Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 15:12
Static task
static1
General
-
Target
747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe
-
Size
2.8MB
-
MD5
66f3fae4324f475433ed637353311be4
-
SHA1
ec1201998837981dfa2bc5034d98bc3f51fa9d86
-
SHA256
747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c
-
SHA512
25c6faa5cb7ab7bd4d50ed613611240a63bd5dfd136eab56d7cd63e0c5a6183cb971df4656bb1ac2052117dd08f602e59667723ac933d3a3f6075376f00fd9fd
-
SSDEEP
49152:yijfGxnaRXVGV9L5t2KTEQWDCBG4HaG4mcbhZ6RUKMLkqkk:ZeBaRFmV2KTrumG4SmcT6RgA7
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
lumma
https://tacitglibbr.biz/api
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://drive-connect.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d1a264cf7a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d1a264cf7a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d1a264cf7a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d1a264cf7a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection d1a264cf7a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d1a264cf7a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e09d117bf6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7b57c1793a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d784cdd87a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 822f082423.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d1a264cf7a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 46 2876 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e09d117bf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7b57c1793a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7b57c1793a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d784cdd87a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d1a264cf7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d784cdd87a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 822f082423.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e09d117bf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d1a264cf7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 822f082423.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Qtdedcpuf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Ixpla.exe -
Executes dropped EXE 37 IoCs
pid Process 1364 axplong.exe 1608 l4.exe 2028 l4.exe 1668 Qtdedcpuf.exe 4856 Ixpla.exe 4324 roblox.exe 3948 stub.exe 4208 goldlummaa.exe 4464 goldlummaa.exe 2184 e09d117bf6.exe 3320 7b57c1793a.exe 4040 skotes.exe 2476 Bxq1jd2.exe 4920 EkmIhQM.exe 1964 K6UAlAU.exe 1096 80ad8ccc52.exe 4556 d784cdd87a.exe 3636 822f082423.exe 1184 bde638d270.exe 1236 d1a264cf7a.exe 3708 EkmIhQM.exe 1036 7a11ec391f.exe 876 7z.exe 3796 7z.exe 4864 7z.exe 744 7z.exe 3848 7z.exe 3908 7z.exe 3096 7z.exe 3712 7z.exe 1948 in.exe 1688 57880d2fbd.exe 688 57880d2fbd.exe 1552 57880d2fbd.exe 2568 57880d2fbd.exe 4828 80ccd3fb8a.exe 3340 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine d784cdd87a.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 822f082423.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine d1a264cf7a.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine e09d117bf6.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 7b57c1793a.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine skotes.exe -
Loads dropped DLL 64 IoCs
