Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe
Resource
win10v2004-20241007-en
General
-
Target
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe
-
Size
1.8MB
-
MD5
b58725b0a514974aae36a20730adc4b3
-
SHA1
a99eb4395fc9a95cad952a7d4bd444fb3baa9103
-
SHA256
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
-
SHA512
21ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
SSDEEP
49152:ugpWvpPq4PRzgbjv65CIjyoNaA1bKGfBMK:usWvzgbkaA1TSK
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://moutheventushz.shop/api
https://respectabosiz.shop/api
https://bakedstusteeb.shop/api
https://conceszustyb.shop/api
https://nightybinybz.shop/api
https://standartedby.shop/api
https://mutterissuen.shop/api
https://worddosofrm.shop/api
https://terracedjz.cyou
https://servicedny.site
https://authorisev.site
https://faulteyotk.site
https://dilemmadu.site
https://contemteny.site
https://goalyfeastz.site
https://opposezmny.site
https://seallysl.site
https://computeryrati.site
Extracted
amadey
5.03
7c4393
http://185.215.113.217
-
install_dir
f9c76c1660
-
install_file
corept.exe
-
strings_key
9808a67f01d2f0720518035acbde7521
-
url_paths
/CoreOPT/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2600-954-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Jurisdiction.pifdescription pid Process procid_target PID 4148 created 3424 4148 Jurisdiction.pif 56 PID 4148 created 3424 4148 Jurisdiction.pif 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exeaxplong.exe590b41b536.exe60064fd193.exeaxplong.exeaxplong.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 590b41b536.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60064fd193.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wuwfudeaee\ImagePath = "C:\\Users\\Admin\\AppData\\Roaming\\Fbhost_alpha\\Newfts.exe" explorer.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid Process 5064 chrome.exe 4988 chrome.exe 4740 chrome.exe 4088 chrome.exe 4988 chrome.exe 4788 chrome.exe 3852 chrome.exe 4064 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
590b41b536.exe60064fd193.exeaxplong.exea64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exeaxplong.exeaxplong.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 590b41b536.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60064fd193.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60064fd193.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 590b41b536.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exeAllNew.exesplwow64.exeGxtuum.exeJavvvum.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation AllNew.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation splwow64.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Javvvum.exe -
Drops startup file 3 IoCs
Processes:
cmd.exe989dea4af7.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ogriIqEF.url 989dea4af7.exe -
Executes dropped EXE 31 IoCs
Processes:
axplong.exestealc_default2.exeAllNew.exeGxtuum.exesplwow64.exe989dea4af7.exeJurisdiction.pif6nteyex7.exeaxplong.exeGxtuum.exeji2xlo1f.exeJavvvum.exestail.exe6nteyex7.exestail.tmpha7dur10.exeha7dur10.exedmn6qzwr.exeavidenta.exe590b41b536.exe60064fd193.exe74cccb4afe.exeNewfts.exeservice123.exeaxplong.exeGxtuum.exeNewfts.exetcpvcon.exeaxplong.exeGxtuum.exeservice123.exepid Process 372 axplong.exe 2960 stealc_default2.exe 2596 AllNew.exe 4924 Gxtuum.exe 772 splwow64.exe 888 989dea4af7.exe 4148 Jurisdiction.pif 400 6nteyex7.exe 3636 axplong.exe 1588 Gxtuum.exe 1348 ji2xlo1f.exe 2600 Javvvum.exe 4516 stail.exe 1452 6nteyex7.exe 4212 stail.tmp 672 ha7dur10.exe 3320 ha7dur10.exe 4428 dmn6qzwr.exe 1680 avidenta.exe 468 590b41b536.exe 776 60064fd193.exe 540 74cccb4afe.exe 3940 Newfts.exe 2488 service123.exe 1640 axplong.exe 1728 Gxtuum.exe 4180 Newfts.exe 5384 tcpvcon.exe 4400 axplong.exe 416 Gxtuum.exe 1332 service123.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exeaxplong.exe590b41b536.exe60064fd193.exeaxplong.exeaxplong.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 590b41b536.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 60064fd193.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine axplong.exe -
Loads dropped DLL 14 IoCs
Processes:
