Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe
Resource
win7-20241023-en
General
-
Target
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe
-
Size
1.8MB
-
MD5
b0947367f4ee69a28851b851dc14422f
-
SHA1
6b0d41bc9de6af9fb99259bbb9d8509137649a1f
-
SHA256
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50
-
SHA512
781836587c5621f685deb701d1161b2ee8040bcd0dbdeba73989a931bb113869e8955f3d88df6d0f4fb4726b11c0da06ca2550b1d69a113091d7476d1dbf1e88
-
SSDEEP
24576:/U7M/GPDDVXI7vrXqSLoeOBFpyAtIKf/UbsssCquw8uHf8f4SxKpOtll3Bx4H7:/UiGPDD9IrrXqSpxKUsC1ZuHAl0E/u
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
https://computeryrati.site/api
https://goalyfeastz.site/api
https://contemteny.site/api
https://dilemmadu.site/api
https://authorisev.site/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
f24c652b6e.exe4f7cffe218.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f24c652b6e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f24c652b6e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f24c652b6e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f24c652b6e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f24c652b6e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4f7cffe218.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Jurisdiction.pifdescription pid process target process PID 2444 created 1100 2444 Jurisdiction.pif Explorer.EXE PID 2444 created 1100 2444 Jurisdiction.pif Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
6eb604ff16.exe1d395b0ffd.exe3157632031.exeaxplong.exeskotes.exe425b5d789b.exe4f7cffe218.exef24c652b6e.exe0866725587.exe8bffec3ec8.exe67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6eb604ff16.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d395b0ffd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3157632031.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 425b5d789b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f7cffe218.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f24c652b6e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0866725587.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bffec3ec8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6eb604ff16.exe1d395b0ffd.exe425b5d789b.exeaxplong.exe4f7cffe218.exef24c652b6e.exe0866725587.exe67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe3157632031.exe8bffec3ec8.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6eb604ff16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d395b0ffd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d395b0ffd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 425b5d789b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f7cffe218.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f24c652b6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0866725587.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f24c652b6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3157632031.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f7cffe218.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0866725587.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bffec3ec8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3157632031.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bffec3ec8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 425b5d789b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6eb604ff16.exe -
Drops startup file 3 IoCs
Processes:
cmd.exe29298a4dd2.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url 29298a4dd2.exe -
Executes dropped EXE 37 IoCs
Processes:
skotes.exe425b5d789b.exeaxplong.exestealc_default2.exe4f7cffe218.exef24c652b6e.exeOffnewhere.exesplwow64.exeJurisdiction.pifnew_v8.exe29298a4dd2.exe0866725587.exeFontCreator.exeFontCreator.tmpGOLD1234.exeFontCreator.exeFontCreator.tmpRDX123456.exeFontCreator.exeFontCreator.tmpFontCreator.exeFontCreator.tmpGOLD1234.exegiganticurtain.exeshop.exev7wa24td.exeshop.exeUpdater.exeUpdater.exe6eb604ff16.exe1d395b0ffd.exe8bffec3ec8.exe3157632031.exe3dc5944b63.exenum.exeUpdater.exeUpdater.exepid process 2816 skotes.exe 1924 425b5d789b.exe 3024 axplong.exe 2172 stealc_default2.exe 3044 4f7cffe218.exe 300 f24c652b6e.exe 1840 Offnewhere.exe 2284 splwow64.exe 2444 Jurisdiction.pif 744 new_v8.exe 1624 29298a4dd2.exe 1556 0866725587.exe 2608 FontCreator.exe 1512 FontCreator.tmp 3004 GOLD1234.exe 2800 FontCreator.exe 1248 FontCreator.tmp 2232 RDX123456.exe 2560 FontCreator.exe 2072 FontCreator.tmp 1220 FontCreator.exe 1936 FontCreator.tmp 2624 GOLD1234.exe 2804 giganticurtain.exe 1716 shop.exe 2560 v7wa24td.exe 1724 shop.exe 2340 Updater.exe 1520 Updater.exe 2744 6eb604ff16.exe 1604 1d395b0ffd.exe 2716 8bffec3ec8.exe 1764 3157632031.exe 3340 3dc5944b63.exe 2272 num.exe 2192 Updater.exe 868 Updater.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1d395b0ffd.exe3157632031.exe67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exeskotes.exe4f7cffe218.exe6eb604ff16.exe8bffec3ec8.exe425b5d789b.exeaxplong.exef24c652b6e.exe0866725587.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 1d395b0ffd.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 3157632031.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 4f7cffe218.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 6eb604ff16.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 8bffec3ec8.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 425b5d789b.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine f24c652b6e.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 0866725587.exe -