pid Process 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 1364 axplong.exe 1608 l4.exe 2028 l4.exe 1364 axplong.exe 1364 axplong.exe 1364 axplong.exe 4324 roblox.exe 3948 stub.exe 1364 axplong.exe 1364 axplong.exe 4208 goldlummaa.exe 1364 axplong.exe 5056 WerFault.exe 5056 WerFault.exe 5056 WerFault.exe 5056 WerFault.exe 5056 WerFault.exe 856 WerFault.exe 856 WerFault.exe 856 WerFault.exe 856 WerFault.exe 856 WerFault.exe 1364 axplong.exe 1364 axplong.exe 3320 7b57c1793a.exe 3320 7b57c1793a.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4040 skotes.exe 4920 EkmIhQM.exe 4040 skotes.exe 4456 cmd.exe 876 7z.exe 4456 cmd.exe 3796 7z.exe 4456 cmd.exe 4864 7z.exe 4456 cmd.exe 744 7z.exe 4456 cmd.exe 3848 7z.exe 4456 cmd.exe 3908 7z.exe 4456 cmd.exe 3096 7z.exe 4456 cmd.exe 3712 7z.exe 4456 cmd.exe 4456 cmd.exe 4040 skotes.exe 4040 skotes.exe 1688 57880d2fbd.exe 1688 57880d2fbd.exe 1688 57880d2fbd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features d1a264cf7a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d1a264cf7a.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\822f082423.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015227001\\822f082423.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\bde638d270.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015228001\\bde638d270.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\d1a264cf7a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015229001\\d1a264cf7a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\e09d117bf6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006449001\\e09d117bf6.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\7b57c1793a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006450001\\7b57c1793a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\E2EA4580C6B42420325575\\E2EA4580C6B42420325575.exe" K6UAlAU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\d784cdd87a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015226001\\d784cdd87a.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000019625-2950.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 1364 axplong.exe 2184 e09d117bf6.exe 3320 7b57c1793a.exe 4040 skotes.exe 4556 d784cdd87a.exe 3636 822f082423.exe 1236 d1a264cf7a.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4208 set thread context of 4464 4208 goldlummaa.exe 43 PID 4920 set thread context of 3708 4920 EkmIhQM.exe 84 PID 1688 set thread context of 2568 1688 57880d2fbd.exe 112 PID 3340 set thread context of 3188 3340 Intel_PTT_EK_Recertification.exe 120 -
resource yara_rule behavioral1/memory/1948-3223-0x000000013FAA0000-0x000000013FF30000-memory.dmp upx behavioral1/memory/2976-3522-0x000000013F920000-0x000000013FDB0000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe File created C:\Windows\Tasks\skotes.job 7b57c1793a.exe -
pid Process 2876 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5056 1668 WerFault.exe 36 856 4856 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bde638d270.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage bde638d270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1a264cf7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57880d2fbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EkmIhQM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EkmIhQM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bxq1jd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80ccd3fb8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goldlummaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b57c1793a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e09d117bf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80ad8ccc52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goldlummaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d784cdd87a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 822f082423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57880d2fbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language bde638d270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a11ec391f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3416 PING.EXE 4244 powershell.exe 896 PING.EXE 3748 powershell.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bxq1jd2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 80ccd3fb8a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bxq1jd2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 80ccd3fb8a.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1572 timeout.exe 3116 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3324 ipconfig.exe -