stealc_default2.exestail.tmpha7dur10.exeNewfts.exeservice123.exeNewfts.exeservice123.exepid Process 2960 stealc_default2.exe 2960 stealc_default2.exe 4212 stail.tmp 3320 ha7dur10.exe 3940 Newfts.exe 3940 Newfts.exe 3940 Newfts.exe 3940 Newfts.exe 2488 service123.exe 4180 Newfts.exe 4180 Newfts.exe 4180 Newfts.exe 4180 Newfts.exe 1332 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\60064fd193.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002897001\\60064fd193.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\74cccb4afe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002898001\\74cccb4afe.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023d46-986.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid Process 536 tasklist.exe 1240 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exeaxplong.exe590b41b536.exe60064fd193.exeaxplong.exeaxplong.exepid Process 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 372 axplong.exe 3636 axplong.exe 468 590b41b536.exe 776 60064fd193.exe 1640 axplong.exe 4400 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
6nteyex7.exe989dea4af7.exeNewfts.exedescription pid Process procid_target PID 400 set thread context of 1452 400 6nteyex7.exe 127 PID 888 set thread context of 2756 888 989dea4af7.exe 201 PID 4180 set thread context of 5384 4180 Newfts.exe 202 -
Drops file in Program Files directory 5 IoCs
Processes:
chrome.exechrome.exeexplorer.exedescription ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe explorer.exe -
Drops file in Windows directory 9 IoCs
Processes:
AllNew.exesplwow64.exetcpvcon.exea64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exedescription ioc Process File created C:\Windows\Tasks\Gxtuum.job AllNew.exe File opened for modification C:\Windows\LuggageRepresentations splwow64.exe File opened for modification C:\Windows\HomelessLaser splwow64.exe File created C:\Windows\Tasks\uninstallBeacon.job tcpvcon.exe File created C:\Windows\Tasks\axplong.job a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe File opened for modification C:\Windows\AdditionsSalvation splwow64.exe File opened for modification C:\Windows\SixCream splwow64.exe File opened for modification C:\Windows\ActuallyFtp splwow64.exe File opened for modification C:\Windows\EauOfficial splwow64.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cdc-790.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 4660 400 WerFault.exe 118 5428 776 WerFault.exe 142 5416 2600 WerFault.exe 124 -
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exefindstr.exechoice.execmd.exestail.exedmn6qzwr.exetaskkill.exeschtasks.exetcpvcon.exestealc_default2.exeAllNew.exeJavvvum.exestail.tmpNewfts.exeservice123.exefindstr.exefindstr.exeha7dur10.exenet.exe590b41b536.exetaskkill.exeNewfts.exeGxtuum.exesplwow64.exetasklist.exeschtasks.exeaxplong.exe6nteyex7.exenet1.exe60064fd193.exea64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.execmd.exetasklist.exeJurisdiction.pifcmd.exe6nteyex7.exeavidenta.exe74cccb4afe.exetaskkill.exeexplorer.execmd.exeji2xlo1f.exetaskkill.exepowershell.exeha7dur10.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmn6qzwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpvcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AllNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Javvvum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 590b41b536.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6nteyex7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60064fd193.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jurisdiction.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6nteyex7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avidenta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74cccb4afe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ji2xlo1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 34 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exefirefox.exe60064fd193.exefirefox.exestealc_default2.exeJavvvum.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 60064fd193.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor explorer.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 60064fd193.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Javvvum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Javvvum.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3256 taskkill.exe 736 taskkill.exe 5212 taskkill.exe 5276 taskkill.exe 5356 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4284 schtasks.exe 1140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exestealc_default2.exeJurisdiction.pifaxplong.exestail.tmp590b41b536.exe60064fd193.exe74cccb4afe.exechrome.exechrome.exepid Process 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 372 axplong.exe 372 axplong.exe 2960 stealc_default2.exe 2960 stealc_default2.exe 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 3636 axplong.exe 3636 axplong.exe 2960 stealc_default2.exe 2960 stealc_default2.exe 4212 stail.tmp 4212 stail.tmp 468 590b41b536.exe 468 590b41b536.exe 776 60064fd193.exe 776 60064fd193.exe 776 60064fd193.exe 776 60064fd193.exe 776 60064fd193.exe 776 60064fd193.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 5064 chrome.exe 5064 chrome.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Newfts.exetcpvcon.exepid Process 4180 Newfts.exe 5384 tcpvcon.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exechrome.exepid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
