Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe
Resource
win7-20240729-en
General
-
Target
df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe
-
Size
2.9MB
-
MD5
11e1f1eb5c83019001fef14fa3ce6af0
-
SHA1
f23f5abde50d73221d6d76243a15ba77e73dd5b8
-
SHA256
df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617
-
SHA512
99f0d256a1ce568350bfbdf5b96f724aa1e0a697f94edc529c9956364342337783dc09cf9a173f0e28fb5757d28985ea7dd67f73b2775dbbf7164c051e789fc7
-
SSDEEP
49152:qfKA49/TqhlO+8ptCANYJc1eqP/w0JEKor3Ne:qfK1/TqjOFLYJc19P/Hng
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://shineugler.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
cryptbot
Extracted
lumma
https://shineugler.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e8e9cf94d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e8e9cf94d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e8e9cf94d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e8e9cf94d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e8e9cf94d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e8e9cf94d7.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1132 created 1260 1132 6fca632c16.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF dbf6bf9d1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f99e8284a7.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60490ca969.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ANEDNjf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f99e8284a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 861335b466.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e07e6aa442.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fca632c16.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cdeb3e6f69.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VR6f3vF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed8ddbf1a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e8e9cf94d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbf6bf9d1d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3cf5d65705.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2398dee191.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1964 powershell.exe 2280 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cdeb3e6f69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 861335b466.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e8e9cf94d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cdeb3e6f69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed8ddbf1a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2398dee191.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60490ca969.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e07e6aa442.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbf6bf9d1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e8e9cf94d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60490ca969.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fca632c16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fca632c16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3cf5d65705.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3cf5d65705.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e07e6aa442.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbf6bf9d1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed8ddbf1a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f99e8284a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 861335b466.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2398dee191.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f99e8284a7.exe -
Executes dropped EXE 40 IoCs
pid Process 2844 axplong.exe 1220 Out.exe 2904 Out.exe 1984 trunk.exe 1516 trunk.exe 1964 e07e6aa442.exe 1132 6fca632c16.exe 2688 cdeb3e6f69.exe 2332 skotes.exe 2096 dbf6bf9d1d.exe 2528 Cq6Id6x.exe 1656 x0qQ2DH.exe 2764 3cf5d65705.exe 1688 VR6f3vF.exe 1180 kf5cl0F.exe 952 Cq6Id6x.exe 2096 ANEDNjf.exe 2028 zudFSfy.exe 1044 kz8ZdyP.exe 2036 93a09a5172.exe 928 93a09a5172.exe 1076 ed8ddbf1a9.exe 276 f99e8284a7.exe 2292 2398dee191.exe 1528 861335b466.exe 1048 zudFSfy.exe 10232 2c433ec2e9.exe 4104 kz8ZdyP.exe 11132 e8e9cf94d7.exe 5192 3d80e47bab.exe 5768 7z.exe 5856 7z.exe 5972 7z.exe 6060 7z.exe 6160 7z.exe 6256 7z.exe 6352 7z.exe 6460 7z.exe 6576 in.exe 7460 60490ca969.exe -