Kills process with taskkill 5 IoCs
pid Process 4716 taskkill.exe 832 taskkill.exe 3240 taskkill.exe 3884 taskkill.exe 4548 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Bxq1jd2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Bxq1jd2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Bxq1jd2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Bxq1jd2.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3416 PING.EXE 896 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 1364 axplong.exe 2184 e09d117bf6.exe 1668 Qtdedcpuf.exe 4856 Ixpla.exe 3320 7b57c1793a.exe 4040 skotes.exe 2476 Bxq1jd2.exe 1964 K6UAlAU.exe 2876 powershell.exe 4556 d784cdd87a.exe 3636 822f082423.exe 1184 bde638d270.exe 1236 d1a264cf7a.exe 1184 bde638d270.exe 1236 d1a264cf7a.exe 1236 d1a264cf7a.exe 3748 powershell.exe 4828 80ccd3fb8a.exe 4828 80ccd3fb8a.exe 3340 Intel_PTT_EK_Recertification.exe 4244 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1668 Qtdedcpuf.exe Token: SeDebugPrivilege 4856 Ixpla.exe Token: SeDebugPrivilege 1668 Qtdedcpuf.exe Token: SeDebugPrivilege 4856 Ixpla.exe Token: SeDebugPrivilege 4920 EkmIhQM.exe Token: SeIncreaseQuotaPrivilege 1964 K6UAlAU.exe Token: SeSecurityPrivilege 1964 K6UAlAU.exe Token: SeTakeOwnershipPrivilege 1964 K6UAlAU.exe Token: SeLoadDriverPrivilege 1964 K6UAlAU.exe Token: SeSystemProfilePrivilege 1964 K6UAlAU.exe Token: SeSystemtimePrivilege 1964 K6UAlAU.exe Token: SeProfSingleProcessPrivilege 1964 K6UAlAU.exe Token: SeIncBasePriorityPrivilege 1964 K6UAlAU.exe Token: SeCreatePagefilePrivilege 1964 K6UAlAU.exe Token: SeBackupPrivilege 1964 K6UAlAU.exe Token: SeRestorePrivilege 1964 K6UAlAU.exe Token: SeShutdownPrivilege 1964 K6UAlAU.exe Token: SeDebugPrivilege 1964 K6UAlAU.exe Token: SeSystemEnvironmentPrivilege 1964 K6UAlAU.exe Token: SeRemoteShutdownPrivilege 1964 K6UAlAU.exe Token: SeUndockPrivilege 1964 K6UAlAU.exe Token: SeManageVolumePrivilege 1964 K6UAlAU.exe Token: 33 1964 K6UAlAU.exe Token: 34 1964 K6UAlAU.exe Token: 35 1964 K6UAlAU.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 3240 taskkill.exe Token: SeDebugPrivilege 3884 taskkill.exe Token: SeDebugPrivilege 4548 taskkill.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 832 taskkill.exe Token: SeDebugPrivilege 1236 d1a264cf7a.exe Token: SeDebugPrivilege 4080 firefox.exe Token: SeDebugPrivilege 4080 firefox.exe Token: SeRestorePrivilege 876 7z.exe Token: 35 876 7z.exe Token: SeSecurityPrivilege 876 7z.exe Token: SeSecurityPrivilege 876 7z.exe Token: SeRestorePrivilege 3796 7z.exe Token: 35 3796 7z.exe Token: SeSecurityPrivilege 3796 7z.exe Token: SeSecurityPrivilege 3796 7z.exe Token: SeRestorePrivilege 4864 7z.exe Token: 35 4864 7z.exe Token: SeSecurityPrivilege 4864 7z.exe Token: SeSecurityPrivilege 4864 7z.exe Token: SeRestorePrivilege 744 7z.exe Token: 35 744 7z.exe Token: SeSecurityPrivilege 744 7z.exe Token: SeSecurityPrivilege 744 7z.exe Token: SeRestorePrivilege 3848 7z.exe Token: 35 3848 7z.exe Token: SeSecurityPrivilege 3848 7z.exe Token: SeSecurityPrivilege 3848 7z.exe Token: SeRestorePrivilege 3908 7z.exe Token: 35 3908 7z.exe Token: SeSecurityPrivilege 3908 7z.exe Token: SeSecurityPrivilege 3908 7z.exe Token: SeRestorePrivilege 3096 7z.exe Token: 35 3096 7z.exe Token: SeSecurityPrivilege 3096 7z.exe Token: SeSecurityPrivilege 3096 7z.exe Token: SeRestorePrivilege 3712 7z.exe Token: 35 3712 7z.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 3320 7b57c1793a.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 1184 bde638d270.