4306ba1dc32a9be06e3cce23a55dd7183c661713db7bf66a2408b0c0e5ce75620a1bfcc31cfed0475c362b943bc434d2e6182fec2b38260f7926c1b0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
92KB
MD52c9d29852a75a0c20543784ea6edb423
SHA1f567b4c0339905c37377105a6d94cadf73c8b25a
SHA25612a0cd7c7cbd9bbf80c8da31a6c46d2da425b5abd2c6bd7c62e62c43188eaff5
SHA512fadfa56fd2d7c73fb33312c809d25f01d05c48dceb5c7bdc426b241b544e38faccccd5debb3d79ae132e47747422d556a7cec739a6af7ef4bfdda41da2728c32
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
6.8MB
MD587e4e869971cec9573811040f6140157
SHA16308d9e243317a829d602c6a2f667fff6d05d148
SHA2560ad7e833d526131900916008913dec998360ee6d1a9aacf3997602e1cfc1c3e3
SHA51271f1040d823deb28361966e41f0cba63d735425edc83c9d790b1bffc2abe97eb5fe2642358b0aa3b9a505230d87049c0d36f84e58499575d2d5983926df0e881
-
Filesize
1.2MB
MD55d97c2475c8a4d52e140ef4650d1028b
SHA1da20d0a43d6f8db44ff8212875a7e0f7bb223223
SHA256f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf
SHA51222c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee
-
Filesize
5.7MB
MD55009b1ef6619eca039925510d4fd51a1
SHA122626aa57e21291a995615f9f6bba083d8706764
SHA256fbc8c32bf799a005c57540a2e85dd3662ed5795a55f11495f0ba569bbb09df59
SHA5122b5bbd9449be00588058966db487c0adfac764827a6691f6a9fc6c3a770a93bda11c732d2eb2a3c660697cbc69b1c71a2bf76d2957f65cd2599fb28098b24f14
-
Filesize
514KB
MD526d8d52bac8f4615861f39e118efa28d
SHA1efd5a7ccd128ffe280af75ec8b3e465c989d9e35
SHA2568521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f
SHA5121911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733
-
Filesize
2.8MB
MD54fd1ed99baaa6e9ac510d0c468d900bd
SHA136a64062dc9dd36c9a4bc4160896dad6131bb7eb
SHA256616407ff718b63549c514e9c5fd4a640e79d48de7f2967df00826322b1f5a8a2
SHA5125b1aa99cb379d2c50097d98c9590c57a3fdf1add464660bd296243423686c3fa0c21c7ecc45cd89ae25fbe1af8cd7a1f4bb4b2a069ae9ee6b16c905a2979b7d4
-
Filesize
645KB
MD5bdf3c509a0751d1697ba1b1b294fd579
SHA13a3457e5a8b41ed6f42b3197cff53c8ec50b4db2
SHA256d3948ae31c42fcba5d9199e758d145ff74dad978c80179afb3148604c254be6d
SHA512aa81ccbae9f622531003f1737d22872ae909b28359dfb94813a39d74bde757141d7543681793102a1dc3dcaecea27cffd0363de8bbb48434fcf8b6dafef320b3
-
Filesize
327KB
MD5fba8f56206955304b2a6207d9f5e8032
SHA1f84cbcc3e34f4d2c8fea97c2562f937e1e20fe28
SHA25611227ead147b4154c7bd21b75d7f130b498c9ad9b520ca1814c5d6a688c89b1b
SHA51256e3a0823a7abe08e1c9918d8fa32c574208b462b423ab6bde03345c654b75785fdc3180580c0d55280644b3a9574983e925f2125c2d340cf5e96b98237e99fa
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
-
Filesize
649KB
MD5e3d038ee8743eeb4759105852f8c9973
SHA1c029f68a065ecbaf124f2d8569fc3d097cff8da9
SHA256250784e06ac98ad9183950ef5ec3549c2a5e2ffb0306f167ae84c4cb55b12922