Identifies Wine through registry keys 2 TTPs 16 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 861335b466.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 3cf5d65705.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine e07e6aa442.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ANEDNjf.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ed8ddbf1a9.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine f99e8284a7.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 2398dee191.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine e8e9cf94d7.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 60490ca969.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine dbf6bf9d1d.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine cdeb3e6f69.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine VR6f3vF.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 6fca632c16.exe -
Loads dropped DLL 64 IoCs
pid Process 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 2844 axplong.exe 2844 axplong.exe 1220 Out.exe 2844 axplong.exe 1984 trunk.exe 1516 trunk.exe 2844 axplong.exe 2844 axplong.exe 2844 axplong.exe 2844 axplong.exe 2844 axplong.exe 2688 cdeb3e6f69.exe 2844 axplong.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2528 Cq6Id6x.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2036 93a09a5172.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2028 zudFSfy.exe 2332 skotes.exe 1044 kz8ZdyP.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 5648 cmd.exe 5768 7z.exe 5648 cmd.exe 5856 7z.exe 5648 cmd.exe 5972 7z.exe 5648 cmd.exe 6060 7z.exe 5648 cmd.exe 6160 7z.exe 5648 cmd.exe 6256 7z.exe 5648 cmd.exe 6352 7z.exe 5648 cmd.exe 6460 7z.exe 5648 cmd.exe 5648 cmd.exe 2332 skotes.exe 2332 skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e8e9cf94d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e8e9cf94d7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\e8e9cf94d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017494001\\e8e9cf94d7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\e07e6aa442.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007396001\\e07e6aa442.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\cdeb3e6f69.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007398001\\cdeb3e6f69.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\2398dee191.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017491001\\2398dee191.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\861335b466.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017492001\\861335b466.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\2c433ec2e9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017493001\\2c433ec2e9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001a4d3-2634.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 2844 axplong.exe 1964 e07e6aa442.exe 1132 6fca632c16.exe 2688 cdeb3e6f69.exe 2332 skotes.exe 2096 dbf6bf9d1d.exe 2764 3cf5d65705.exe 1688 VR6f3vF.exe 2096 ANEDNjf.exe 1076 ed8ddbf1a9.exe 276 f99e8284a7.exe 2292 2398dee191.exe 1528 861335b466.exe 11132 e8e9cf94d7.exe 7460 60490ca969.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2528 set thread context of 952 2528 Cq6Id6x.exe 52 PID 2036 set thread context of 928 2036 93a09a5172.exe 62 PID 2028 set thread context of 1048 2028 zudFSfy.exe 67 PID 1044 set thread context of 4104 1044 kz8ZdyP.exe 70 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe File created C:\Windows\Tasks\skotes.job cdeb3e6f69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kf5cl0F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ANEDNjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kz8ZdyP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93a09a5172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60490ca969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Out.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fca632c16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VR6f3vF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93a09a5172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c433ec2e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2c433ec2e9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2c433ec2e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdeb3e6f69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2398dee191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Out.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861335b466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d80e47bab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e07e6aa442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbf6bf9d1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed8ddbf1a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f99e8284a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kz8ZdyP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8e9cf94d7.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6780 powershell.exe 7216 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 10696 taskkill.exe 10772 taskkill.exe 10820 taskkill.exe 10864 taskkill.exe 10908 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 7216 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 2844 axplong.exe 2904 Out.exe 2904 Out.exe 2904 Out.exe 2904 Out.exe 1964 e07e6aa442.exe 1132 6fca632c16.exe 1132 6fca632c16.exe 1132 6fca632c16.exe 1132 6fca632c16.exe 1132 6fca632c16.exe 352 dialer.exe 352 dialer.exe 352 dialer.exe 352 dialer.exe 2688 cdeb3e6f69.exe 2332 skotes.exe 2096 dbf6bf9d1d.exe 2096 dbf6bf9d1d.exe 2096 dbf6bf9d1d.exe 2096 dbf6bf9d1d.exe 2096 dbf6bf9d1d.exe 2096 dbf6bf9d1d.exe 2764 3cf5d65705.exe 1688 VR6f3vF.exe 1180 kf5cl0F.exe 1964 powershell.exe 2280 powershell.exe 2096 ANEDNjf.exe 1076 ed8ddbf1a9.exe 276 f99e8284a7.exe 276 f99e8284a7.exe 276 f99e8284a7.exe 276 f99e8284a7.exe 276 f99e8284a7.exe 276 f99e8284a7.exe 2292 2398dee191.exe 1528 861335b466.exe 1528 861335b466.exe 1528 861335b466.exe 1048 zudFSfy.exe 1048 zudFSfy.exe 4104 kz8ZdyP.exe 4104 kz8ZdyP.exe 10232 2c433ec2e9.exe 11132 e8e9cf94d7.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 11132 e8e9cf94d7.exe 11132 e8e9cf94d7.exe 6780 powershell.exe 7460 60490ca969.exe 7460 60490ca969.exe 7460 60490ca969.exe 7460 60490ca969.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2528 Cq6Id6x.exe Token: SeDebugPrivilege 1180 kf5cl0F.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 1048 zudFSfy.exe Token: SeDebugPrivilege 4104 kz8ZdyP.exe Token: SeDebugPrivilege 10696 taskkill.exe Token: SeDebugPrivilege 10772 taskkill.exe Token: SeDebugPrivilege 10820 taskkill.exe Token: SeDebugPrivilege 10864 taskkill.exe Token: SeDebugPrivilege 10908 taskkill.exe Token: SeDebugPrivilege 10960 firefox.exe Token: SeDebugPrivilege 10960 firefox.exe Token: SeDebugPrivilege 11132 e8e9cf94d7.exe Token: SeRestorePrivilege 5768 7z.exe Token: 35 5768 7z.exe Token: SeSecurityPrivilege 5768 7z.exe Token: SeSecurityPrivilege 5768 7z.exe Token: SeRestorePrivilege 5856 7z.exe Token: 35 5856 7z.exe Token: SeSecurityPrivilege 5856 7z.exe Token: SeSecurityPrivilege 5856 7z.exe Token: SeRestorePrivilege 5972 7z.exe Token: 35 5972 7z.exe Token: SeSecurityPrivilege 5972 7z.exe Token: SeSecurityPrivilege 5972 7z.exe Token: SeRestorePrivilege 6060 7z.exe Token: 35 6060 7z.exe Token: SeSecurityPrivilege 6060 7z.exe Token: SeSecurityPrivilege 6060 7z.exe Token: SeRestorePrivilege 6160 7z.exe Token: 35 6160 7z.exe Token: SeSecurityPrivilege 6160 7z.exe Token: SeSecurityPrivilege 6160 7z.exe Token: SeRestorePrivilege 6256 7z.exe Token: 35 6256 7z.exe Token: SeSecurityPrivilege 6256 7z.exe Token: SeSecurityPrivilege 6256 7z.exe Token: SeRestorePrivilege 6352 7z.exe Token: 35 6352 7z.exe Token: SeSecurityPrivilege 6352 7z.exe Token: SeSecurityPrivilege 6352 7z.exe Token: SeRestorePrivilege 6460 7z.exe Token: 35 6460 7z.exe Token: SeSecurityPrivilege 6460 7z.exe Token: SeSecurityPrivilege 6460 7z.exe Token: SeDebugPrivilege 6780 powershell.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 2688 cdeb3e6f69.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10960 firefox.exe 10960 firefox.exe 10960 firefox.exe 10960 firefox.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10960 firefox.exe 10960 firefox.exe 10960 firefox.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe 10232 2c433ec2e9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2844 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 30 PID 2124 wrote to memory of 2844 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 30 PID 2124 wrote to memory of 2844 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 30 PID 2124 wrote to memory of 2844 2124 df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe 30 PID 2844 wrote to memory of 1220 2844 axplong.exe 33 PID 2844 wrote to memory of 1220 2844 axplong.exe 33 PID 2844 wrote to memory of 1220 2844 axplong.exe 33 PID 2844 wrote to memory of 1220 2844 axplong.exe 33 PID 1220 wrote to memory of 2904 1220 Out.exe 34 PID 1220 wrote to memory of 2904 1220 Out.exe 34 PID 1220 wrote to memory of 2904 1220 Out.exe 34 PID 1220 wrote to memory of 2904 1220 Out.exe 34 PID 1220 wrote to memory of 2904 1220 Out.exe 34 PID 1220 wrote to memory of 2904 1220 Out.exe 34 PID 2844 wrote to memory of 1984 2844 axplong.exe 36 PID 2844 wrote to memory of 1984 2844 axplong.exe 36 PID 2844 wrote to memory of 1984 2844 axplong.exe 36 PID 2844 wrote to memory of 1984 2844 axplong.exe 36 PID 1984 wrote to memory of 1516 1984 trunk.exe 38 PID 1984 wrote to memory of 1516 1984 trunk.exe 38 PID 1984 wrote to memory of 1516 1984 trunk.exe 38 PID 2844 wrote to memory of 1964 2844 axplong.exe 39 PID 2844 wrote to memory of 1964 2844 axplong.exe 39 PID 2844 wrote to memory of 1964 2844 axplong.exe 39 PID 2844 wrote to memory of 1964 2844 axplong.exe 39 PID 2844 wrote to memory of 1132 2844 axplong.exe 40 PID 2844 wrote to memory of 1132 2844 axplong.exe 40 PID 2844 wrote to memory of 1132 2844 axplong.exe 40 PID 2844 wrote to memory of 1132 2844 axplong.exe 40 PID 1132 wrote to memory of 352 1132 6fca632c16.exe 41 PID 1132 wrote to memory of 352 1132 6fca632c16.exe 41 PID 1132 wrote to memory of 352 1132 6fca632c16.exe 41 PID 1132 wrote to memory of 352 1132 6fca632c16.exe 41 PID 1132 wrote to memory of 352 1132 6fca632c16.exe 41 PID 1132 wrote to memory of 352 1132 6fca632c16.exe 41 PID 2844 wrote to memory of 2688 2844 axplong.exe 42 PID 2844 wrote to memory of 2688 2844 axplong.exe 42 PID 2844 wrote to memory of 2688 2844 axplong.exe 42 PID 2844 wrote to memory of 2688 2844 axplong.exe 42 PID 2688 wrote to memory of 2332 2688 cdeb3e6f69.exe 43 PID 2688 wrote to memory of 2332 2688 cdeb3e6f69.exe 43 PID 2688 wrote to memory of 2332 2688 cdeb3e6f69.exe 43 PID 2688 wrote to memory of 2332 2688 cdeb3e6f69.exe 43 PID 2844 wrote to memory of 2096 2844 axplong.exe 44 PID 2844 wrote to memory of 2096 2844 axplong.exe 44 PID 2844 wrote to memory of 2096 2844 axplong.exe 44 PID 2844 wrote to memory of 2096 2844 axplong.exe 44 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 2528 2332 skotes.exe 46 PID 2332 wrote to memory of 1656 2332 skotes.exe 47 PID 2332 wrote to memory of 1656 2332 skotes.exe 47 PID 2332 wrote to memory of 1656 2332 skotes.exe 47 PID 2332 wrote to memory of 1656 2332 skotes.exe 47 PID 2332 wrote to memory of 2764 2332 skotes.exe 48 PID 2332 wrote to memory of 2764 2332 skotes.exe 48 PID 2332 wrote to memory of 2764 2332 skotes.exe 48 PID 2332 wrote to memory of 2764 2332 skotes.exe 48 PID 2332 wrote to memory of 1688 2332 skotes.exe 49 PID 2332 wrote to memory of 1688 2332 skotes.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 6636 attrib.exe 6664 attrib.exe 6548 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe"C:\Users\Admin\AppData\Local\Temp\df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe"C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe"C:\Users\Admin\AppData\Local\Temp\1006664001\Out.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\onefile_1984_133790741060146000\trunk.exeC:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007396001\e07e6aa442.exe"C:\Users\Admin\AppData\Local\Temp\1007396001\e07e6aa442.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\1007397001\6fca632c16.exe"C:\Users\Admin\AppData\Local\Temp\1007397001\6fca632c16.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\1007398001\cdeb3e6f69.exe"C:\Users\Admin\AppData\Local\Temp\1007398001\cdeb3e6f69.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"6⤵
- Executes dropped EXE
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\1016974001\3cf5d65705.exe"C:\Users\Admin\AppData\Local\Temp\1016974001\3cf5d65705.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\envltaxak"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017488001\93a09a5172.exe"C:\Users\Admin\AppData\Local\Temp\1017488001\93a09a5172.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\1017488001\93a09a5172.exe"C:\Users\Admin\AppData\Local\Temp\1017488001\93a09a5172.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017489001\ed8ddbf1a9.exe"C:\Users\Admin\AppData\Local\Temp\1017489001\ed8ddbf1a9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\1017490001\f99e8284a7.exe"C:\Users\Admin\AppData\Local\Temp\1017490001\f99e8284a7.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:276
-
-
C:\Users\Admin\AppData\Local\Temp\1017491001\2398dee191.exe"C:\Users\Admin\AppData\Local\Temp\1017491001\2398dee191.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\1017492001\861335b466.exe"C:\Users\Admin\AppData\Local\Temp\1017492001\861335b466.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\1017493001\2c433ec2e9.exe"C:\Users\Admin\AppData\Local\Temp\1017493001\2c433ec2e9.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:10232 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:10952
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:10960 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.0.2137404458\497961454" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {84c4ad25-c987-41e1-b03a-862d2b662f1e} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 1300 115e9b58 gpu9⤵PID:11192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.1.1542920433\1134168390" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb4752cf-bbff-4bb9-9c53-6682a4cca891} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 1504 d73358 socket9⤵PID:3060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.2.1887875960\1605141412" -childID 1 -isForBrowser -prefsHandle 1812 -prefMapHandle 2028 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f74b7d4-348b-4c9b-84e7-4c9c352ddd17} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 2092 1afb7c58 tab9⤵PID:5432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.3.16663884\1504379770" -childID 2 -isForBrowser -prefsHandle 2836 -prefMapHandle 2832 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0141941f-b9fa-45c4-bf93-4e6f430be10c} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 2848 d5d258 tab9⤵PID:6592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.4.1879452495\982145454" -childID 3 -isForBrowser -prefsHandle 3768 -prefMapHandle 3764 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5d5a1f4-3e76-4ebc-a2e2-fca78ed68cc7} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 3780 d6bf58 tab9⤵PID:8460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.5.1448461050\505540329" -childID 4 -isForBrowser -prefsHandle 3888 -prefMapHandle 3892 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d02ea474-8241-41cc-bea8-a67ad011ae1e} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 3876 207b7f58 tab9⤵PID:9072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="10960.6.648390501\2110328776" -childID 5 -isForBrowser -prefsHandle 4052 -prefMapHandle 4056 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {db8f885d-599c-497e-ba79-eb5e2324831f} 10960 "\\.\pipe\gecko-crash-server-pipe.10960" 4040 1e3d1558 tab9⤵PID:3536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017494001\e8e9cf94d7.exe"C:\Users\Admin\AppData\Local\Temp\1017494001\e8e9cf94d7.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:11132
-
-
C:\Users\Admin\AppData\Local\Temp\1017495001\3d80e47bab.exe"C:\Users\Admin\AppData\Local\Temp\1017495001\3d80e47bab.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5192 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"7⤵
- Loads dropped DLL
PID:5648 -
C:\Windows\system32\mode.commode 65,108⤵PID:5740
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6160
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6352
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6460
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"8⤵
- Views/modifies file attributes
PID:6548
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"8⤵
- Executes dropped EXE
PID:6576 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:6636
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:6664
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE9⤵
- Scheduled Task/Job: Scheduled Task
PID:6756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6780 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7216
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017496001\60490ca969.exe"C:\Users\Admin\AppData\Local\Temp\1017496001\60490ca969.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007399001\dbf6bf9d1d.exe"C:\Users\Admin\AppData\Local\Temp\1007399001\dbf6bf9d1d.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5285552718daa4bbe11b66bed786e357f
SHA1c061048bec22651826eaef248709c7503c19c7c4
SHA25647e06007be39e82c136aa5531c07410ca2a0b33cab938a0a0a6631124f5f26af
SHA5122097414e2bba4c66dc8d269fc2d0e0926747705ae9d98fadadd4aaba313a22d4623cadb4f3aee23ee2ab38e459588ffe5c1dc5dacc1a3a59b837e9916511ab08
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD57ff947867bc70055adffa2164a741b01
SHA1cff424168c2f6bcef107ebc9bd65590f3ead76ae
SHA256b6d6628d2dc7dea808eef05180c27abe10a1af245d624aacdacccc52a1eb7b40
SHA512da507d1847056d0dc2c122c45ecbea4901a81c06890bcdbffc2f18ad4b96f0ac2c2fa9ebde1a315828c74a97af653062a8c50ce70c9b6d6966c48871150747ee
-
Filesize
10.2MB
MD5d3b39a6b63c3822be6f8af9b3813bbad
SHA100b020e5a1c05442612f2cec7950c2814b59b1b6
SHA256786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f
SHA512a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff
-
Filesize
2.8MB
MD55081ea72759ba0dea91a56403ff62dc6
SHA140bddae611127beeb297e9bf3e865af47b8ed4e7
SHA2567f7e285c14ba16177fac9340654eba93f5bcddd100dc2c7259afc2ad4cd19d88
SHA512671425d2017542f7a4aabc339c9ec46180aec25a4ef00915d3851bcae43024e944ecce5b226ee5bbfe108a6da6301a027050df4748e3a01f1bbe9dc15cf03b2f
-
Filesize
1.9MB
MD527fee9f59528fe47fa6b7c0a81e24f7d
SHA1226a9ea05b200a4eca2db8f4d2722678c26252e8
SHA256641935a9640a37c5d213d1cdd51186a4536b63d1692b0492e8669cef646d1011
SHA51261b8d79f2cadf042d8be73e40b7edfb584a2ec91d04315f37d697237bffd734b18becfe97eff2619ffd0aeae84df1ff7ff9c9853227e019f6fd51d6b8d93b3b0
-
Filesize
2.9MB
MD57944ebe231d464c760a818b34a636cce
SHA152bdb9427bd7e9d2e2a75bcf5fc76e0e7819a73b
SHA256c478f40cfe686bdc076d898a735f2857316a64d8e2d9dc405dde3e0ca8194b7f
SHA5126435a4f51a6fce88eaf551ca452408fea62d437eb2297a0f6cc2aec94f51813e0c9370744b212217ab4e76016adf892c2d42fb0e6a9d6c8fb3f64c74af9351d7
-
Filesize
4.3MB
MD52ed56e48acd3d32e3d047b42b18103aa
SHA17f3a1c7ac09fb36680a29b5d964afabf5566dd02
SHA256f7c192eeb6246cd1b3e3772b80057f6f74e1be940d3a7ded223b165589b9f154
SHA51253d40e9a17c0ee95d9c2daa5d2df1e831dda9c291402edf90964e558c002abe6801630971797149a571e50dd25043f8b5236d653f4ad83d12a78c82453ecfed2
-
Filesize
3.1MB
MD5f9b9f98592292b5cbf59c7a60e9ebaee
SHA159cc872fd0a11b259cc5b70893f35e9b5a7c8cbb
SHA2565688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665
SHA512f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e
-
Filesize
17.6MB
MD53c224e3fc892719dc1e302378e533579
SHA10a65062e1426a95bfeca355398b6fdc4912fb6b1
SHA25664cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d
SHA512554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49
-
Filesize
2.9MB
MD50ea56ef12b9744f2de996a4b5622ff2f
SHA104f077d018e0ca265700cc518914f363e45826cf
SHA25659a4d6b267be8b643d44576c4659c2cd43ec388d85eac6c1284b78ac8298e567
SHA5125e837869dc06518b18970135bbebf7125c68b6a33c88666fa8b3bd20be69b6c5097b6f676719b34eaad16f46db211e5e329f685298db3b5929eef0a3889128d9
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.1MB
MD568c0e4eefd4c6a76cff542ef57a49ca2
SHA18aa521628b89f3ce539269229834da2a87060e76
SHA2564e417fd6cce7dbff53412a820f4813d01da0e7f20e7615220aaa1372cc59db83
SHA512d722432cdf836269ed3a6e181dd02c6e49d719ca9d84aa5582447d480f43ccc0f79f2d9a9191171d21ec2ea3306a97c60a0aff6707fa3ca9e81e957bf8aad283
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.7MB
MD58e89923efbac42f80f4e7fc0dc7aae45
SHA181667219cfb7e2d36d72faa07ff10315e451fbd5
SHA2565049cb5f3b6dd8fe8dbc93d3d1abe40c32f69136447f934c65e4f29d3432a922
SHA512d6e57a2b3daf422985b2fbca5e0062013662b9e9ad8a66854e626efe2315fb6a6812ab02a95967d61fd5bdbaa9351c97a85a54640e8e813cb6985d2d614cd5cf
-
Filesize
945KB
MD52252bd7350c2fe134502098fffd3fe0e
SHA1cac34836fb85e204b1c339ee1e8e40443c03386a
SHA2565d0c43f6d6c41bfe8231be3c771cc1f4b1018e7ccd25aa5bf96f371347318e6a
SHA512617ad60959767d481733f0a80709e863648fd4e1c64198625db0bca94f002d48e2b2c2ab145384f349e6d12f045006f0130f7acf1c583b89c6d69465dc638a6c
-
Filesize
1.7MB
MD580c7f6ba56476f282f1eb23421522f83
SHA1325816fc1e9a95a090caf1b1aab58599c735e68f
SHA2565ececd92978f414895b062a77afaf279d45746a7fa6a341a38ff9358958bd2ac
SHA512acb03c8e6a7f450d1238564c93b3fb8f76e6a0622e09777fd55194b06ff409feba480495b893fe44de6299ea4ae734c114e0caa2cac9050cc08087d0d2a4bb30
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
2.9MB
MD511e1f1eb5c83019001fef14fa3ce6af0
SHA1f23f5abde50d73221d6d76243a15ba77e73dd5b8
SHA256df0ab8c25c9c723d7cf4fe65c9ff62691d49df07779b6e5c0da6eeae1f1a1617
SHA51299f0d256a1ce568350bfbdf5b96f724aa1e0a697f94edc529c9956364342337783dc09cf9a173f0e28fb5757d28985ea7dd67f73b2775dbbf7164c051e789fc7
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fc2c0cdcc8264fb737ddb0fbf01585d6
SHA11537b5360ce984a2bc79a7acdc80295f6387b4bc
SHA256371ecd0a188febc7153a0dc029026f9c67c1808636a35cd9b474517a48f1b74a
SHA512910217c7acdce9c7ac96aedcc496731ff52146c5d476b4e74a02d1f2c07c927e3b81d807a8830a324e47b58d92ebffa19d6246f3c9c37e2ecd569eb1787f4b9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5ad225f29e7dcfb101b8430c327e9be5a
SHA152e60eab5d43468dd6ee1cb4038afab8423a44dc
SHA2562ed73d0229521e9a43c89acc990159ccb3b1b12b74f2e8089f799445ce8a3314
SHA5124e0affeffa1b0862541694d01ea20aec04cc5b3e73f5ba64b3ac5ae66bce4f0cc7cc6ed9dac58c6d651ac3dbbfe9171780237c946a63e34d6357bcec00e025fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\334509d7-bc25-45a5-b3f8-7d645b37922a
Filesize10KB
MD5a74eb0b30b59c286b2dddc9d6107f5a7
SHA1141d23e9811ab589876e7580a99a708c95adb3aa
SHA256632c282cb1895466b788b321b1ab5cf6c59a7430b538701b930595d9e9205fe9
SHA51248126182a9b2c7acd64d0d3b21c05f2f6f9b80241037eab0a7913986c8f30f5d37645703fb54dfae3c9a487cc33c4a6ab6a5e50e047ad8ed925bfb308c29a1c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\88ec0bf5-57f7-4a83-b739-97414706b76f
Filesize745B
MD52e33629fd77208413b36614b02df576e
SHA18e9d98b502931eedc799bb780a21ea6b15e45d75
SHA2569ecd61085c23f22b3de587ae960ce5b37a1b71a5a5acb37b3c29058f1946ca4a
SHA512fdc764dcff1803575b9478ef4b0e46c40f3893db5a9d5910e6be58aacb935a0d3b127631d497bef35227361795854c58a93380a73996b4bbd59fee89034d718d
-
Filesize
6KB
MD575e3446fab64535e4211c85ccf07c733
SHA15a4319c8f09c39e6173fa264581bbad507a0e0c2
SHA2566434ea7469f8ef5ce8fab2fbf07dd0dd958dae7eece8124520968f90c970f357
SHA51248e8390870ae34eeb65b5978e55fad09282e4d85b99b8f3cded97c0d63b94dd73a398c2f0aa47e6cf7a3e379ece26164bf2f73d5d82c3afcb296ea181eca5374
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5bece0acf9d7f19d01c7943c54d2ad372
SHA1aef59ca4b0fe97f32db128e103bfb98aee3b5e29
SHA256ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8
SHA512105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b
-
Filesize
18.0MB
MD586ddf66d8651d0baa1cc13d6f8c18dc1
SHA1ee15109134300e555085811f4060048e245269f9
SHA256ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf
SHA512385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c