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1364 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 30 PID 2600 wrote to memory of 1364 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 30 PID 2600 wrote to memory of 1364 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 30 PID 2600 wrote to memory of 1364 2600 747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe 30 PID 1364 wrote to memory of 1608 1364 axplong.exe 33 PID 1364 wrote to memory of 1608 1364 axplong.exe 33 PID 1364 wrote to memory of 1608 1364 axplong.exe 33 PID 1364 wrote to memory of 1608 1364 axplong.exe 33 PID 1608 wrote to memory of 2028 1608 l4.exe 35 PID 1608 wrote to memory of 2028 1608 l4.exe 35 PID 1608 wrote to memory of 2028 1608 l4.exe 35 PID 1364 wrote to memory of 1668 1364 axplong.exe 36 PID 1364 wrote to memory of 1668 1364 axplong.exe 36 PID 1364 wrote to memory of 1668 1364 axplong.exe 36 PID 1364 wrote to memory of 1668 1364 axplong.exe 36 PID 1364 wrote to memory of 4856 1364 axplong.exe 37 PID 1364 wrote to memory of 4856 1364 axplong.exe 37 PID 1364 wrote to memory of 4856 1364 axplong.exe 37 PID 1364 wrote to memory of 4856 1364 axplong.exe 37 PID 1364 wrote to memory of 4324 1364 axplong.exe 38 PID 1364 wrote to memory of 4324 1364 axplong.exe 38 PID 1364 wrote to memory of 4324 1364 axplong.exe 38 PID 1364 wrote to memory of 4324 1364 axplong.exe 38 PID 4324 wrote to memory of 3948 4324 roblox.exe 40 PID 4324 wrote to memory of 3948 4324 roblox.exe 40 PID 4324 wrote to memory of 3948 4324 roblox.exe 40 PID 1364 wrote to memory of 4208 1364 axplong.exe 41 PID 1364 wrote to memory of 4208 1364 axplong.exe 41 PID 1364 wrote to memory of 4208 1364 axplong.exe 41 PID 1364 wrote to memory of 4208 1364 axplong.exe 41 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 4208 wrote to memory of 4464 4208 goldlummaa.exe 43 PID 1364 wrote to memory of 2184 1364 axplong.exe 44 PID 1364 wrote to memory of 2184 1364 axplong.exe 44 PID 1364 wrote to memory of 2184 1364 axplong.exe 44 PID 1364 wrote to memory of 2184 1364 axplong.exe 44 PID 1668 wrote to memory of 5056 1668 Qtdedcpuf.exe 45 PID 1668 wrote to memory of 5056 1668 Qtdedcpuf.exe 45 PID 1668 wrote to memory of 5056 1668 Qtdedcpuf.exe 45 PID 1668 wrote to memory of 5056 1668 Qtdedcpuf.exe 45 PID 4856 wrote to memory of 856 4856 Ixpla.exe 46 PID 4856 wrote to memory of 856 4856 Ixpla.exe 46 PID 4856 wrote to memory of 856 4856 Ixpla.exe 46 PID 4856 wrote to memory of 856 4856 Ixpla.exe 46 PID 1364 wrote to memory of 3320 1364 axplong.exe 47 PID 1364 wrote to memory of 3320 1364 axplong.exe 47 PID 1364 wrote to memory of 3320 1364 axplong.exe 47 PID 1364 wrote to memory of 3320 1364 axplong.exe 47 PID 3320 wrote to memory of 4040 3320 7b57c1793a.exe 48 PID 3320 wrote to memory of 4040 3320 7b57c1793a.exe 48 PID 3320 wrote to memory of 4040 3320 7b57c1793a.exe 48 PID 3320 wrote to memory of 4040 3320 7b57c1793a.exe 48 PID 4040 wrote to memory of 2476 4040 skotes.exe 50 PID 4040 wrote to memory of 2476 4040 skotes.exe 50 PID 4040 wrote to memory of 2476 4040 skotes.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1484 attrib.exe 2516 attrib.exe 3180 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe"C:\Users\Admin\AppData\Local\Temp\747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\onefile_1608_133786627840902000\l4.exeC:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 6204⤵
- Loads dropped DLL
- Program crash
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 6324⤵
- Loads dropped DLL
- Program crash