Loads dropped DLL 64 IoCs
Processes:
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exeskotes.exe425b5d789b.exeaxplong.exestealc_default2.execmd.exeFontCreator.exeFontCreator.tmpFontCreator.exeFontCreator.tmpFontCreator.exeFontCreator.tmpFontCreator.exeFontCreator.tmpGOLD1234.exeWerFault.exeshop.exeWerFault.exepid process 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 1924 425b5d789b.exe 1924 425b5d789b.exe 3024 axplong.exe 3024 axplong.exe 2816 skotes.exe 2816 skotes.exe 2172 stealc_default2.exe 2172 stealc_default2.exe 3024 axplong.exe 3024 axplong.exe 3024 axplong.exe 1568 cmd.exe 3024 axplong.exe 3024 axplong.exe 3024 axplong.exe 3024 axplong.exe 2816 skotes.exe 2608 FontCreator.exe 3024 axplong.exe 3024 axplong.exe 1512 FontCreator.tmp 1512 FontCreator.tmp 2800 FontCreator.exe 3024 axplong.exe 3024 axplong.exe 1248 FontCreator.tmp 2816 skotes.exe 2560 FontCreator.exe 2072 FontCreator.tmp 2072 FontCreator.tmp 1220 FontCreator.exe 1936 FontCreator.tmp 3004 GOLD1234.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 2816 skotes.exe 2816 skotes.exe 3024 axplong.exe 3024 axplong.exe 3024 axplong.exe 1716 shop.exe 872 WerFault.exe 872 WerFault.exe 872 WerFault.exe 1248 FontCreator.tmp 1936 FontCreator.tmp 3024 axplong.exe 3024 axplong.exe 2816 skotes.exe 2816 skotes.exe 3024 axplong.exe 3024 axplong.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
4f7cffe218.exef24c652b6e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4f7cffe218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f24c652b6e.exe -
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
Processes:
v7wa24td.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
skotes.exeaxplong.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\4f7cffe218.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001735001\\4f7cffe218.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\6eb604ff16.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001523001\\6eb604ff16.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\1d395b0ffd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003189001\\1d395b0ffd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\8bffec3ec8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001524001\\8bffec3ec8.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\3157632031.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003190001\\3157632031.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\3dc5944b63.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003191001\\3dc5944b63.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\num.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003192001\\num.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 74 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1003191001\3dc5944b63.exe autoit_exe -
Enumerates processes with tasklist 1 TTPs 14 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 1560 tasklist.exe 2012 tasklist.exe 2036 tasklist.exe 2384 tasklist.exe 2284 tasklist.exe 1720 tasklist.exe 1912 tasklist.exe 1416 tasklist.exe 2544 tasklist.exe 880 tasklist.exe 2000 tasklist.exe 1420 tasklist.exe 984 tasklist.exe 884 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exeskotes.exe425b5d789b.exeaxplong.exe4f7cffe218.exe0866725587.exe6eb604ff16.exe1d395b0ffd.exe8bffec3ec8.exe3157632031.exepid process 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe 2816 skotes.exe 1924 425b5d789b.exe 3024 axplong.exe 3044 4f7cffe218.exe 1556 0866725587.exe 2744 6eb604ff16.exe 1604 1d395b0ffd.exe 2716 8bffec3ec8.exe 1764 3157632031.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
GOLD1234.exeshop.exe29298a4dd2.exeUpdater.exeUpdater.exedescription pid process target process PID 3004 set thread context of 2624 3004 GOLD1234.exe GOLD1234.exe PID 1716 set thread context of 1724 1716 shop.exe shop.exe PID 1624 set thread context of 1536 1624 29298a4dd2.exe RegAsm.exe PID 2192 set thread context of 3272 2192 Updater.exe MSBuild.exe PID 868 set thread context of 2232 868 Updater.exe MSBuild.exe -
Drops file in Windows directory 8 IoCs
Processes:
splwow64.exe67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe425b5d789b.exedescription ioc process File opened for modification C:\Windows\SixCream splwow64.exe File opened for modification C:\Windows\HomelessLaser splwow64.exe File opened for modification C:\Windows\ActuallyFtp splwow64.exe File opened for modification C:\Windows\EauOfficial splwow64.exe File created C:\Windows\Tasks\skotes.job 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe File created C:\Windows\Tasks\axplong.job 425b5d789b.exe File opened for modification C:\Windows\LuggageRepresentations splwow64.exe File opened for modification C:\Windows\AdditionsSalvation splwow64.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2244 3004 WerFault.exe GOLD1234.exe 872 1716 WerFault.exe shop.exe -