tasklist.exetasklist.exetaskkill.exetaskkill.exechrome.exetaskkill.exetaskkill.exetaskkill.exefirefox.exechrome.exe989dea4af7.exetcpvcon.exepowershell.exeexplorer.exedescription pid Process Token: SeDebugPrivilege 1240 tasklist.exe Token: SeDebugPrivilege 536 tasklist.exe Token: SeDebugPrivilege 3256 taskkill.exe Token: SeDebugPrivilege 736 taskkill.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeDebugPrivilege 5212 taskkill.exe Token: SeDebugPrivilege 5276 taskkill.exe Token: SeDebugPrivilege 5356 taskkill.exe Token: SeDebugPrivilege 5432 firefox.exe Token: SeDebugPrivilege 5432 firefox.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeDebugPrivilege 888 989dea4af7.exe Token: SeDebugPrivilege 5384 tcpvcon.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 3820 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeJurisdiction.pifstail.tmp74cccb4afe.exechrome.exefirefox.exepid Process 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4212 stail.tmp 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 540 74cccb4afe.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
Jurisdiction.pif74cccb4afe.exefirefox.exepid Process 4148 Jurisdiction.pif 4148 Jurisdiction.pif 4148 Jurisdiction.pif 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 540 74cccb4afe.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 5432 firefox.exe 540 74cccb4afe.exe 540 74cccb4afe.exe 540 74cccb4afe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 5432 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exeAllNew.exesplwow64.execmd.exeJurisdiction.pifcmd.exeGxtuum.exedescription pid Process procid_target PID 4236 wrote to memory of 372 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 86 PID 4236 wrote to memory of 372 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 86 PID 4236 wrote to memory of 372 4236 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 86 PID 372 wrote to memory of 2960 372 axplong.exe 89 PID 372 wrote to memory of 2960 372 axplong.exe 89 PID 372 wrote to memory of 2960 372 axplong.exe 89 PID 372 wrote to memory of 2596 372 axplong.exe 92 PID 372 wrote to memory of 2596 372 axplong.exe 92 PID 372 wrote to memory of 2596 372 axplong.exe 92 PID 2596 wrote to memory of 4924 2596 AllNew.exe 93 PID 2596 wrote to memory of 4924 2596 AllNew.exe 93 PID 2596 wrote to memory of 4924 2596 AllNew.exe 93 PID 372 wrote to memory of 772 372 axplong.exe 94 PID 372 wrote to memory of 772 372 axplong.exe 94 PID 372 wrote to memory of 772 372 axplong.exe 94 PID 772 wrote to memory of 1560 772 splwow64.exe 97 PID 772 wrote to memory of 1560 772 splwow64.exe 97 PID 772 wrote to memory of 1560 772 splwow64.exe 97 PID 372 wrote to memory of 888 372 axplong.exe 102 PID 372 wrote to memory of 888 372 axplong.exe 102 PID 1560 wrote to memory of 1240 1560 cmd.exe 103 PID 1560 wrote to memory of 1240 1560 cmd.exe 103 PID 1560 wrote to memory of 1240 1560 cmd.exe 103 PID 1560 wrote to memory of 3612 1560 cmd.exe 104 PID 1560 wrote to memory of 3612 1560 cmd.exe 104 PID 1560 wrote to memory of 3612 1560 cmd.exe 104 PID 1560 wrote to memory of 536 1560 cmd.exe 105 PID 1560 wrote to memory of 536 1560 cmd.exe 105 PID 1560 wrote to memory of 536 1560 cmd.exe 105 PID 1560 wrote to memory of 4552 1560 cmd.exe 106 PID 1560 wrote to memory of 4552 1560 cmd.exe 106 PID 1560 wrote to memory of 4552 1560 cmd.exe 106 PID 1560 wrote to memory of 4432 1560 cmd.exe 107 PID 1560 wrote to memory of 4432 1560 cmd.exe 107 PID 1560 wrote to memory of 4432 1560 cmd.exe 107 PID 1560 wrote to memory of 2736 1560 cmd.exe 108 PID 1560 wrote to memory of 2736 1560 cmd.exe 108 PID 1560 wrote to memory of 2736 1560 cmd.exe 108 PID 1560 wrote to memory of 5068 1560 cmd.exe 109 PID 1560 wrote to memory of 5068 1560 cmd.exe 109 PID 1560 wrote to memory of 5068 1560 cmd.exe 109 PID 1560 wrote to memory of 4148 1560 cmd.exe 110 PID 1560 wrote to memory of 4148 1560 cmd.exe 110 PID 1560 wrote to memory of 4148 1560 cmd.exe 110 PID 1560 wrote to memory of 512 1560 cmd.exe 111 PID 1560 wrote to memory of 512 1560 cmd.exe 111 PID 1560 wrote to memory of 512 1560 cmd.exe 111 PID 4148 wrote to memory of 3908 4148 Jurisdiction.pif 112 PID 4148 wrote to memory of 3908 4148 Jurisdiction.pif 112 PID 4148 wrote to memory of 3908 4148 Jurisdiction.pif 112 PID 4148 wrote to memory