PID:856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe"C:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\onefile_4324_133786628066790000\stub.exeC:\Users\Admin\AppData\Local\Temp\1006252001\roblox.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006343001\goldlummaa.exe"C:\Users\Admin\AppData\Local\Temp\1006343001\goldlummaa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\1006343001\goldlummaa.exe"C:\Users\Admin\AppData\Local\Temp\1006343001\goldlummaa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006449001\e09d117bf6.exe"C:\Users\Admin\AppData\Local\Temp\1006449001\e09d117bf6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\1006450001\7b57c1793a.exe"C:\Users\Admin\AppData\Local\Temp\1006450001\7b57c1793a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\1015079001\Bxq1jd2.exe"C:\Users\Admin\AppData\Local\Temp\1015079001\Bxq1jd2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015079001\Bxq1jd2.exe" & rd /s /q "C:\ProgramData\2D2DBIWLXBIE" & exit6⤵
- System Location Discovery: System Language Discovery
PID:3784 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015130001\EkmIhQM.exe"C:\Users\Admin\AppData\Local\Temp\1015130001\EkmIhQM.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\1015130001\EkmIhQM.exe"C:\Users\Admin\AppData\Local\Temp\1015130001\EkmIhQM.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe"C:\Users\Admin\AppData\Local\Temp\1015193001\K6UAlAU.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1015216041\wOKhy9f.ps1"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015225001\80ad8ccc52.exe"C:\Users\Admin\AppData\Local\Temp\1015225001\80ad8ccc52.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\1015226001\d784cdd87a.exe"C:\Users\Admin\AppData\Local\Temp\1015226001\d784cdd87a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\1015227001\822f082423.exe"C:\Users\Admin\AppData\Local\Temp\1015227001\822f082423.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\1015228001\bde638d270.exe"C:\Users\Admin\AppData\Local\Temp\1015228001\bde638d270.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1184 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:1280
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4080 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.0.73719522\1422037124" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {592c6e0c-7ed2-41cd-ba5e-bf8726b641e9} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 1292 10406758 gpu8⤵PID:2544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.1.1652761044\852281359" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfd3b573-86a7-4298-a078-1182887f4016} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 1508 e74858 socket8⤵PID:4356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.2.1294637941\1650487384" -childID 1 -isForBrowser -prefsHandle 2036 -prefMapHandle 2032 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 692 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2ce8153-0a07-44f9-9da2-67061c3129d0} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 2008 10b65458 tab8⤵PID:4856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.3.1120426031\2102355001" -childID 2 -isForBrowser -prefsHandle 2676 -prefMapHandle 2672 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 692 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c0aa301-2055-4ec5-97f3-c1ed8d052892} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 2688 e6a158 tab8⤵PID:3488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.4.1453283844\1665112138" -childID 3 -isForBrowser -prefsHandle 3832 -prefMapHandle 3836 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 692 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {de3a928f-c2a9-4ac9-8b13-bcf3938c41cd} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 3848 1ecbc358 tab8⤵PID:3668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.5.600519122\700912686" -childID 4 -isForBrowser -prefsHandle 3964 -prefMapHandle 3968 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 692 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {15a65b4d-172f-40bb-bb58-2972eebb733b} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 3956 1fca1258 tab8⤵PID:3644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4080.6.755606524\1601463848" -childID 5 -isForBrowser -prefsHandle 4132 -prefMapHandle 4136 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 692 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {889f72e1-3aa7-4624-861d-34a981702b11} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" 4120 1ecbb158 tab8⤵PID:3632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015229001\d1a264cf7a.exe"C:\Users\Admin\AppData\Local\Temp\1015229001\d1a264cf7a.