SHA512f45ba1d08582ad5daf8b09faa52807169542b29054204da2e346f9dbd84d93041452503ec87617979b326a3d9e00efe18fe7cc6baa377c6e99327161bb886445
-
Filesize
1.6MB
MD50f4af03d2ba59b5c68066c95b41bfad8
SHA1ecbb98b5bde92b2679696715e49b2e35793f8f9f
SHA256c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59
SHA512ea4de68e9eb4a9b69527a3924783b03b4b78bffc547c53a0ecd74d0bd0b315d312ae2f17313085acd317be1e0d6f9a63e0089a8a20bf9facc5157a9b8bea95a3
-
Filesize
2.0MB
MD5e71c5aee12ee323fc4f40010437d4186
SHA16389bda37cee4ca4724306cfa8a73ff318713de3
SHA25605d8c0bf7acbc23d2a49073d4cdde8547526bb55b6893f21c4753cc8800b0a8e
SHA512d3f0a9cf2eb19f1573b289bfda2c3d0e11aacbc334f4a8c09318e9379568fe5db15ebe5a6db6f102168a14e1255d6949f3edbcbeb7699a0ecbd35f2d8d5f0d9c
-
Filesize
2.8MB
MD5ea1b8bafcb99bc660562bcb5f4cb63f3
SHA1cc97f694826c90cc8c8bd9666066ec491828d401
SHA256c340f6ccce063fd78345f78e8c1970a5d6e170192cdbd20e5b48884f7268bd37
SHA512aaa32b5217de08baab1ab09e2c22f5f71374af6b02143e4b69341a66a0b1bb8e0b31e5dd4a4f33ce35cf4d2d1015ebf043cef6f958bf695cb1b2f7ca2e8e2309
-
Filesize
772KB
MD56782ce61039f27f01fb614d3069c7cd0
SHA16870c4d274654f7a6d0971579b50dd9dedaa18ad
SHA25611798c5a66618d32e2666009fb1f4569ae8b2744fa0278f915f5c1eefb1fd98d
SHA51290fc316784eba2e553c2658ac348e6fcb4ab6987209d51e83c1d39d7a784ca0f18729349904bac6d92d3b163ce9f0270369a38eac8c9541ae211d74bce794938
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
580KB
MD54b0812fabc1ba34d8d45d28180f6c75f
SHA1b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950
SHA25673312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103
SHA5127f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158
-
Filesize
1.8MB
MD5436ec8e845cbb9bcd7098b37be1c0610
SHA15149fff99b5fef0018f704566908816d838c064c
SHA256e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65
SHA5127df98128ab269db1bef8e802f130d3d426133ea72a34f24bb299ec2980f373e7d6f4884d2b296d6633bf5ea82a716c37a8c55a494a9fc8e42f6d798896eac4b3
-
Filesize
82KB
MD5ee7c47686d35a3e258c1f45053cc75ab
SHA172341f88c79d79cb44ef60fc33783b9f14ff1ee8
SHA256b199ba689f6b383644345854c758629b925f9cb853c0e4e1dcb4d0f891be5eba
SHA512f007c9c101650842dd7b57310d22a0c04fa1fa71f1388285f55fe9cc0b70dbe7a1964ace594793bd707db07c3ea4911bfd21c458993b1bec8fa155250dac2471
-
Filesize
61KB
MD5b01f3d096606e9762d0a6b305163c763
SHA195c3623ad2693cfff27bc1f2fa60e5fb3292f4d7
SHA256adacdc0798acbc5bec0377956876c8b94b52528f51bb998c1f7f1cd2f0db5088
SHA51299e4fb8914a35396395638eb1542fb096ff3cb9ce56258e89350fe49738344819e707a3aa4c9731f02a47da5432a6ec96c42c121b1e8a7113e8aaff250c27b58
-
Filesize
24KB
MD52a84a77ad125a30e442d57c63c18e00e
SHA168567ee0d279087a12374c10a8b7981f401b20b8
SHA2560c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769