System Location Discovery: System Language Discovery 1 TTPs 59 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tasklist.exeFontCreator.tmpFontCreator.exeGOLD1234.exeGOLD1234.exeUpdater.exe3157632031.execmd.exeFontCreator.tmpFontCreator.tmpFontCreator.exeRegAsm.exeUpdater.exenew_v8.exeFontCreator.exe4f7cffe218.exeJurisdiction.pifchoice.exeschtasks.exe8bffec3ec8.exe3dc5944b63.exe0866725587.exePING.EXEshop.exeUpdater.exetaskkill.exeMSBuild.execmd.exetaskkill.exenum.exesplwow64.exefindstr.exetaskkill.execmd.exeskotes.exef24c652b6e.exeFontCreator.tmpMSBuild.exeaxplong.exeOffnewhere.execmd.execmd.exefindstr.exeRDX123456.exeFontCreator.exetaskkill.exe425b5d789b.exe6eb604ff16.exe1d395b0ffd.exetaskkill.exe67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exestealc_default2.exefindstr.exetasklist.execmd.exeshop.execmd.exePING.EXEUpdater.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD1234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD1234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3157632031.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new_v8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f7cffe218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jurisdiction.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bffec3ec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dc5944b63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0866725587.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language num.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f24c652b6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Offnewhere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDX123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FontCreator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 425b5d789b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eb604ff16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d395b0ffd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updater.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEcmd.exePING.EXEpid process 3496 cmd.exe 1712 PING.EXE 4044 cmd.exe 3976 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeUpdater.exeUpdater.exestealc_default2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3356 taskkill.exe 3472 taskkill.exe 3520 taskkill.exe 3564 taskkill.exe 3612 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
Processes:
GOLD1234.exenew_v8.exe0866725587.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 GOLD1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 new_v8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a new_v8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0866725587.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0866725587.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0866725587.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 GOLD1234.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 GOLD1234.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exeskotes.exe425b5d789b.exeaxplong.exestealc_default2.exe4f7cffe218.exeJurisdiction.pif0866725587.exeFontCreator.tmpFontCreator.tmp6eb604ff16.exe1d395b0ffd.exe8bffec3ec8.exev7wa24td.exe3157632031.exe3dc5944b63.exepid process 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe 2816 skotes.exe 1924 425b5d789b.exe 3024 axplong.exe 2172 stealc_default2.exe 3044 4f7cffe218.exe 3044 4f7cffe218.exe 3044 4f7cffe218.exe 2172 stealc_default2.exe 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 1556 0866725587.exe 1248 FontCreator.tmp 1248 FontCreator.tmp 1936 FontCreator.tmp 1936 FontCreator.tmp 2744 6eb604ff16.exe 1604 1d395b0ffd.exe 2716 8bffec3ec8.exe 2560 v7wa24td.exe 1764 3157632031.exe 2560 v7wa24td.exe 2560 v7wa24td.exe 2560 v7wa24td.exe 2560 v7wa24td.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
4f7cffe218.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exe29298a4dd2.exev7wa24td.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exedescription pid process Token: SeDebugPrivilege 3044 4f7cffe218.exe Token: SeDebugPrivilege 2000 tasklist.exe Token: SeDebugPrivilege 1560 tasklist.exe Token: SeDebugPrivilege 1420 tasklist.exe Token: SeDebugPrivilege 1912 tasklist.exe Token: SeDebugPrivilege 2012 tasklist.exe Token: SeDebugPrivilege 1624 29298a4dd2.exe Token: SeDebugPrivilege 2560 v7wa24td.exe Token: SeDebugPrivilege 2036 tasklist.exe Token: SeDebugPrivilege 1416 tasklist.exe Token: SeDebugPrivilege 2544 tasklist.exe Token: SeDebugPrivilege 880 tasklist.exe Token: SeDebugPrivilege 984 tasklist.exe Token: SeDebugPrivilege 2384 tasklist.exe Token: SeDebugPrivilege 2284 tasklist.exe Token: SeDebugPrivilege 884 tasklist.exe Token: SeDebugPrivilege 1720 tasklist.exe Token: SeDebugPrivilege 3356 taskkill.exe Token: SeDebugPrivilege 3472 taskkill.exe Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 3612 taskkill.exe Token: SeDebugPrivilege 3664 firefox.exe Token: SeDebugPrivilege 3664 firefox.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
Processes:
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe425b5d789b.exeJurisdiction.pifFontCreator.tmpFontCreator.tmp3dc5944b63.exefirefox.exepid process 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe 1924 425b5d789b.exe 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 1248 FontCreator.tmp 1936 FontCreator.tmp 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3340 3dc5944b63.exe 3664 firefox.exe 3340 3dc5944b63.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