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\1015230001\7a11ec391f.exe"C:\Users\Admin\AppData\Local\Temp\1015230001\7a11ec391f.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"6⤵
- Loads dropped DLL
PID:4456 -
C:\Windows\system32\mode.commode 65,107⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"7⤵
- Views/modifies file attributes
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"7⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe8⤵
- Views/modifies file attributes
PID:1484
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe8⤵
- Views/modifies file attributes
PID:3180
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE8⤵
- Scheduled Task/Job: Scheduled Task
PID:2936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"6⤵
- Executes dropped EXE
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"6⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"C:\Users\Admin\AppData\Local\Temp\1015231001\57880d2fbd.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015232001\80ccd3fb8a.exe"C:\Users\Admin\AppData\Local\Temp\1015232001\80ccd3fb8a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015232001\80ccd3fb8a.exe" & rd /s /q "C:\ProgramData\9R1DT26XT2V3" & exit6⤵
- System Location Discovery: System Language Discovery
PID:4544 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3116
-
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B0C480DF-1E3C-4245-B682-56F0A3CFE9CB} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵PID:2976
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3340 -
C:\Windows\explorer.exeexplorer.exe3⤵PID:3188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe3⤵
- Drops file in System32 directory
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c8692c86296186ec37a88eaec79ec4
SHA191743238b2c991c366a9ab84226569e3368d77f6
SHA256b7922da677ed368aa364dbe18d6e3fea35d45c0ae523c81ade152286be90c218
SHA5122826175384639195ba2a9fec44d651794e18d2e55dece8ece015bfefadd7cb2976942d7b4a654b52d23c1990c0efcf0698ebe7d65965041693bf77c2478b4558
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5e03441a6ea61f7e53eca1159ab23f40b
SHA136f630a2b3f333fe6ae0ddd4a55b3be981272050
SHA256e9dd2774cd083a96f82970f3f915a3dfcf42af4783863f83b7c0a19c15f43a7a
SHA512a53ae0fe3dca5808c5e5c4914fe7c6d32dc13b0b9fb7a34582195438b672412d22b968470684206c8a02652d22e121366993ef963d2e45ecb4e3963be8fd16db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
5.9MB
MD5d68f79c459ee4ae03b76fa5ba151a41f
SHA1bfa641085d59d58993ba98ac9ee376f898ee5f7b
SHA256aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6
SHA512bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e
-
Filesize
1.2MB
MD5f880c05fa8059b3f68e29922d370ec0c
SHA119e3afc0856bad554ccb248085355ada23cc37ab
SHA256f93f39819b5443b4e83783445eefd4e1c075d69a7f6c2379ccca08b17a4f70b6
SHA5127c3a8b887a83735e33290d49b58d1b5c55177c2455a546b1ad8c31b0b0cb3d14d06e1bc2101a3f93361080390760a1871c098b7f3825ed973ab8f3268e0a45b7
-
Filesize
1.4MB
MD56e7ffd057086e44e4fcc01846cd2b152
SHA105712e7e7b8429b2dd201ea504dc32fefe5795da
SHA256fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7
SHA5128cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2
-
Filesize
10.7MB
MD56898eace70e2da82f257bc78cb081b2f
SHA15ac5ed21436d8b4c59c0b62836d531844c571d6d