SHA5129d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a
-
Filesize
6KB
MD5bca7d728d907c651e17ce086fe7e56ff
SHA1b91db7b274cf33c643c33edc13ec122564d798de
SHA256f837e6522cf5992ed8c1f016c95f84948a83c891294e1aebf0688e3275d3c593
SHA51234ec6af89ebe2c3625dcfb4961df148bd57042084a252d352837663e6a1aaa097a82a7138211a73a046f3b2eea7c459faaa80b22cf9098805f46548926f3b8c3
-
Filesize
866KB
MD5c1f370ffaaea402a8c74c0987b2844dd
SHA1751f94ebcbea6a4d62bf382f18cf83156b57ba44
SHA2563ba807e13102e920b109e89933b2b7fcd0612778dad22f9fb3b0b70f680dc573
SHA51292dfac93bf8cc7f22f0043c4ee36be0e63057242584c238e6625666a24d4a38e736be1910be3eeef14ef3573154c16750bd99a9f5be933b25d757d6715c86456
-
Filesize
59KB
MD511bbe9e6529811962d78cab3d0ee1c43
SHA1f96714a4791c2f655c6abf7288474c07dd48bc84
SHA2567cb10878d4544e53ca4730ab78c244f2e46ed76a7d1329c5c0e01fef8204cca3
SHA512d6fd22a48a1f8d725d921a59ee4ddba149235a329d6ea70dde8e956c080823c38479d2702b7cba27a4c0e7fbb9d028c0e876ae2f0d2f6dced8ad8ec8e179baf8
-
Filesize
95KB
MD5ecf9598497596bde26d0ad70777d6d75
SHA15225aa0982dc031c7361b72cdeff4b7e373f983e
SHA256013836f48c6a0b07dcfba2e219d0e5e4733f6959b9c683f2c7ddf213c973b18b
SHA51226d8e83f6b215a15c87f1ea4355502964cc84c3e991c7c93b47c977b9bfaa17248d7d8a8a8122e80d0187c5b63c831fda65cd7bcf0ca2299a13a2663286183fe
-
Filesize
57KB
MD5006481206cbd4c83fa649632f7222ef1
SHA16e2a05cddac05ce304a77460c6bd7b3f890393f5
SHA25642390451e4799e041cf688fe02a9c33b6aa1b1d873f5b8c954b0ed8ba0af63a3
SHA512ee44850bc2b0390394080198be27e8b74b6ee46e6e379bb3f3f9a4ba53830ecfe955efab4b2beec341ed302a110824350071c716dee80b984d465a7d4419d69a
-
Filesize
95KB
MD54ac36f51637d82d4d2354108de385a58
SHA10c556b79cc52b6710dadcfde1044c1481d996f33
SHA2560efec48bed8c476258cfc1a5a9694d42837234134d0947a2f9c041752f7485e0
SHA512ef661c0c5457002d521c8790e37bd286344a77dea70a9ea0f7bf74a22e6f3722ad67f0546047c29166cd273c6f9415ba0dc7f68d2282ae2e4c7ebd38402afd9a
-
Filesize
62KB
MD546a51002cdbe912d860ce08c83c0376b
SHA16d0ae63850bd8d5c86e45cba938609a7f051f59b
SHA25618070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017
SHA512ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44
-
Filesize
99KB
MD5997016fd2fa51b13fdff955e76b66d21
SHA11190f5454bb69687440fbe9699b26bf1a7dc65de
SHA25606978fa33a74ef4c3b3d4971bbb2b8efff84dad1fe2f822dd8c3e179dd3bd880
SHA512d9ca616e7cdbc7f7376ca75a9ea1e75dd140fecacdf5744f3dd36ddb2c332d37649016e495179e0832f8545fb2579150c6664c7678cb08841f7add1148be2865
-
Filesize
78KB
MD5246993f804971aff1da64d44386bef26
SHA18d04fb03b432670ee3b207fcbc616231ec862285
SHA2560bc854aa1b688f84e401919b4c2308f31b88c24068cb64b18bc8f8531f7bcc2c
SHA5122a181d37404fff73f897164152a1076a47517beafa5fe4852544b2f826cc5e700ee5ed0a86ec89ac748a310e34e95a3c0ee8a0656bed283340e25d24346dd5f6
-
Filesize
78KB