of 1324 4148 Jurisdiction.pif 114 PID 4148 wrote to memory of 1324 4148 Jurisdiction.pif 114 PID 4148 wrote to memory of 1324 4148 Jurisdiction.pif 114 PID 3908 wrote to memory of 4284 3908 cmd.exe 116 PID 3908 wrote to memory of 4284 3908 cmd.exe 116 PID 3908 wrote to memory of 4284 3908 cmd.exe 116 PID 372 wrote to memory of 400 372 axplong.exe 118 PID 372 wrote to memory of 400 372 axplong.exe 118 PID 372 wrote to memory of 400 372 axplong.exe 118 PID 372 wrote to memory of 1348 372 axplong.exe 122 PID 372 wrote to memory of 1348 372 axplong.exe 122 PID 372 wrote to memory of 1348 372 axplong.exe 122 PID 4924 wrote to memory of 2600 4924 Gxtuum.exe 124 PID 4924 wrote to memory of 2600 4924 Gxtuum.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe"C:\Users\Admin\AppData\Local\Temp\a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\1000477001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\AllNew.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\10000220101\Javvvum.exe"C:\Users\Admin\AppData\Local\Temp\10000220101\Javvvum.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff85fc2cc40,0x7ff85fc2cc4c,0x7ff85fc2cc588⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:28⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1804,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:38⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2288 /prefetch:88⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:18⤵
- Uses browser remote debugging
PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3292 /prefetch:18⤵
- Uses browser remote debugging
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:18⤵
- Uses browser remote debugging
PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:88⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4284,i,6361226677264017714,6961639021393676677,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:88⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 10927⤵
- Program crash
PID:5416
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000231101\stail.exe"C:\Users\Admin\AppData\Local\Temp\10000231101\stail.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\is-EHSGQ.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-EHSGQ.tmp\stail.tmp" /SL5="$D017C,5276717,721408,C:\Users\Admin\AppData\Local\Temp\10000231101\stail.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4212 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause avidenta_111318⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause avidenta_111319⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Avidenta 2.7.7\avidenta.exe"C:\Users\Admin\AppData\Local\Avidenta 2.7.7\avidenta.exe" -i8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"6⤵
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1970366⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv6⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T6⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pifJurisdiction.pif T6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000833001\989dea4af7.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\989dea4af7.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"5⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"5⤵PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000965001\6nteyex7.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\6nteyex7.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Local\Temp\1000965001\6nteyex7.exe"C:\Users\Admin\AppData\Local\Temp\1000965001\6nteyex7.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 2525⤵
- Program crash
PID:4660
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\ji2xlo1f.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\ji2xlo1f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:672 -
C:\Windows\Temp\{EBDE3EA3-CB53-4DF2-8F0E-F7133E626726}\.cr\ha7dur10.exe"C:\Windows\Temp\{EBDE3EA3-CB53-4DF2-8F0E-F7133E626726}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5485⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\Temp\{27FE5F08-6FA4-4CF8-8218-171C4B21EAB0}\.ba\Newfts.exe"C:\Windows\Temp\{27FE5F08-6FA4-4CF8-8218-171C4B21EAB0}\.ba\Newfts.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exeC:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4180 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe"C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5384 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe9⤵
- Sets service image path in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe10⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\565ba04e.exeC:\Users\Admin\AppData\Local\Temp\565ba04e.exe10⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Polymorphres1111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Polymorphres1111.exe11⤵PID:4780
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"12⤵PID:4336
-
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"12⤵PID:2028
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002811001\dmn6qzwr.exe"C:\Users\Admin\AppData\Local\Temp\1002811001\dmn6qzwr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\590b41b536.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\590b41b536.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\1002897001\60064fd193.exe"C:\Users\Admin\AppData\Local\Temp\1002897001\60064fd193.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff860f9cc40,0x7ff860f9cc4c,0x7ff860f9cc586⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:26⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:36⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2236 /prefetch:86⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:16⤵
- Uses browser remote debugging
PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3356,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3376 /prefetch:16⤵
- Uses browser remote debugging
PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:16⤵
- Uses browser remote debugging
PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:86⤵
- Drops file in Program Files directory
PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,10478912726041120968,208974436482585071,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4868 /prefetch:86⤵
- Drops file in Program Files directory
PID:5140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 14805⤵
- Program crash
PID:5428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002898001\74cccb4afe.exe"C:\Users\Admin\AppData\Local\Temp\1002898001\74cccb4afe.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:540 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:5416
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5432 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a82b00f5-0b08-4437-aec8-5321344ccfbe} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" gpu7⤵PID:5608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {634eddcb-99c9-4303-938a-8443597a8054} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" socket7⤵PID:5672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3104 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3092 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 888 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29193ec2-fe52-4c16-8512-b69031172825} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" tab7⤵PID:5844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4168 -childID 2 -isForBrowser -prefsHandle 4132 -prefMapHandle 4128 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 888 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {48e62af1-feb1-4338-8b6b-a25e3cd0601f} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" tab7⤵PID:6088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4808 -prefMapHandle 2788 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f46ed932-4760-46d2-a71e-8e13aeccb84e} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" utility7⤵
- Checks processor information in registry
PID:4824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5252 -childID 3 -isForBrowser -prefsHandle 5168 -prefMapHandle 5232 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 888 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5425603e-1ffc-4a81-a4a9-5dbc372f34ec} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" tab7⤵PID:5264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 4 -isForBrowser -prefsHandle 5380 -prefMapHandle 5260 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 888 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd218383-2b89-4655-97b3-c193933e1d65} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" tab7⤵PID:5164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 5 -isForBrowser -prefsHandle 5600 -prefMapHandle 4380 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 888 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d581351d-497c-4a72-b9c5-0f95f1ca5ffa} 5432 "\\.\pipe\gecko-crash-server-pipe.5432" tab7⤵PID:5148
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 400 -ip 4001⤵PID:3312
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4836
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 776 -ip 7761⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2600 -ip 26001⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1728
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4400
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:416
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3.5MB
MD5a522905c3c4210e35704bfc033e21161
SHA1f76452c87ae44004607f7c33bb9389701c692944
SHA25648e4f9fb2e28adbf455d091aaf996abe503c3d23e2cbece0649f3c4dafea6159
SHA512077e62875e2551292ca48538bc60df2f7b034815be6f2c0793acb69b48629b7adf706ef90cba67db01d7942a7ddf364826036d5c21590dfc0d471667b37813bf
-
Filesize
40B
MD51fd21a5228803360e7498b21377bd349
SHA1c028d9a423b995bb2f9d9b56ef09e5a4f9535b38
SHA256920270c469d0fdd572881597d30bae6f24faec32c8a1e7e689186947ac7958d3
SHA512c2324e1b0a32c3d4abdac5ee1c2e663d1e49c24c17f0b5a5dac56cc867f67d2665f29148de2773f2e048292b189d136876b557ae9837517f612155633cbb09b2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5452e7185b107b3b8a0776b13df8dc277
SHA1ebcbc3fcee6091562c6212fa7dd121904162017b
SHA256f56112a4ca4c141cdbb8ea8964c73630916a90e784d7bb1f0a5bd818f01748d5
SHA5123e7d04065a134a2687c6ae01d4342f132bf95dac253f91b607851ee34c7ca39837d261cbf1ab6b68e70c20c374a66b94f298770b4773d7d73283049fe8d26c68
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD599b3b1232b407f7fc2df37174d4bfbe4
SHA171cdd8a1ebe08f9c2762e47b3030a4093528ddf7
SHA2562eef51d89cb3c3736bdad3e0876144c1786a889ad685980c437a8acc04196ab2
SHA5125aee280b67ec33019ed5f57d05a623f6c705d18644179fbcc52b9838f6a674f5d628f4f1ec0b0b430dd798f7cfa8f54bc9c5261215c8e95b0825227b431d383c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD59617ece19514be2c929956c030c0ef4e
SHA135abc99347969b95f85c126febe06b947f1addb8
SHA256608a0e9ea468b49ba015d8adad9411a72cce8183e8ea9858f871bdff34af5855
SHA51255f70f16941dd838b2b2bb5a0289e69a05c860f7ed0ee1410626cbb7cee8766ad54fc7ef9cc67678e226a7024d43d581b8eaef83644c22dd28bc4f983def19f9
-
Filesize
96KB
MD5a8991c4387f8cbafe6979b1155ddf833
SHA1698f50cff86972759b5b1b9b7f3c4f4f39c2c9c8
SHA256cabfe360ff2f121f166bfd31510fe01a19bddb74e8e3b0596588171032c40956
SHA5124f35aa77c9c89d91311dbc369cc372d22b253a3f2e23373b675f959d9435c0930a23c1f9f865505ec86ea5b5b964614371faad181ec287e4c20067e5739b99f5
-
Filesize
7.3MB
MD5ec3f5feab262807dbfca306e8456b1fe
SHA1a518cb7e8f73aa6fc927868c805ddf666d0daf91
SHA25618b9b073f44dc79731988397997f8875aaf0025f17f89300ca16205b17c0ea35
SHA512c0cf2afdd733114b39b9753dc672e92c7ace94bd2ddba93200b6a02c7654167b35d052fa5cd8643067e01aaa7f4bb462d49d753311faf9740cd3605ef474a709
-
Filesize
5.7MB
MD53e22e7d564e175e7ae7e4e2bdfe0220d
SHA1beb731c2cbf1d3fe1a64315e5b0d0f12a3c6a6f6
SHA256bda6238b6a1671e4f159146102431704d1da0e8340a7cbe5e313438ee2673678
SHA512475512fd49d6b8cc05ed5efd9089352817aa733fb0955752c512f2a7fa668a489c09ce52d0c3b61d130a0c07cc9057d9f1ab3a637ca1f9ae7be210ac083cba34
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
1.2MB
MD55d97c2475c8a4d52e140ef4650d1028b
SHA1da20d0a43d6f8db44ff8212875a7e0f7bb223223
SHA256f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf
SHA51222c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee
-
Filesize
734KB
MD598e538d63ec5a23a3acc374236ae20b6
SHA1f3fec38f80199e346cac912bf8b65249988a2a7e
SHA2564d8fbc7578dca954407746a1d73e3232cd8db79dccd57acbeef80da369069a91
SHA512951a750998448cd3653153bdf24705101136305ff4744ee2092952d773121817fa36347cb797586c58d0f3efc9cfa40ae6d9ce6ea5d2e8ec41acf8d9a03b0827
-
Filesize
1.5MB
MD53f7e96e5c2f519346582e23375fe6f18
SHA1a18524ae612587a4057d21d63332fef47d0ec266
SHA256c5448b50c4b8eab8c642248ab62a2bc95cb3a9515792462190732906ebac7d73
SHA51235329634487e5c7eade8b307b240499c3127305d911d9de30b7bbdc3a77bef6f2cdca59e5f54a363e00d13c1236b3d714ac10efbfe22bf677786d37f8ccba369
-
Filesize
6.0MB
MD59f8ca917737b3233abb943edc065659c
SHA1ea6df1e154c02f0089c8f3c4b3acc69c01d30774
SHA256cd4061786081eb01aa278dfff5adca5a80d827e456719e40d06f3dc9353bed22
SHA5122ffbab3c1b8518a4a2f75a20dd475949ad326adbe34b7f20d47840ec925b60af886839f55fd8360297bf573e2590b268091822b6c6daf1d349476cdef68c3780
-
Filesize
8.4MB
MD52f8fd18eb8f7832baa360c7ea352fb4f
SHA1e6e35646162c50941cb04767c3efb6e877800660
SHA2566c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44
SHA5121323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434
-
Filesize
298KB
MD5b8cbf16f3fd69a9bbcd161526098ef5e
SHA1c23a523e254abdb0d74e3648f89c5348a7821600
SHA256cd841b99d43c7adf96e0ffd2541ec05ee03308756e19f68cfb4296e250128acf
SHA5125de60c3c8ee5a74824a05734c1459f7ff431264e061e42e3edbe4a431ea9f109e7fe66e7d7cbcf78580df67917a89293d69653dc8748c267836b452740990a12
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
1.7MB
MD53ca8bc51a46d28cd2c36f6b94bee0d17
SHA11498ce6793fda819d62911f88a8ed2c786af9e34
SHA25615dc6f72c24e3ceefc2cd21c5b16027c5d3302407cc5774fa2950aa03b3c1d8c
SHA512107394060b82d37d448b7ab64c8ed1c912c33b3016a2ff498569cb84ac3def41a67a982e69365a24145477a6971d7a1a45b0e5eb1a86f7e6a5c3a70a13e5c3f6
-
Filesize
898KB
MD540d330c53214f3ea83bac07783ea23bc
SHA186fcef370558cf19489a314be137d8bb4732dfd5
SHA256916e71da7c81bd64fbe6500a1344ba79b9729453a868607ec0f6968a17f3ba01
SHA512ccc5364cbf1430eb6a8836ae99f62347cf7c2a521674643b41821036c7b4b868e3a9f6d9e6fcece08c2dffa85b95fb059580c09adf804dbacf45495c56250e18
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
580KB
MD54b0812fabc1ba34d8d45d28180f6c75f
SHA1b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950
SHA25673312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103
SHA5127f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158
-
Filesize
1.8MB
MD5b58725b0a514974aae36a20730adc4b3
SHA1a99eb4395fc9a95cad952a7d4bd444fb3baa9103
SHA256a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
SHA51221ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
Filesize
24KB
MD52a84a77ad125a30e442d57c63c18e00e
SHA168567ee0d279087a12374c10a8b7981f401b20b8
SHA2560c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769
SHA5129d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a
-
Filesize
20KB
MD5daa100df6e6711906b61c9ab5aa16032
SHA1963ff6c2d517d188014d2ef3682c4797888e6d26
SHA256cc61635da46b2c9974335ea37e0b5fd660a5c8a42a89b271fa7ec2ac4b8b26f6
SHA512548faee346d6c5700bb37d3d44b593e3c343ca7dc6b564f6d3dc7bd5463fbb925765d9c6ea3065bf19f3ccf7b2e1cb5c34c908057c60b62be866d2566c0b9393
-
Filesize
62KB
MD546a51002cdbe912d860ce08c83c0376b
SHA16d0ae63850bd8d5c86e45cba938609a7f051f59b
SHA25618070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017
SHA512ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44
-
Filesize
69KB
MD58ca4bbb4e4ddf045ff547cb2d438615c
SHA13e2fc0fdc0359a08c7782f44a5ccebf3a52b5152
SHA2564e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed
SHA512b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9
-
Filesize
7KB
MD5f3d7abb7a7c91203886dd0f2df4fc0d6
SHA160ffbb095fceeb2ea2b9e65355e9dbf1de736d6c
SHA2565867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3
SHA5129af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367
-
Filesize
58KB
MD584c831b7996dfc78c7e4902ad97e8179
SHA1739c580a19561b6cde4432a002a502bea9f32754
SHA2561ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575
SHA512ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991
-
Filesize
116KB
MD5b6f9fbb39009ed9a13d4be04a49fea98
SHA1c5f93f13a9569c987c2b2a3055f601e1de772938
SHA2563645a04b3f853f324732ffb9779ee1c95b01f6e5f68c6a07968ecbedaad552c1
SHA5124c6c7eced3d1e25f86dc49eadc2fe2e9ec3dcc0d869604d8ee7aad77d4f2b4ebf4159e4222a54020d95475149e3c8652489a18a3ebd2adbb7ccc502f955603ab
-
Filesize
80KB
MD50814e2558c8e63169d393fac20c668f9
SHA152e8b77554cc098410408668e3d4f127fa02d8bd
SHA256cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d
SHA51280e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319
-
Filesize
71KB
MD56785e2e985143a33c5c3557788f12a2b
SHA17a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0
SHA25666bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7
SHA5123edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91
-
Filesize
865KB
MD56cee6bd1b0b8230a1c792a0e8f72f7eb
SHA166a7d26ed56924f31e681c1af47d6978d1d6e4e8
SHA25608ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab
SHA5124d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193
-
Filesize
95KB
MD5ba8c4239470d59c50a35a25b7950187f
SHA1855a8f85182dd03f79787147b73ae5ed61fb8d7b
SHA256a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b
SHA5121e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0
-
Filesize
92KB
MD52759c67bccd900a1689d627f38f0a635
SHA1d71b170715ed2b304167545af2bd42834ccf1881
SHA256510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05
SHA512aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e
-
Filesize
53KB
MD579156afddd310be36f037a8f0708a794
SHA109ef36ae22b5eab65d1f62166542601b8919399d
SHA2567faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503
SHA512d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
2.4MB
MD5438f4076e92d3c839405bab4652fe2ce
SHA1046567cf90b9e87f4b3913030e1acfc0a4341279
SHA256ad1772bd4f07c11a626de2f257d2cc44b63ff9150be9386512840a2381e97b7e
SHA51244985fe1773cc9d1a4ee5ed0e5bcac058c0cd064d3a1e782d9c424efeb89185528e19a177ecfafa173b76b049301d5ff95dafc0b36715a0847eec3f6b4e1506b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD5ce67b2a565b8fe413703a82cf5d1c829
SHA1329470a45d2719cffcd2a8a163ca0bab7878ea90
SHA2565209474e6a097ec4072373b061e9151747962a571bd138a4abc0dd7610b0d09f
SHA51245d77da53ea1513e7011c957f6ac7f9fba70ccf876e7b9d18c88696614177be9a8a8f92141ca20e33deb63ec658d7f4ef19038d15293e13ce3a8e06c641d55c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD593dcc1967d7cb222e454c62f3ab2282b
SHA1dc80d1a9d3a750252b98625aac75703bc1ed58b7
SHA256ba59a3e60d4820ed6f25a5fae18e80ee3f71498cc75b53c6142435663739a020
SHA512ccfd0054d7efceb951b4fc729c0b37ae79d8d0270dfbe6f4ada5423323b49e1f888891eeee4460e53387a19101228b7a49d6d03691880eb29b2edccc398e21ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59ce09dfcc5a320690c41a0265ca9091b
SHA1b525917a2bc1611857f24b969994ff859534ad82
SHA2568b3e0bf677bc073987ea047b2908734e42ea2df3e0a109827acc8c5138b88dc8
SHA5125642b7e3677dc4efdfd73c178b739379f93443b009ac90b96afd834efe3ec4d5c8f18752e4e80b955e31695ea34034f2f4dd12628a8d0035cc26996b58d02c09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a74e30df6db4351a4deb6a2a29ed0e5f
SHA13fbd98309ac004d4002424228bbd2dbcffd1c8d8
SHA25673fc8610565ce5e8f2f4d4545ba5fdb613320150cc2591b446bd96f7f0c22ee3
SHA51285fe7d8f3aae8a3e09a27926aba831390921fe295d5d96b676a23ca0f6f85663fc6f94b314962296535e73ca704a917ea541c05806449a70a6086622cb62eb77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\3a2cfbde-3dc3-4c98-89a9-44c0c9e21cdd
Filesize982B
MD56b3a3fde13163fe68b632e2a91cca283
SHA14cd77fa48599555ea21d0de9b54541af65ef3eeb
SHA256c7918814854ef2f6cdbb3f6edbe459b35cb756cd23f9202b7d34d82e2dcb4b98
SHA5129ac22bf046054821f60296459524ad1edd0f3035a09a0afbd4c9cd6e783e308c71d12212c01fc3ed49c47c02d1d7e456f3c5551d7b15056f435ff62c54bb2836
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\8b71abd2-cd4c-448d-a5e7-4c037690aa05
Filesize26KB
MD5b856a90dd923721388e5b5d322788ff4
SHA1abcfdc7640256691503742c4d54a4075bded93a4
SHA256b8ce122397a363b5eff36960801f4f06f8aad07a966ddb6fe6dfb7376d5a8133
SHA51260b50a045b423d2a50e4ad60f6dea508c558cc9298aebcbf7e2044ec95fb893b46ad30e3eaeb95bb9e91751e4eb68b734ff167942a9a39b93dd078e0f340c730
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\d6b50934-fcdb-4a77-a646-070f1b247950
Filesize671B
MD503fc462be46e3b03f2b544f78026711d
SHA18266069baf7c9afac90b2d48712b0d1df5d77429
SHA25683910263cfe94f9cf6521e8886fb9fdfc9d667714d4ba6e636695bfef74aa995
SHA512e8a0c7b16e62efce57ac437fb7fc30185ff3f7d76aa554c697911a56e62a3e36e31cb89fa8eec792a41e9c0bee379e166f108df50b083cedfe1a2bbe0d111542
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD508eba392543914e528e671cfe7e872e2
SHA1c800ca7501629f3c09eec525197dedd5ffe402b1
SHA256263f788434d69cadd92b8be122dffbbd43f7defd25051a9672eadec9c03c2392
SHA5124cced03628a89848c88502504b7b97ad581b23db6e6dff5d0ab01ed69b7d0aa3fa7016754472de1d4c0188cabe298378f80e56473a93e08a4d894897a5e08cbc
-
Filesize
10KB
MD5843e9c757e35caf3246b104ea78b5349
SHA17332cb3f1608a58a0b4d560162d2d9430fb07d6c
SHA2562b7cb8076d7de4d34bb4b27a4893d556959bd5500a27f91aeb2a5a1e9d8271cf
SHA512b98b2931a8e9db0394bcd8703af7fe8aa621ccf19ca23c5fbc2634457954f71361843864800f973e822ac361cfbad488e0951a53a9f6f0e5d234a06583e62850
-
Filesize
10KB
MD52c6111d5bbb016088c2b98f1436f79d4
SHA1cf26083076518dc847e434eb01cb0a9e53efd94d
SHA2567c3180c1e2a09a6db32b2c363371834348dee173de29fc599a61bec72e4279b8
SHA512cb5653baddd360b134e6cc70ea61c10a3adf359650913f5159de4c68dd06b6b1d80c8c49263cff8984fbe2787ee1796ee91ef9da880572ba630d0aa4b6923e07
-
Filesize
11KB
MD54fce796aaa37664d966d0f63cfb96e36
SHA1db09d1bc88ca64bfc12898bb6c0512c2a8b66477
SHA256b694b5d3e4de1a7bab0e2035491df35ca482387683c440f84d12b9fb17e2ecda
SHA51279f8d0c9a7679f7132b5a0fca01a6f909d8a6db598f266947d52445c2718cc5553d1c4cc85bf54c177de0ff88723596e0e2462bf22204a23828c4778fed99a76
-
Filesize
11KB
MD5fe6a612d0758abf8b5b96ed256a702db
SHA112875817a53247513bd2681217aeca5d8418b6fb
SHA2566c844e773cc373419315a1818e35f5b146f5263b8ee031626097a033856f9ca1
SHA512079eb4129f6c9d9bb4c61f1656e95a05ef320a8a685437ab7d7c76685e52bc4189ad4dfde34de95eced0f4566fb5520aa0a03517aaca1f2d19a3c9100c14ffe6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.6MB
MD53ea612732c01844ad0d1c14d96e0e194
SHA14eaff5030e25e3ceadc4efe39eff311b60898d41
SHA25608e3226330af1558021d60e4b66a59f21f1462160e5226d4eb4a8cd2f8df7eb6
SHA5123d2cb7d538a99f84ebbaf0536fb4762d92ac4f04fb459da949702d717a41f0388cde3fc99ed2d8e510a2600842dd0d9d94b63d28c2adc9df8f0fd1d5706852cb
-
Filesize
312KB
MD51a4efbc6b661d10a1a4fdbe1a7fa54f0
SHA179f665dcb75db8d711728bab172e444cae2d8133
SHA256b3baa312189da8828d8e3c2b8c20ad3df76da96908d961aa03fed98a61b9bc86
SHA5127cbb77e084f0b8c1af1c7f0451fc0bddfb6b97bb0f9a563a982be8df8effb6816c0aa992448c354d3dc1b13520d440b67bb9e33bd03739e06dee7bf80d32ee39
-
Filesize
8.1MB
MD58543de5d216f8112e80867337dec74db
SHA11cb2462e70718245cd4cb023576c74e2d4a9b213
SHA2563cc98ab01aa1fb3ab9f6147ae0d0d7f82ad965f09520511ce1456eeb9aac7d58
SHA512af285d51cf45e1b3a8caa89e0ce73d14c2ea76eb5cf72f09aa7fab97c486e349b5ebd0936f756e4ca8817f97182819aa1ede186a73c45c96f5d9ed138fdf8e12
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e