SHA256bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23
SHA512ca719707417a095fe092837e870aefc7e8874ef351e27b5b41e40f46a9e2f6cb2ba915858bc3c99a14c2f1288c71c7ddd9c2adee6588d6b43cd3ba276e1585d2
-
Filesize
396KB
MD5876bf2dec67ea8626322d2c268219d76
SHA1ecb0c0cd486733491804a05cf387f2d04d5e2279
SHA25608d37bbc1881f5fbfdcc84e3270320bb4d03a3ad4fcdf1d996c9de0ca8f2b425
SHA5129268392683a9962143f987f069d97016abd1ccd61bb67aa8e3f8d9c4b7aa6168d3c01884ce9023831216b8710eddee2d52fcb3c84dbacefe94cb28fa661b6a79
-
Filesize
1.7MB
MD596f592f24441de810c0f25947968e870
SHA1a11e5ae7cc601a01460fcaabf659e99ea0baee7b
SHA2560c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422
SHA5123822049156652b4303cff16301543a6575f07e3c32dcf12796411de5dd16e7ac287c315d1ad4a7feba8b6cc4b322bf8b11b92fbea48b2391738dde898962874a
-
Filesize
2.9MB
MD5a92be5b5786140603d32d0eba41aa39e
SHA1f8ca51eb7d4f38ef8eb10c270ed7919a79a6c677
SHA256e4749a946131d4dc4625819bc09be7862498aaa3afad6d456c6ff8964ae77cfe
SHA51272b2b28359d4152bc40d5257d6fd3375afadb37814ad63a7bb579fa9edf632855a1422bc5d5ed177b0d1ce8e8d9a3d2ff0b993a026d08ee1888f2dfa929b6702
-
Filesize
313KB
MD5876a365bda09b9ef39605e375d677f0a
SHA12c12b38ed2d84722cf5dcea8bd45cfa7d7b55ba4
SHA256ed252fe89ba1243bad21f373c952b16940a0094149b0be50e5c3da9c20a23234
SHA5122a2df513d61e9b0eeedf099bb6a04962caa5eb31149efc24421bc30236886fc4a60fb7bcabed46069f0a13789ca34d4f21bc02f3c53bd8cf428be399ae63cb7d
-
Filesize
2.1MB
MD5e48d0435a98834793ce9de1bb80fcf9a
SHA1f783ad89853913987852c17e950f9697afbc4ede
SHA256bb6973b370222c70d95255622b354a328809a1116d31c69122b35508e1601831
SHA5127e3018a7f2741cf8adc3491eea00a2c67b25831f51904a956dc63fc8eac2bac876d4015f5aa0ab554bf45c5a2f93adca0d0810aad758e61d072c3e0b038553a2
-
Filesize
302KB
MD5a9502d407c7a3e0c43ad669c27638793
SHA1bf0b7815c6dac82643a5bf7bd397a6aa58a9e803
SHA2565f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135
SHA5120dbe8772ded05ba2c67ea7a7e9bc291b76d8b73dbab86a35fca5b1138be41c2ee7a54333fcd7bf58823ab3b5f1f6250b98b829ca0c367cafb2176350f5454d25
-
Filesize
256B
MD540cf07bf447fde05c5e639e03ee6e3cf
SHA1c0da6c142eda81c9ee4ce68bd72577eb51902f49
SHA2568a4d3365c02d1b7b4cd5951dd38c35265d13a2925d933042229cd0215e669079
SHA51230d4753d2fe3ef7bb5310048fc7373e2ee749f8c230180fb9517a7d93297f03d1ce4f940f2bdd104976bf59f906ed0f8f9627533e77791d51c62e53d50ee9a88
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.8MB
MD57e5fee52d5c9b4f40e48713868110878
SHA19c5d54277b179d3c09dd8ab86623f3e789fbd696
SHA2567e6ff55ea80b2419846e5ca7406531141115ca6a6215d3f8796ff5317d06b6d0
SHA512d2f32b7dee143a75581e929827409dac669467b232adfbb090bb2e2f52cb1d67c6478412da34197b4f8994406e2bd83af28f953e07a698758b4f596758fd2ff0
-
Filesize
944KB
MD5a43d4cd82228531e8b0b1c7f4f9b7777
SHA1d49f07c7c42e5af78f4621c4958476c185039c5c
SHA2569c2118ab1bc53de68cf0c814aa895cd4ebd29dda8a843c8d1ed7ce0b9b8bd1f9
SHA5122c2861741d87b6d2711fe30c37aadb0f58a6f1900630f7ebbe653101f6864fd8f5061c7d94099c7887b6fad569e068589f1ecb215b3636e40cebe0ac41097ec6
-
Filesize
2.6MB
MD570b93af41bf86c87746237a6198d7e38
SHA173c6509bc06061b4a38aa93943da838ca2670d65
SHA256170d8596b77a4e92185f2def1cca3d19fe6b9c7c4b10fc6965cc0000ae2e0b45
SHA512b43719b6081e3d5d5322eff78df8d38d574cc993b06fbbe9b41492acaa2df51e0f2a607958c3b5a3e091010cba4e1d2ba8866c902c1503eea06269c85b66b489
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SKACVXGWTJJZ8G6F4Y4N.temp
Filesize7KB
MD5df8ad914c2e83342da06712488e0558e
SHA1d3537a54ea8c1b0b6348c7e994fa6d59725f5f7b
SHA256855cb9c21b44473ac8d7dc85273e82a68b8b6282a6dcfdb8c9b209b21e04d1fd
SHA512110d65c9d3833ebb431b239386f1249e8588c51a92ca10560a3b499ecc4b0c363426af49ba4cab65e3eb48c3aef340f1b4cfc22084647b3e8f41539040dccf9b
-
Filesize
82B
MD5107a610c004bfc1ebb8b87365b2c4600
SHA104695e838daaaf45d91f0b51868c8995b80d3392
SHA2563a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc
SHA5124b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD51a66845d7bdf9b2969510d6c40e81849
SHA1efa71c4782755a150c190f2a73307030a7d21218
SHA2560b2e58883fb92642b735e1ab97281dad6ce9b3f466372f426bdd6a32b78e416b
SHA512f65b08fd7b257d30e65cb4d6994c3c7c8f6855c031cf5c135ddae487484af7196f77420d5fb28b6038714d3b386349444d7cbeb69439e62607f1a6c71dcbae6e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\680f2d9a-19d2-4d46-8043-caae5658b90b
Filesize745B
MD59ee96665c87b94ba01ca91da1c6a7914
SHA1a43a58019acc949f6faaeb07319ff06033e41673
SHA2568978dbcea862f6f97b3c28cd8e525024c99e900afefdcb60ee687e1be009be74
SHA5122ac738e81fd1bd44510fd5b3250e988f4828e11d7b566d8b8507ba069c928b29be6ba3b073c395ac15cde14357cfc9e2f69ef46fa444a88fd0550dbc0bbb10a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\b3e15ac0-bcdf-4383-8d88-732a51b1ff10
Filesize11KB
MD5fd9f265e1dd3afcccc9b21386e8efe47
SHA18bade6c99701967003dabd74b005c3cdf3f8fe2a
SHA256cf1199298d6bd45c2510f0175075b7553964bf9e0c3cf6f02d50f01a4a23c216
SHA51214cebf228399032dd6384cb6d308042d4b4158c15a3f0cdcc0d9d7cd2d4ce949aee8d4cc79de5291f657915ec5459de5b368784a2109ad252ee20074b8d3a991
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5082873701b7679e4a9f5dee20a991b33
SHA1a9f60fcc3e08a3df8300a1d5bd1908fc5379f878
SHA25636cf125de078b0205e2edb9c14ad294bcab9ccfc396f547324ef5a69b1f7ccd0
SHA51200d2cd219e38c21cf064310648abee6e91b11e065715369b744dc74e1d310f00793fbd60a04821407c869e6757414583ae261aff3dafe17a3250680d410c2cc7
-
Filesize
7KB
MD53203e9d47cc170f788ad9659114e1759
SHA12163a1cf17d30cb65012199d413e6af38f4b4bbc
SHA256882482175eed37cbbfeb98891e98dfb4274454af75af24bb79ba6db394dd541c
SHA5125628bb52b6f8efd601040430f02c91e723a7e054985ffd05c4e197fc24054d5187838b3b34f5a01af0fe1e36284a62da2cdb67729be1455dffdb7f48a3423e3c
-
Filesize
7KB
MD5b974132ea79dbc854ef3841855ae1684
SHA1bba7f391f419cdc3a1b9a685cc227ac70c2d028a
SHA2566c2afb5735f9145bea608875862fa2706b7c05f7a4999bd20c0a040334660f71
SHA5125360868bf9a8a5b1d8805961e9149efc59ba279417eefbf89d28cc0c63d38203bb80b0be18d8a17267c38e1410c323214a168846b4d1f679d24664684d3b1911
-
Filesize
6KB
MD541f8e8845d13f1ff374bad486722d309
SHA1400b44f2e532ba2043af931c04f794af7f9a1e05
SHA256a7de45b761f2481fa16373b12906ce93b6ed69bf032e022f1329f21fc1fa3eda
SHA5127d39f588ae10db4140704b2bcebb07eea7192788f44d1194c4c86d7ebd637af6a303c52c397d90fde0177dd35a41064561079a51640d9a9ba2b58551d0942ba5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD52c335de633c2c66da5dc9e3977cbfc60
SHA11565c61b8932d09b02c045dfc1c12c0ccc297146
SHA25605e1bfa7da0c04ae3605ce8196eb8fb73b02ca4b934db58e60bfa956d8100e63
SHA51210e3c408578566f179ee694de7e7fb0b84557142738dd412db884cf1d8a3349cf980294bae9420f138831e313f593b4f0416a241d348f63bcf2e9e9d405c29e0
-
Filesize
1.4MB
MD56ec3070299ce15beef45142cfb6518d9
SHA1e32c3be6ce99d563c076c71927afe4aadaaba175
SHA256219d431e948758119aaec71297b253a5dab19301bb12c9b3d31109feaec500b6
SHA5129e5082e4ce63bbd2d0dede10a781d20e020550fa490fbb2d96ef5c40b054405d4f96b92e9f504a30e312c4e35672f436f159a0be4afecb92ccbaa6d0e305285d
-
Filesize
2.8MB
MD566f3fae4324f475433ed637353311be4
SHA1ec1201998837981dfa2bc5034d98bc3f51fa9d86
SHA256747b2c43ead7ede20305f2e228a4e652bda16a0e26953f7a4c1ce832d35aa96c
SHA51225c6faa5cb7ab7bd4d50ed613611240a63bd5dfd136eab56d7cd63e0c5a6183cb971df4656bb1ac2052117dd08f602e59667723ac933d3a3f6075376f00fd9fd
-
Filesize
5.9MB
MD563c4e3f9c7383d039ab4af449372c17f
SHA1f52ff760a098a006c41269ff73abb633b811f18e
SHA256151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd
SHA512dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
16.1MB
MD5d09a400f60c7a298e884f90539e9c72f
SHA141582ba130bef907e24f87534e7a0fdd37025101
SHA256700962aa295e2fa207ff522e2f5ca051a2929eb6f252d42c9cb0a56a4f084bfe
SHA512d8ba2859bb2ea109c1ca33cb924e40bf61db79aefb59324101d9f47a08835d86834790d3bc6bad4151a561ef82265b32d5111bc80f95dce769c5eb4da5116cc9