MD5804f99fc8fef68f602b5be45a6008a88
SHA182c7298d0abf37dedb6cf5420eace6020e4b9ca2
SHA2568cb4e2b1e61169ab59989e55ebe8c8234dbc13c571b5c87ee90ea4c0dd3f04c1
SHA5129573e28719d68a50e2171f3d9eda5af01236011b16efab4e90f0597612f9dbfe35ba7f137da965a5016e19c2a31e8c68de700588062eea0dd206dae0641197ad
-
Filesize
65KB
MD506b437c07120c91c7f92ce0bc670ab1d
SHA117f58c591c6f8bcfd92e88022dbb16d14c860c18
SHA256cda405b2f101febc4d73784eb66a0fb6241a068448f1f59da50f94d6427d2491
SHA512f49a3f0c9b4e6aca1a3c07183cee4a17ae0b6deb1dd95bfd63b50c768a10243bd49a46fbac3afd626cce4cfb50f9dcc9fa3ebe287955042aab705e305f747095
-
Filesize
87KB
MD545fce45ac7ba97912a521f861fffda46
SHA1f8b2190331947ea12e4b01a575cffc336d0e1821
SHA25623dbd2c3962063f75956f209933f5bbfc5f20364e4bacc198d32b832f624a49c
SHA512099dc0f6a696c4186b046a23ef532aa893d437c59fdb820eaee085516fedf28f4123f0239708e8ebe36ee405e4fca358b6175edf5b09cde69006c16180e56031
-
Filesize
96KB
MD504cad2ab332f64c6161a3a4308db8fd7
SHA1016a65c178852632b151eb917ebf7623bb9dffc0
SHA2569c4a70cf8295104b4b13fe9f7f99af2690ae94760521055c0f492169c1377df2
SHA512bf597406dc401f26d91679ef3aa275f6fe1549a0ae5424acb6879a7b003e53c3936a3e290ccf228cc1d2aaa67fa2a8b78cccae929aaf7397d33e363df52dd243
-
Filesize
69KB
MD58ca4bbb4e4ddf045ff547cb2d438615c
SHA13e2fc0fdc0359a08c7782f44a5ccebf3a52b5152
SHA2564e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed
SHA512b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9
-
Filesize
7KB
MD5f3d7abb7a7c91203886dd0f2df4fc0d6
SHA160ffbb095fceeb2ea2b9e65355e9dbf1de736d6c
SHA2565867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3
SHA5129af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367
-
Filesize
6KB
MD5ef125e0bf013c42de1651613d7ba0375
SHA18b50ccabd5f95d730b5744a2d6460afc5bf7e9c7
SHA25625ba04aa9001223300db69f53e972056137193689eb964862228707099e618ba
SHA51223d9cb80f032f61f403d4cd6090e9a4e3849ad4a1002213a9838b1dce4c12da2f7e8ee5e6a9e366527f972ef572b8341845d64d876f95164132fa4e231f8f76c
-
Filesize
85KB
MD5aa5c108559abe590bc4edf77e20e2f2d
SHA188d41d1d1dbd210226b353339e89fca3d1664fc1
SHA256bb324d7599d0862f7e788f941204d85e7b47dc921e3d38a9a48acf80fcd0d0d2
SHA512091519a9ef4bf0a08e02adf30d627c2220a2374b10880a4d7e0eea3e4f39fe293214da3ae9051aa9ad0c83c41419996f44d56b5e878f0bcb352d67a271af39ea
-
Filesize
58KB
MD584c831b7996dfc78c7e4902ad97e8179
SHA1739c580a19561b6cde4432a002a502bea9f32754
SHA2561ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575
SHA512ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991
-
Filesize
80KB
MD50814e2558c8e63169d393fac20c668f9
SHA152e8b77554cc098410408668e3d4f127fa02d8bd
SHA256cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d
SHA51280e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319
-
Filesize