Jurisdiction.pif3dc5944b63.exefirefox.exepid process 2444 Jurisdiction.pif 2444 Jurisdiction.pif 2444 Jurisdiction.pif 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3340 3dc5944b63.exe 3664 firefox.exe 3664 firefox.exe 3340 3dc5944b63.exe 3664 firefox.exe 3340 3dc5944b63.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
v7wa24td.exepid process 2560 v7wa24td.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exeskotes.exe425b5d789b.exeaxplong.exesplwow64.execmd.exedescription pid process target process PID 2076 wrote to memory of 2816 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe skotes.exe PID 2076 wrote to memory of 2816 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe skotes.exe PID 2076 wrote to memory of 2816 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe skotes.exe PID 2076 wrote to memory of 2816 2076 67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe skotes.exe PID 2816 wrote to memory of 1684 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 1684 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 1684 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 1684 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 2964 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 2964 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 2964 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 2964 2816 skotes.exe skotes.exe PID 2816 wrote to memory of 1924 2816 skotes.exe 425b5d789b.exe PID 2816 wrote to memory of 1924 2816 skotes.exe 425b5d789b.exe PID 2816 wrote to memory of 1924 2816 skotes.exe 425b5d789b.exe PID 2816 wrote to memory of 1924 2816 skotes.exe 425b5d789b.exe PID 1924 wrote to memory of 3024 1924 425b5d789b.exe axplong.exe PID 1924 wrote to memory of 3024 1924 425b5d789b.exe axplong.exe PID 1924 wrote to memory of 3024 1924 425b5d789b.exe axplong.exe PID 1924 wrote to memory of 3024 1924 425b5d789b.exe axplong.exe PID 3024 wrote to memory of 2172 3024 axplong.exe stealc_default2.exe PID 3024 wrote to memory of 2172 3024 axplong.exe stealc_default2.exe PID 3024 wrote to memory of 2172 3024 axplong.exe stealc_default2.exe PID 3024 wrote to memory of 2172 3024 axplong.exe stealc_default2.exe PID 2816 wrote to memory of 3044 2816 skotes.exe 4f7cffe218.exe PID 2816 wrote to memory of 3044 2816 skotes.exe 4f7cffe218.exe PID 2816 wrote to memory of 3044 2816 skotes.exe 4f7cffe218.exe PID 2816 wrote to memory of 3044 2816 skotes.exe 4f7cffe218.exe PID 2816 wrote to memory of 300 2816 skotes.exe f24c652b6e.exe PID 2816 wrote to memory of 300 2816 skotes.exe f24c652b6e.exe PID 2816 wrote to memory of 300 2816 skotes.exe f24c652b6e.exe PID 2816 wrote to memory of 300 2816 skotes.exe f24c652b6e.exe PID 3024 wrote to memory of 1840 3024 axplong.exe Offnewhere.exe PID 3024 wrote to memory of 1840 3024 axplong.exe Offnewhere.exe PID 3024 wrote to memory of 1840 3024 axplong.exe Offnewhere.exe PID 3024 wrote to memory of 1840 3024 axplong.exe Offnewhere.exe PID 3024 wrote to memory of 2284 3024 axplong.exe splwow64.exe PID 3024 wrote to memory of 2284 3024 axplong.exe splwow64.exe PID 3024 wrote to memory of 2284 3024 axplong.exe splwow64.exe PID 3024 wrote to memory of 2284 3024 axplong.exe splwow64.exe PID 2284 wrote to memory of 1568 2284 splwow64.exe cmd.exe PID 2284 wrote to memory of 1568 2284 splwow64.exe cmd.exe PID 2284 wrote to memory of 1568 2284 splwow64.exe cmd.exe PID 2284 wrote to memory of 1568 2284 splwow64.exe cmd.exe PID 1568 wrote to memory of 2000 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 2000 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 2000 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 2000 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 1184 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1184 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1184 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1184 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1560 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 1560 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 1560 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 1560 1568 cmd.exe tasklist.exe PID 1568 wrote to memory of 1664 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1664 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1664 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 1664 1568 cmd.exe findstr.exe PID 1568 wrote to memory of 2312 1568 cmd.exe cmd.exe PID 1568 wrote to memory of 2312 1568 cmd.exe cmd.exe PID 1568 wrote to memory of 2312 1568 cmd.exe cmd.exe PID 1568 wrote to memory of 2312 1568 cmd.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
v7wa24td.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe -
outlook_win_path 1 IoCs
Processes:
v7wa24td.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe"C:\Users\Admin\AppData\Local\Temp\67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\1001698001\425b5d789b.exe"C:\Users\Admin\AppData\Local\Temp\1001698001\425b5d789b.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c md 1970368⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\findstr.exefindstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv8⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T8⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pifJurisdiction.pif T8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2444 -
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:744 -
C:\Users\Admin\AppData\Local\Temp\1000833001\29298a4dd2.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\29298a4dd2.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\1000857001\0866725587.exe"C:\Users\Admin\AppData\Local\Temp\1000857001\0866725587.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 527⤵
- Loads dropped DLL
- Program crash
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 527⤵
- Loads dropped DLL
- Program crash
PID:872 -
C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe"C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe"6⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2560 -
C:\Windows\system32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2160 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2116
-
C:\Windows\system32\netsh.exenetsh wlan show profiles8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:740 -
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"8⤵PID:2156
-
C:\Windows\system32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"7⤵PID:2272
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1768
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:896 -
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"8⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\1001523001\6eb604ff16.exe"C:\Users\Admin\AppData\Local\Temp\1001523001\6eb604ff16.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\1001524001\8bffec3ec8.exe"C:\Users\Admin\AppData\Local\Temp\1001524001\8bffec3ec8.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1001735001\4f7cffe218.exe"C:\Users\Admin\AppData\Local\Temp\1001735001\4f7cffe218.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\1001776101\f24c652b6e.exe"C:\Users\Admin\AppData\Local\Temp\1001776101\f24c652b6e.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- System Location Discovery: System Language Discovery
PID:300 -
C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\is-ITUGU.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-ITUGU.tmp\FontCreator.tmp" /SL5="$801CA,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\is-52QU9.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-52QU9.tmp\FontCreator.tmp" /SL5="$901CA,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1248 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"8⤵PID:2712
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\system32\find.exefind /I "wrsa.exe"9⤵PID:1480
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"8⤵PID:3032
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\system32\find.exefind /I "opssvc.exe"9⤵PID:944
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"8⤵PID:996
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\system32\find.exefind /I "avastui.exe"9⤵PID:2592
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"8⤵PID:1548
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\system32\find.exefind /I "avgui.exe"9⤵PID:1256
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"8⤵PID:824
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\system32\find.exefind /I "nswscsvc.exe"9⤵PID:1276
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"8⤵PID:2740
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2384 -
C:\Windows\system32\find.exefind /I "sophoshealth.exe"9⤵PID:2160
-
C:\Users\Admin\AppData\Local\hangbird\Updater.exe"C:\Users\Admin\AppData\Local\hangbird\\Updater.exe" "C:\Users\Admin\AppData\Local\hangbird\\caliculus.csv"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\IyASmY.a3x && del C:\ProgramData\\IyASmY.a3x9⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3496 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.110⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1712 -
C:\Users\Admin\AppData\Local\hangbird\Updater.exeupdater.exe C:\ProgramData\\IyASmY.a3x10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe11⤵
- System Location Discovery: System Language Discovery
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\is-RNMT7.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-RNMT7.tmp\FontCreator.tmp" /SL5="$7015C,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\is-RNDC5.tmp\FontCreator.tmp"C:\Users\Admin\AppData\Local\Temp\is-RNDC5.tmp\FontCreator.tmp" /SL5="$8015C,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1936 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"8⤵PID:1968
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\system32\find.exefind /I "wrsa.exe"9⤵PID:1928
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"8⤵PID:1456
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\system32\find.exefind /I "opssvc.exe"9⤵PID:888
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"8⤵PID:1912
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:984 -
C:\Windows\system32\find.exefind /I "avastui.exe"9⤵PID:2660
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"8⤵PID:1700
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\system32\find.exefind /I "avgui.exe"9⤵PID:308
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"8⤵PID:1764
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\system32\find.exefind /I "nswscsvc.exe"9⤵PID:1576
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"8⤵PID:2132
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\system32\find.exefind /I "sophoshealth.exe"9⤵PID:2792
-
C:\Users\Admin\AppData\Local\hangbird\Updater.exe"C:\Users\Admin\AppData\Local\hangbird\\Updater.exe" "C:\Users\Admin\AppData\Local\hangbird\\caliculus.csv"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\D52MRkJ4c.a3x && del C:\ProgramData\\D52MRkJ4c.a3x9⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4044 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.110⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3976 -
C:\Users\Admin\AppData\Local\hangbird\Updater.exeupdater.exe C:\ProgramData\\D52MRkJ4c.a3x10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe11⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\1003176001\giganticurtain.exe"C:\Users\Admin\AppData\Local\Temp\1003176001\giganticurtain.exe"4⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1003189001\1d395b0ffd.exe"C:\Users\Admin\AppData\Local\Temp\1003189001\1d395b0ffd.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\1003190001\3157632031.exe"C:\Users\Admin\AppData\Local\Temp\1003190001\3157632031.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\1003191001\3dc5944b63.exe"C:\Users\Admin\AppData\Local\Temp\1003191001\3dc5944b63.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3340 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3472 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:3656
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3664 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.0.499872875\422590818" -parentBuildID 20221007134813 -prefsHandle 1176 -prefMapHandle 1168 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {360e88d9-7d9c-4800-8c59-28cd1aa666d4} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 1244 106edb58 gpu7⤵PID:3816
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.1.1830315089\1019228193" -parentBuildID 20221007134813 -prefsHandle 1460 -prefMapHandle 1456 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {754d59fb-2a2e-418b-b348-cdfcf4b965fa} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 1472 7ae3d58 socket7⤵PID:3892
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.2.1179795083\1041535945" -childID 1 -isForBrowser -prefsHandle 2272 -prefMapHandle 2268 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55a91774-9f25-4a68-8006-1d3fef8f6f8e} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 2344 1728f658 tab7⤵PID:2328
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.3.289896718\371746994" -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 2764 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08e9d022-a26d-40f2-a714-6defecf13e93} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 2780 d2f958 tab7⤵PID:3188
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.4.1731287902\1451892659" -childID 3 -isForBrowser -prefsHandle 3524 -prefMapHandle 3528 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bcf146d-c87f-415d-a153-154ac96bac6b} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 3600 1f198958 tab7⤵PID:1676
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.5.1709650108\2039699701" -childID 4 -isForBrowser -prefsHandle 3740 -prefMapHandle 3744 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4087e35-020b-47db-8ba5-337bb4b01634} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 3836 1faa4258 tab7⤵PID:1632
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.6.1359097681\649732659" -childID 5 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da46e10c-799c-454f-9e9e-20c28057d926} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 3940 1faa2158 tab7⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\1003192001\num.exe"C:\Users\Admin\AppData\Local\Temp\1003192001\num.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
498KB
MD5bd2302f160b9895dd7bcf9c7dfa9bea7
SHA18fcb264280a30cc5f959d54ae75ae394054ca5a0
SHA2563eaff063360a89395b52681248a64aa2a8acca6da13eaa0194db004fa2a612c0
SHA5122847c9e4233a5f5a662027d46ee04eb4d79ad937fbdddc54b16e72547e34414094ff56bc08016fcf31ba5769cfca2d7849ad3edea438c57b34402f1e105852e6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5660a23874629434c1c7d25a74bf32168
SHA14706b2a5ded62a129df231b519da4893e45c4f70
SHA25624beb4fcfa253041be06d10a546960021da775e846bd97c6997db26f14026347
SHA51200d6ddc1a597f97fcf859931092e450611341b4b7cbfe863c6dbbfa609e2d478e141c9959cb05f8943b16517d48aa99a7b6dd44d195bc5d1a84cdeb37d116587
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
6.8MB
MD587e4e869971cec9573811040f6140157
SHA16308d9e243317a829d602c6a2f667fff6d05d148
SHA2560ad7e833d526131900916008913dec998360ee6d1a9aacf3997602e1cfc1c3e3
SHA51271f1040d823deb28361966e41f0cba63d735425edc83c9d790b1bffc2abe97eb5fe2642358b0aa3b9a505230d87049c0d36f84e58499575d2d5983926df0e881
-
Filesize
1.2MB
MD55d97c2475c8a4d52e140ef4650d1028b
SHA1da20d0a43d6f8db44ff8212875a7e0f7bb223223
SHA256f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf
SHA51222c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee
-
Filesize
5.7MB
MD55009b1ef6619eca039925510d4fd51a1
SHA122626aa57e21291a995615f9f6bba083d8706764
SHA256fbc8c32bf799a005c57540a2e85dd3662ed5795a55f11495f0ba569bbb09df59
SHA5122b5bbd9449be00588058966db487c0adfac764827a6691f6a9fc6c3a770a93bda11c732d2eb2a3c660697cbc69b1c71a2bf76d2957f65cd2599fb28098b24f14
-
Filesize
514KB
MD526d8d52bac8f4615861f39e118efa28d
SHA1efd5a7ccd128ffe280af75ec8b3e465c989d9e35
SHA2568521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f
SHA5121911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733
-
Filesize
2.8MB
MD5c3d2258f659a0eda9dbd5f5497119331
SHA126870ac488181281690883dc7494fdfc64c9bc77
SHA256e0e29a0f0a42cbee836f0e430a98dadae6937d5983971162bdccffe794a67702
SHA512401e1a870935429f8cf9c4ed18d996ec7f73fdf9034e02069be249fc9bd35db0ca7a7ae1e03f8ea23a25715230b82c0055efc2032ea2dd1e8d6afcdeb7c986d8
-
Filesize
645KB
MD5bdf3c509a0751d1697ba1b1b294fd579
SHA13a3457e5a8b41ed6f42b3197cff53c8ec50b4db2
SHA256d3948ae31c42fcba5d9199e758d145ff74dad978c80179afb3148604c254be6d
SHA512aa81ccbae9f622531003f1737d22872ae909b28359dfb94813a39d74bde757141d7543681793102a1dc3dcaecea27cffd0363de8bbb48434fcf8b6dafef320b3
-
Filesize
327KB
MD5fba8f56206955304b2a6207d9f5e8032
SHA1f84cbcc3e34f4d2c8fea97c2562f937e1e20fe28
SHA25611227ead147b4154c7bd21b75d7f130b498c9ad9b520ca1814c5d6a688c89b1b
SHA51256e3a0823a7abe08e1c9918d8fa32c574208b462b423ab6bde03345c654b75785fdc3180580c0d55280644b3a9574983e925f2125c2d340cf5e96b98237e99fa
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
-
Filesize
649KB
MD5e3d038ee8743eeb4759105852f8c9973
SHA1c029f68a065ecbaf124f2d8569fc3d097cff8da9
SHA256250784e06ac98ad9183950ef5ec3549c2a5e2ffb0306f167ae84c4cb55b12922
SHA512f45ba1d08582ad5daf8b09faa52807169542b29054204da2e346f9dbd84d93041452503ec87617979b326a3d9e00efe18fe7cc6baa377c6e99327161bb886445
-
Filesize
772KB
MD56782ce61039f27f01fb614d3069c7cd0
SHA16870c4d274654f7a6d0971579b50dd9dedaa18ad
SHA25611798c5a66618d32e2666009fb1f4569ae8b2744fa0278f915f5c1eefb1fd98d
SHA51290fc316784eba2e553c2658ac348e6fcb4ab6987209d51e83c1d39d7a784ca0f18729349904bac6d92d3b163ce9f0270369a38eac8c9541ae211d74bce794938
-
Filesize
2.1MB
MD5f2fde55b62096ed86a482be7a857d88f
SHA179b18ae386502bd64513a726a9eb550bf35da901
SHA256282024971a72245b40a88f0f1a48d42db5d0dddb9d8885a29c7b3c4f819bb823
SHA51265f74b8baf93a4bae7475e6b442caace4b61b4a2906ada286ce08290e33c5310f9233d69782af4530e86192bb7290ed9653900cb024bfe2ed47da1509de10c63
-
Filesize
1.8MB
MD51203696d83758b3438ef94136fa2322d
SHA178bc38b6f5fbf128fc379d5a8d9d39a5ad1071b0
SHA2564d49c464b47c67b27603332e141c74c176326c01f7ccadeef23fc70ac7285826
SHA5124ad942d9c38375cf138d137e1e44ca1136683513b84280979c81b80961ce548d117f5f2dbee4d666fee664076b44bacdd367069f6118f6c5e8118aa1c32684af
-
Filesize
2.6MB
MD58017057cedbae4c7edf80746781c94f6
SHA143a576a4871c8c35c36d88323121c00f2335e8f3
SHA2569ab2049e0c7c20b13da32338d5876c18f0d16d70b4ec29d27dc4804e2b8ed103
SHA512180612f6999db2452d80941ec4b55c98fb3411d1b8eccce64ac00512efb32b7e4fb347644c2b29bd10635ad08f197bd6ccf34fb317d7adb39d8a125632bd5502
-
Filesize
5.9MB
MD56fdf2cdf68ab1880aa76e7938e241fa3
SHA1affc9a0aea771ad101357cc728951f5938b5e4e6
SHA256e61ce90df13402909985f5312fdef798736eb10e0b5b6b280fb826538e7a597a
SHA5127e649db70d39a135cd86a837308fb304f16c904456ca3b97a70b8f8b1fd617291de8974aab3808ac67e5d2f7e9efa3840bbdeba1e3558de33587c7ff94ce231d
-
Filesize
2.7MB
MD5002423f02fdc16eb81ea32ee8fa26539
SHA18d903daf29dca4b3adfb77e2cee357904e404987
SHA2567c8094149aa2ce7213c423e2577785feeee8b7ca07d88a4d4bf3806d1d122ea2
SHA512c45bdd276ed5b504ae27ab0977110cbe30290623deccf8a40bcddf0c3a9082ace240f060483b89534fc4f686edd3ce3d4de3894201cceaaba9d66b52685938f9
-
Filesize
2.8MB
MD5c0d39d5e38b55cde6047311bee378a32
SHA1f3a4482abc089359f68004170a17359e8342ae7d
SHA2565d3a5d1516589d0d8fd04519d690dcc6d0d1567e5cdb473745261af0df5fdc97
SHA512a25c628691b05b97757a1f1fbc6a92e1d8fecbc70830bc367c1e11f9134493752c96244fa43bd75f65b86efb2ea216a3ca37759804f606fb6fd7989141203f02
-
Filesize
898KB
MD58346173ae03c022fbed2fd1658fe57cf
SHA173f05f5f87026f5b383cf5c29c4b886a9e708a55
SHA256d6b1f7fc959c530d6fac50ae25944d8b7458005241c23f8444b4670bc6e41090
SHA5129fe533a8409e478f85514c24f98823892d56568c9294a6a71cd6c0a263b3f4bbc7ac3d8098b0508873540b1008d6960671f5512889c1fcfa260a1450f21ecf3f
-
Filesize
868KB
MD5f793d9e588c6bf51f1daf523ab2df1ce
SHA1f63ce1f9eee9f3ae643e270c7fc854dc51d730d0
SHA256a8addc675fcc27c94ff9e4775bb2e090f4da1287aae6b95cecc65ccf533bc61d
SHA5124d0d8bf366f4b4793154f31aee4983df307b97edc83608b76628168418d48227eb46f6213469eb4d3a088d891a143b30b3b02acbb194df834da1b61d182607eb
-
Filesize
87KB
MD593397046ed0716144ed24cd03f7bbcc3
SHA1daebc5faaa5b993c4be3695a46ac13631efd1cb2
SHA256f67d080c32c6b2db113a20a1ee24e4a398b9d82aa899158ca9c30353199e513e
SHA51252d34cd9b4946fd6a600e0f99d63ed97fc4d982c44e769f40a7550e6a2209308726c28515f8af2aedb8343b1aad6ba845059780b25108f1c5f156e4c3364e2d9
-
Filesize
580KB
MD54b0812fabc1ba34d8d45d28180f6c75f
SHA1b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950
SHA25673312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103
SHA5127f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158
-
Filesize
24KB
MD52a84a77ad125a30e442d57c63c18e00e
SHA168567ee0d279087a12374c10a8b7981f401b20b8
SHA2560c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769
SHA5129d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
62KB
MD546a51002cdbe912d860ce08c83c0376b
SHA16d0ae63850bd8d5c86e45cba938609a7f051f59b
SHA25618070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017
SHA512ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44
-
Filesize
69KB
MD58ca4bbb4e4ddf045ff547cb2d438615c
SHA13e2fc0fdc0359a08c7782f44a5ccebf3a52b5152
SHA2564e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed
SHA512b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9
-
Filesize
7KB
MD5f3d7abb7a7c91203886dd0f2df4fc0d6
SHA160ffbb095fceeb2ea2b9e65355e9dbf1de736d6c
SHA2565867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3
SHA5129af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367
-
Filesize
58KB
MD584c831b7996dfc78c7e4902ad97e8179
SHA1739c580a19561b6cde4432a002a502bea9f32754
SHA2561ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575
SHA512ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991
-
Filesize
80KB
MD50814e2558c8e63169d393fac20c668f9
SHA152e8b77554cc098410408668e3d4f127fa02d8bd
SHA256cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d
SHA51280e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319
-
Filesize
71KB
MD56785e2e985143a33c5c3557788f12a2b
SHA17a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0
SHA25666bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7
SHA5123edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91
-
Filesize
865KB
MD56cee6bd1b0b8230a1c792a0e8f72f7eb
SHA166a7d26ed56924f31e681c1af47d6978d1d6e4e8
SHA25608ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab
SHA5124d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
95KB
MD5ba8c4239470d59c50a35a25b7950187f
SHA1855a8f85182dd03f79787147b73ae5ed61fb8d7b
SHA256a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b
SHA5121e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0
-
Filesize
92KB
MD52759c67bccd900a1689d627f38f0a635
SHA1d71b170715ed2b304167545af2bd42834ccf1881
SHA256510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05
SHA512aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e
-
Filesize
53KB
MD579156afddd310be36f037a8f0708a794
SHA109ef36ae22b5eab65d1f62166542601b8919399d
SHA2567faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503
SHA512d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5b2a0fdbc8547f1859ed05fe8c46f7cfb
SHA1a84f2ce1514e74fcfd567ed73a998a29f3218c61
SHA2566e3b09de28110b0dbe20e101b651ee5a1fd85fba4609a6c31a9dddd8a62cbf7d
SHA5124ec472fdae32c8239f07028fb4cee078e5a52efc3cfcc2622458646effa8e7afdfbc34a1d61f9db6c6574ae9ccfd7a2aa214fa51f1529380848702d96a508412
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\0035ca70-2af2-4373-a404-dc9c2d99a143
Filesize12KB
MD5d681ddd5074e7947307e7cfbffaaef1e
SHA15ed9904b7f023b5770fe464cacc55fd0175f5e26
SHA256b46e72d58673e9237ac75d87cb776b6fcecde94c38d69184f249fa2130b73122
SHA512d345c14c4c0a461e7c6d69d9ab8fb12948abe6db060478739fa2af67abddf61db2b9a4e759cb94329e98697368e224caabe0040d37e54f8cdbdc524e9b20622d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\cbdac662-7ddc-4883-8950-ea44df059a2e
Filesize745B
MD5b2dfbca197bed37a9fe2f4d529805c28
SHA1cb62b40e723aa149173697d782b8f899bd5ff232
SHA256482184eac3f34f93f3a02ee4da5d8c5d772d2b83232a76bdfc600627b234f542
SHA512e4a8447279ec788aedc669d31f51e018d380122e3f2f199041df356a6aae7a116ff4ae6370f2799daaaa5b13b72b2f18a3f43c887ed7793403e8bf8c97eecad5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5f42b9de861737f4379ffdfd117527abb
SHA1eacc69ac2f2379a8885f38927640ca91066514f7
SHA256672003034499aba4d911badf2dc79397182b8403a7b2a6ed9249f709c4b4bfda
SHA512f4fcc436db5d338528dcb9fc52aa0c6ff4551101b0b7807e84086868671cceae40d64fcc4197b61ee65e7ba5aa48350bfde89f248689bd321ac00ca83fa1be08
-
Filesize
7KB
MD55026fe2d1cb19d6146c8026283b9163e
SHA13662689666f61a4c6dd7c4cc607ceaa1c864a7e3
SHA2562f10ad30fdd7505272a36b532aa2f5244cf9e94a6016ee61277e07e6c42a4fb4
SHA5126d320947f279862ce5ad2461601d59282452df6fe454e42dbfc27dd3e71b3ac0cb7a476d3ef9ae0baf0c9819f5ad96635546565684bbeaacb4b1fb607c1ca993
-
Filesize
6KB
MD58993254ced3cee17ec9b5c1329fd9bb4
SHA1c418fa64d671fdbaf0c1bd438afcc8846db54261
SHA256bc5279e9a75fe5464293dea48747ecb1e3d94763216dbc718cb1e1a361b3fb5d
SHA512378be0191d33ef5058a06f523b68ff7cd706598aa95814015f47efbc88749dd419ca3a0203a95af7834c010e42a55b53bd2bd7aaa6e2e6e00dbab3b59d44c973
-
Filesize
6KB
MD5b1a9d1c8107215728e3c79dfb29ebce2
SHA1f0d0a3453b19fb797bed4e44732665f1c9205394
SHA256b3d9fd33928a574d2256a2c62b3c62077296d9278765a6515ed5a7dbfc580eeb
SHA5127f3bbb041be76e2a3df1ac25637c79bc6666b089837258b2aa9665c824720f40571fc9ab009c032f587443fcafc2752bc204b36874b06bd37356c3c7627f9381
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59c870deac09b1bb436f7860cdee6c666
SHA1da8012fb3f33b9d3968b3d926c12edcb7cbdd5dd
SHA256e3fd2bfc4fcf3e5670c044349aad10d92a08568711a6233b02c462ba0772828f
SHA512854c986db6d90fe34b3b3c3e9dc6160118fded7ba8b2e049133ad49cfcf89e78eae8a32766a0fdfcf712aa1e658e5a835e3ef4fa47b9287d11cc47eb95cf45ae
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
1.8MB
MD5b0947367f4ee69a28851b851dc14422f
SHA16b0d41bc9de6af9fb99259bbb9d8509137649a1f
SHA25667c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50
SHA512781836587c5621f685deb701d1161b2ee8040bcd0dbdeba73989a931bb113869e8955f3d88df6d0f4fb4726b11c0da06ca2550b1d69a113091d7476d1dbf1e88
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
3.2MB
MD5945ec37b9971c5e9f26fafad6edfd46e
SHA135aeeedfab069194aa41f64df0e96780c30837b4
SHA256c2e55aa7241dde41ed9690bd369e62a49d78ad2662c500509ff88ff8342a487f
SHA512283f3e98def0b0f249c5b7cb1d6c0deb6fe922d3d4a68edf180e791a96f7c18c678e7b4848b5fb03b6c25038be9850b815b426674a93ea410c430cb261a3f226