71KB
MD56785e2e985143a33c5c3557788f12a2b
SHA17a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0
SHA25666bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7
SHA5123edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91
-
Filesize
67KB
MD59a86a061ac6f60588a603dab694901fb
SHA1542fa7abe87867d17de53c1b430f02b6baa6c97a
SHA256aefc1a30b5a9cae66fa5e1e51b0f73e7214c6b5a07d14819e9c50cadf925517e
SHA5123892e394720d527962b09b6fb03b6c3639cf8e458808d36a1c910823801e54a548690260421cef7d69e4b365fa4cd09778bc9958a20c898f70783ea53373fca8
-
Filesize
865KB
MD56cee6bd1b0b8230a1c792a0e8f72f7eb
SHA166a7d26ed56924f31e681c1af47d6978d1d6e4e8
SHA25608ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab
SHA5124d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193
-
Filesize
28KB
MD584e3f6bfcd653acdb026346c2e116ecc
SHA143947c2dc41318970cccef6cdde3da618af7895e
SHA25600a0c805738394dfed356aae5a33ce80d8f751c3b5d7e09293817c07fbaeb9fd
SHA512eeba8f5c0f9163bc38080ac7cfcc5babf9dfdf36b34b341416ca969b9f19cebb141f8b0d2e12e7c41d886eec36e23cf1525a7ce28785ad09154bc3db78ca0591
-
Filesize
95KB
MD5ba8c4239470d59c50a35a25b7950187f
SHA1855a8f85182dd03f79787147b73ae5ed61fb8d7b
SHA256a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b
SHA5121e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0
-
Filesize
92KB
MD52759c67bccd900a1689d627f38f0a635
SHA1d71b170715ed2b304167545af2bd42834ccf1881
SHA256510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05
SHA512aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e
-
Filesize
52KB
MD55efee5d7edbe127050e3ea3d197120ab
SHA15fa5546f2890ea0298314d46ed7f0bec3819c3f6
SHA256ae4adae2962a4dfca41929164973d98217401cfa39264f3a367220e09dc87e8b
SHA5123644b60eaee9d35e9fe33db8571d0fbe19c61ced979a68098be93c3cdfaf2a82b3ef8329a015fc0644a48c19782a27864948c120744b2d01d6e0284803dcfc61
-
Filesize
53KB
MD579156afddd310be36f037a8f0708a794
SHA109ef36ae22b5eab65d1f62166542601b8919399d
SHA2567faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503
SHA512d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01
-
Filesize
2.8MB
MD514f06884a5cd8eb640720092ddbfa78f
SHA1312f1013d44f2dc3bd7b270c0908f351a3f766a5
SHA256edcf3bb44fbc52235876a27dc83cf897cd77e30114c8ab2ae85465858fc748d9
SHA51222b819d0f325e0833a50e7f77420726c37f14a23534d5f7b4b971532a220811af98aee64e99b35998018fcf39edab3bee6cd56d47fa1255f20d5edda86b0578c
-
Filesize
9.8MB
MD58dd1dc7303a04f7083d0fa596e547108
SHA1f098a108a000c91b12b3c0a6856a0561d64a10ec
SHA25687a4cbabaea11204ae0717ae5b4cc0942f699ed9d03b89ed400453d65314f542
SHA512d277c0783fbff6b113c837dc6ea3a44dc777b5f8ddd72204166569405bce70183fb9671b31be12ee21d190f740506e52329f6d3496f2ac3e1c7e448834c06a12
-
Filesize
4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca