Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe
Resource
win7-20241010-en
General
-
Target
a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe
-
Size
2.9MB
-
MD5
34ad56a02ba60cca8fec73d153b578d0
-
SHA1
409465ca80c9abd1bbdfeb03d307280388ee3be5
-
SHA256
a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2
-
SHA512
102e39dde4db03ca94ce68f1f022172b5f34c85ebeb13e06c4b5f11384ab535a39802a9f26441b08121e07e98864dd4be9a51ab2859c4bb695bc8a453f7a9364
-
SSDEEP
49152:IJ01Z+B4sOfKbmJfnwNxjbZugO+Vyk7b2eRMHhg3ps:IJ0zQ4sKKbinwNLugO+VyouSZs
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
cryptbot
Extracted
lumma
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bc145043dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bc145043dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bc145043dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bc145043dd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bc145043dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bc145043dd.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 396 created 1188 396 0929b97236.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 8cc320036f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 8d0de26e64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 0b0a65994d.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0929b97236.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ANEDNjf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce3ec57e9a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc74033856.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 41e084f939.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0b0a65994d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 47066eda2a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8cc320036f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6358ec8345.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0e090bfe0c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72ee63c74e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VR6f3vF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d0de26e64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc145043dd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fdea18bafa.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2096 powershell.exe 1568 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0e090bfe0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fdea18bafa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0e090bfe0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 41e084f939.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0b0a65994d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0b0a65994d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce3ec57e9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 47066eda2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8cc320036f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d0de26e64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72ee63c74e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d0de26e64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72ee63c74e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 47066eda2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc74033856.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6358ec8345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 41e084f939.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8cc320036f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6358ec8345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fdea18bafa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0929b97236.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc145043dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc145043dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce3ec57e9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0929b97236.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc74033856.exe -
Executes dropped EXE 42 IoCs
pid Process 3004 axplong.exe 2976 trunk.exe 1764 trunk.exe 2344 ce3ec57e9a.exe 396 0929b97236.exe 2800 47066eda2a.exe 2876 skotes.exe 316 8cc320036f.exe 1548 x0qQ2DH.exe 2304 6358ec8345.exe 1740 VR6f3vF.exe 2792 kf5cl0F.exe 1676 ANEDNjf.exe 2296 zudFSfy.exe 1684 kz8ZdyP.exe 1828 fb745f6a75.exe 2192 8d0de26e64.exe 2028 b5e4324800.exe 2712 b5e4324800.exe 1624 b5e4324800.exe 1568 b5e4324800.exe 2456 0e090bfe0c.exe 2508 zudFSfy.exe 3660 fc74033856.exe 4164 kz8ZdyP.exe 11040 72ee63c74e.exe 7756 49143750c9.exe 7536 bc145043dd.exe 6384 41e084f939.exe 5152 fb745f6a75.exe 6396 0b0a65994d.exe 3148 e2f0636cde.exe 6064 7z.exe 2904 7z.exe 6176 7z.exe 6228 7z.exe 6288 7z.exe 6348 7z.exe 6428 7z.exe 6492 7z.exe 6660 in.exe 7024 fdea18bafa.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 41e084f939.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine fdea18bafa.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ce3ec57e9a.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine VR6f3vF.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 8d0de26e64.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine fc74033856.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 0929b97236.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ANEDNjf.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 72ee63c74e.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 0b0a65994d.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 8cc320036f.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 0e090bfe0c.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 47066eda2a.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 6358ec8345.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine bc145043dd.exe -
Loads dropped DLL 64 IoCs
pid Process 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 3004 axplong.exe 2976 trunk.exe 1764 trunk.exe 3004 axplong.exe 3004 axplong.exe 3004 axplong.exe 3004 axplong.exe 3004 axplong.exe 2800 47066eda2a.exe 3004 axplong.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2028 b5e4324800.exe 2028 b5e4324800.exe 2028 b5e4324800.exe 2876 skotes.exe 2876 skotes.exe 2296 zudFSfy.exe 2876 skotes.exe 1684 kz8ZdyP.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 1828 fb745f6a75.exe 2876 skotes.exe 2876 skotes.exe 2876 skotes.exe 10856 cmd.exe 6064 7z.exe 10856 cmd.exe 2904 7z.exe 10856 cmd.exe 6176 7z.exe 10856 cmd.exe 6228 7z.exe 10856 cmd.exe 6288 7z.exe 10856 cmd.exe 6348 7z.exe 10856 cmd.exe 6428 7z.exe 10856 cmd.exe 6492 7z.exe 10856 cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features bc145043dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bc145043dd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\49143750c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017507001\\49143750c9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\bc145043dd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017508001\\bc145043dd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\ce3ec57e9a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007400001\\ce3ec57e9a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\47066eda2a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007402001\\47066eda2a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\fc74033856.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017505001\\fc74033856.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\72ee63c74e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017506001\\72ee63c74e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001c857-4684.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 3004 axplong.exe 2344 ce3ec57e9a.exe 396 0929b97236.exe 2800 47066eda2a.exe 2876 skotes.exe 316 8cc320036f.exe 2304 6358ec8345.exe 1740 VR6f3vF.exe 1676 ANEDNjf.exe 2192 8d0de26e64.exe 2456 0e090bfe0c.exe 3660 fc74033856.exe 11040 72ee63c74e.exe 7536 bc145043dd.exe 6384 41e084f939.exe 6396 0b0a65994d.exe 7024 fdea18bafa.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2028 set thread context of 1568 2028 b5e4324800.exe 60 PID 2296 set thread context of 2508 2296 zudFSfy.exe 62 PID 1684 set thread context of 4164 1684 kz8ZdyP.exe 65 PID 1828 set thread context of 5152 1828 fb745f6a75.exe 89 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe File created C:\Windows\Tasks\skotes.job 47066eda2a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ANEDNjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41e084f939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb745f6a75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 49143750c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc74033856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kz8ZdyP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5e4324800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 49143750c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc145043dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d0de26e64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce3ec57e9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb745f6a75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5e4324800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VR6f3vF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kf5cl0F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e090bfe0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49143750c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdea18bafa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47066eda2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cc320036f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72ee63c74e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2f0636cde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0929b97236.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kz8ZdyP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b0a65994d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6792 powershell.exe 7792 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 8008 taskkill.exe 8620 taskkill.exe 9028 taskkill.exe 9284 taskkill.exe 9556 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 7792 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 3004 axplong.exe 2344 ce3ec57e9a.exe 396 0929b97236.exe 396 0929b97236.exe 396 0929b97236.exe 396 0929b97236.exe 396 0929b97236.exe 2792 dialer.exe 2792 dialer.exe 2792 dialer.exe 2792 dialer.exe 2800 47066eda2a.exe 2876 skotes.exe 316 8cc320036f.exe 316 8cc320036f.exe 316 8cc320036f.exe 316 8cc320036f.exe 316 8cc320036f.exe 316 8cc320036f.exe 2304 6358ec8345.exe 1740 VR6f3vF.exe 2792 kf5cl0F.exe 2096 powershell.exe 1568 powershell.exe 1676 ANEDNjf.exe 2192 8d0de26e64.exe 2192 8d0de26e64.exe 2192 8d0de26e64.exe 2192 8d0de26e64.exe 2192 8d0de26e64.exe 2192 8d0de26e64.exe 2456 0e090bfe0c.exe 3660 fc74033856.exe 2508 zudFSfy.exe 2508 zudFSfy.exe 4164 kz8ZdyP.exe 4164 kz8ZdyP.exe 11040 72ee63c74e.exe 7756 49143750c9.exe 7536 bc145043dd.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7536 bc145043dd.exe 7536 bc145043dd.exe 6384 41e084f939.exe 6384 41e084f939.exe 6384 41e084f939.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe 6396 0b0a65994d.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2792 kf5cl0F.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 1568 powershell.exe Token: SeDebugPrivilege 1828 fb745f6a75.exe Token: SeDebugPrivilege 2508 zudFSfy.exe Token: SeDebugPrivilege 4164 kz8ZdyP.exe Token: SeDebugPrivilege 8008 taskkill.exe Token: SeDebugPrivilege 8620 taskkill.exe Token: SeDebugPrivilege 9028 taskkill.exe Token: SeDebugPrivilege 9284 taskkill.exe Token: SeDebugPrivilege 9556 taskkill.exe Token: SeDebugPrivilege 9860 firefox.exe Token: SeDebugPrivilege 9860 firefox.exe Token: SeDebugPrivilege 7536 bc145043dd.exe Token: SeRestorePrivilege 6064 7z.exe Token: 35 6064 7z.exe Token: SeSecurityPrivilege 6064 7z.exe Token: SeSecurityPrivilege 6064 7z.exe Token: SeRestorePrivilege 2904 7z.exe Token: 35 2904 7z.exe Token: SeSecurityPrivilege 2904 7z.exe Token: SeSecurityPrivilege 2904 7z.exe Token: SeRestorePrivilege 6176 7z.exe Token: 35 6176 7z.exe Token: SeSecurityPrivilege 6176 7z.exe Token: SeSecurityPrivilege 6176 7z.exe Token: SeRestorePrivilege 6228 7z.exe Token: 35 6228 7z.exe Token: SeSecurityPrivilege 6228 7z.exe Token: SeSecurityPrivilege 6228 7z.exe Token: SeRestorePrivilege 6288 7z.exe Token: 35 6288 7z.exe Token: SeSecurityPrivilege 6288 7z.exe Token: SeSecurityPrivilege 6288 7z.exe Token: SeRestorePrivilege 6348 7z.exe Token: 35 6348 7z.exe Token: SeSecurityPrivilege 6348 7z.exe Token: SeSecurityPrivilege 6348 7z.exe Token: SeRestorePrivilege 6428 7z.exe Token: 35 6428 7z.exe Token: SeSecurityPrivilege 6428 7z.exe Token: SeSecurityPrivilege 6428 7z.exe Token: SeRestorePrivilege 6492 7z.exe Token: 35 6492 7z.exe Token: SeSecurityPrivilege 6492 7z.exe Token: SeSecurityPrivilege 6492 7z.exe Token: SeDebugPrivilege 6792 powershell.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 2800 47066eda2a.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 9860 firefox.exe 9860 firefox.exe 9860 firefox.exe 9860 firefox.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe 9860 firefox.exe 9860 firefox.exe 9860 firefox.exe 7756 49143750c9.exe 7756 49143750c9.exe 7756 49143750c9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3004 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 30 PID 2164 wrote to memory of 3004 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 30 PID 2164 wrote to memory of 3004 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 30 PID 2164 wrote to memory of 3004 2164 a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe 30 PID 3004 wrote to memory of 2976 3004 axplong.exe 32 PID 3004 wrote to memory of 2976 3004 axplong.exe 32 PID 3004 wrote to memory of 2976 3004 axplong.exe 32 PID 3004 wrote to memory of 2976 3004 axplong.exe 32 PID 2976 wrote to memory of 1764 2976 trunk.exe 34 PID 2976 wrote to memory of 1764 2976 trunk.exe 34 PID 2976 wrote to memory of 1764 2976 trunk.exe 34 PID 3004 wrote to memory of 2344 3004 axplong.exe 35 PID 3004 wrote to memory of 2344 3004 axplong.exe 35 PID 3004 wrote to memory of 2344 3004 axplong.exe 35 PID 3004 wrote to memory of 2344 3004 axplong.exe 35 PID 3004 wrote to memory of 396 3004 axplong.exe 36 PID 3004 wrote to memory of 396 3004 axplong.exe 36 PID 3004 wrote to memory of 396 3004 axplong.exe 36 PID 3004 wrote to memory of 396 3004 axplong.exe 36 PID 396 wrote to memory of 2792 396 0929b97236.exe 37 PID 396 wrote to memory of 2792 396 0929b97236.exe 37 PID 396 wrote to memory of 2792 396 0929b97236.exe 37 PID 396 wrote to memory of 2792 396 0929b97236.exe 37 PID 396 wrote to memory of 2792 396 0929b97236.exe 37 PID 396 wrote to memory of 2792 396 0929b97236.exe 37 PID 3004 wrote to memory of 2800 3004 axplong.exe 38 PID 3004 wrote to memory of 2800 3004 axplong.exe 38 PID 3004 wrote to memory of 2800 3004 axplong.exe 38 PID 3004 wrote to memory of 2800 3004 axplong.exe 38 PID 2800 wrote to memory of 2876 2800 47066eda2a.exe 39 PID 2800 wrote to memory of 2876 2800 47066eda2a.exe 39 PID 2800 wrote to memory of 2876 2800 47066eda2a.exe 39 PID 2800 wrote to memory of 2876 2800 47066eda2a.exe 39 PID 3004 wrote to memory of 316 3004 axplong.exe 40 PID 3004 wrote to memory of 316 3004 axplong.exe 40 PID 3004 wrote to memory of 316 3004 axplong.exe 40 PID 3004 wrote to memory of 316 3004 axplong.exe 40 PID 2876 wrote to memory of 1548 2876 skotes.exe 42 PID 2876 wrote to memory of 1548 2876 skotes.exe 42 PID 2876 wrote to memory of 1548 2876 skotes.exe 42 PID 2876 wrote to memory of 1548 2876 skotes.exe 42 PID 2876 wrote to memory of 2304 2876 skotes.exe 43 PID 2876 wrote to memory of 2304 2876 skotes.exe 43 PID 2876 wrote to memory of 2304 2876 skotes.exe 43 PID 2876 wrote to memory of 2304 2876 skotes.exe 43 PID 2876 wrote to memory of 1740 2876 skotes.exe 44 PID 2876 wrote to memory of 1740 2876 skotes.exe 44 PID 2876 wrote to memory of 1740 2876 skotes.exe 44 PID 2876 wrote to memory of 1740 2876 skotes.exe 44 PID 2876 wrote to memory of 2792 2876 skotes.exe 45 PID 2876 wrote to memory of 2792 2876 skotes.exe 45 PID 2876 wrote to memory of 2792 2876 skotes.exe 45 PID 2876 wrote to memory of 2792 2876 skotes.exe 45 PID 2792 wrote to memory of 2096 2792 kf5cl0F.exe 47 PID 2792 wrote to memory of 2096 2792 kf5cl0F.exe 47 PID 2792 wrote to memory of 2096 2792 kf5cl0F.exe 47 PID 2792 wrote to memory of 2096 2792 kf5cl0F.exe 47 PID 2792 wrote to memory of 1568 2792 kf5cl0F.exe 49 PID 2792 wrote to memory of 1568 2792 kf5cl0F.exe 49 PID 2792 wrote to memory of 1568 2792 kf5cl0F.exe 49 PID 2792 wrote to memory of 1568 2792 kf5cl0F.exe 49 PID 2876 wrote to memory of 1676 2876 skotes.exe 51 PID 2876 wrote to memory of 1676 2876 skotes.exe 51 PID 2876 wrote to memory of 1676 2876 skotes.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 6644 attrib.exe 6684 attrib.exe 6704 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe"C:\Users\Admin\AppData\Local\Temp\a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\onefile_2976_133790755261008000\trunk.exeC:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007400001\ce3ec57e9a.exe"C:\Users\Admin\AppData\Local\Temp\1007400001\ce3ec57e9a.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\1007401001\0929b97236.exe"C:\Users\Admin\AppData\Local\Temp\1007401001\0929b97236.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\1007402001\47066eda2a.exe"C:\Users\Admin\AppData\Local\Temp\1007402001\47066eda2a.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"6⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\1016974001\6358ec8345.exe"C:\Users\Admin\AppData\Local\Temp\1016974001\6358ec8345.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\qpjngcce"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017501001\fb745f6a75.exe"C:\Users\Admin\AppData\Local\Temp\1017501001\fb745f6a75.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\1017501001\fb745f6a75.exe"C:\Users\Admin\AppData\Local\Temp\1017501001\fb745f6a75.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017502001\8d0de26e64.exe"C:\Users\Admin\AppData\Local\Temp\1017502001\8d0de26e64.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"7⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"7⤵
- Executes dropped EXE
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017504001\0e090bfe0c.exe"C:\Users\Admin\AppData\Local\Temp\1017504001\0e090bfe0c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\1017505001\fc74033856.exe"C:\Users\Admin\AppData\Local\Temp\1017505001\fc74033856.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\1017506001\72ee63c74e.exe"C:\Users\Admin\AppData\Local\Temp\1017506001\72ee63c74e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:11040
-
-
C:\Users\Admin\AppData\Local\Temp\1017507001\49143750c9.exe"C:\Users\Admin\AppData\Local\Temp\1017507001\49143750c9.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7756 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:9816
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:9860 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.0.889935957\156179250" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0efc508b-83e0-4e28-979a-80b22add5d17} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 1308 126d9d58 gpu9⤵PID:8772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.1.1432565933\2011394295" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {12a2aec8-8399-4287-af8e-62c7b997b4d6} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 1524 1260a258 socket9⤵PID:3216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.2.562450633\1513414894" -childID 1 -isForBrowser -prefsHandle 2208 -prefMapHandle 2204 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {23852d65-009c-4867-954b-79e313c8f08f} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 2232 1887cf58 tab9⤵PID:4548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.3.563204034\924041142" -childID 2 -isForBrowser -prefsHandle 2932 -prefMapHandle 2928 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f44f61d-24cd-4d45-81d9-cb97cf252cdd} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 2944 e5d258 tab9⤵PID:1800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.4.2016841348\106355000" -childID 3 -isForBrowser -prefsHandle 3592 -prefMapHandle 3676 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9262cee2-c011-4446-b12f-356242070016} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 3556 1e088e58 tab9⤵PID:9480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.5.365781410\273241966" -childID 4 -isForBrowser -prefsHandle 3756 -prefMapHandle 3760 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02e08ec3-33c1-4086-a3bb-ea92f420939e} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 3744 1ee79658 tab9⤵PID:9604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9860.6.60500046\1826827526" -childID 5 -isForBrowser -prefsHandle 3812 -prefMapHandle 3808 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2852863-7dd2-45c0-b37c-9b0c75ad2b99} 9860 "\\.\pipe\gecko-crash-server-pipe.9860" 3824 1ee7a858 tab9⤵PID:9788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017508001\bc145043dd.exe"C:\Users\Admin\AppData\Local\Temp\1017508001\bc145043dd.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7536
-
-
C:\Users\Admin\AppData\Local\Temp\1017509001\41e084f939.exe"C:\Users\Admin\AppData\Local\Temp\1017509001\41e084f939.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\1017510001\0b0a65994d.exe"C:\Users\Admin\AppData\Local\Temp\1017510001\0b0a65994d.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6396
-
-
C:\Users\Admin\AppData\Local\Temp\1017511001\e2f0636cde.exe"C:\Users\Admin\AppData\Local\Temp\1017511001\e2f0636cde.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"7⤵
- Loads dropped DLL
PID:10856 -
C:\Windows\system32\mode.commode 65,108⤵PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6176
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6228
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6492
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"8⤵
- Views/modifies file attributes
PID:6644
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"8⤵
- Executes dropped EXE
PID:6660 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:6684
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:6704
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE9⤵
- Scheduled Task/Job: Scheduled Task
PID:6732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6792 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7792
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017512001\fdea18bafa.exe"C:\Users\Admin\AppData\Local\Temp\1017512001\fdea18bafa.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007403001\8cc320036f.exe"C:\Users\Admin\AppData\Local\Temp\1007403001\8cc320036f.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"C:\Users\Admin\AppData\Local\Temp\1017503001\b5e4324800.exe"2⤵PID:8032
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize29KB
MD5bd7a7e42af68ba847e48bf5bbeddf499
SHA1da17174e40eafbc34b8ef46b9a6db1ddc0231d86
SHA256944b8e8037dadd17601d82861f4f2ad3b22e18ce4e4b24c4e1d561235e2d94a5
SHA512dd1265185328d0adb70cb5a2faeec8bc314d7cf8cb72809f1a4f544db4a9cafbd2e1d51465d2077ece211c1870c59bb3fc48dd91df55f73867a79a2ebd8f7f89
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
10.2MB
MD5d3b39a6b63c3822be6f8af9b3813bbad
SHA100b020e5a1c05442612f2cec7950c2814b59b1b6
SHA256786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f
SHA512a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff
-
Filesize
2.7MB
MD5f6c52a4dc3fd9e09bedd4f46b2128286
SHA162645d6c5d31e3231a9b6c623ce9977ee682086e
SHA256e9408b42c1db1ab5b6bdcb0663d90fa868601bc75f207f004d4cd072f48560d5
SHA51247a68c788c70f41b1c0cca35f0a983099b23ca547db0ee81ff3248be85f712a75e4eab2fea885b81266d2dc96acf5a5be5852e70363d5894bce004f7065ba273
-
Filesize
1.9MB
MD527fee9f59528fe47fa6b7c0a81e24f7d
SHA1226a9ea05b200a4eca2db8f4d2722678c26252e8
SHA256641935a9640a37c5d213d1cdd51186a4536b63d1692b0492e8669cef646d1011
SHA51261b8d79f2cadf042d8be73e40b7edfb584a2ec91d04315f37d697237bffd734b18becfe97eff2619ffd0aeae84df1ff7ff9c9853227e019f6fd51d6b8d93b3b0
-
Filesize
2.9MB
MD5bc56bdefccd1c98734fb41e1311e5c98
SHA1afeed0bc3be48946a8cdda7f1f39d669f7b90d6b
SHA25658b56acf9b7d2ca16501908af384ecaa9d5bcb6e95c8ec7faa325460112b29a7
SHA5126290da8dfd0ca0d13b9a8dc36f0596660888188cf730402c5de1fa128e3d979073fe0cd38690e08f48af249051a954a93f4b04fffecfaa88c9c474d2d9094142
-
Filesize
4.2MB
MD503ae071235d37edc3ea30848462bccbc
SHA1d8425df6c157fc8699596f64a0bf996692ebc947
SHA25672662d9e82835cb7e3210889828befd75dd7921c8bb6c45f5757c23602432536
SHA5122ef13be57bdebf61bf59e7b39a5c522f91ddb9d003a1a9a66b3fa9c7ef35ead57626858050ef2615ed87da4a32759328121e63fb46b2b4ce2f949caeea8871dc
-
Filesize
17.6MB
MD53c224e3fc892719dc1e302378e533579
SHA10a65062e1426a95bfeca355398b6fdc4912fb6b1
SHA25664cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d
SHA512554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49
-
Filesize
2.8MB
MD5b0e530a964a21586907991e273548b36
SHA1dd3f3656be399eb4572ef6852673babb4b6c86c1
SHA256e40f13a88d88505606849ecb20e9319058ffe53a10c0788e9e1267d787701732
SHA5124c22ea8af5f097b016ab5bbbef795471080a1d8fc33de3d6ea5c3f11c53bea449583bd367f80a79459b0980a05281a274c498954a2741f0ece60f6897e326477
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.1MB
MD568c0e4eefd4c6a76cff542ef57a49ca2
SHA18aa521628b89f3ce539269229834da2a87060e76
SHA2564e417fd6cce7dbff53412a820f4813d01da0e7f20e7615220aaa1372cc59db83
SHA512d722432cdf836269ed3a6e181dd02c6e49d719ca9d84aa5582447d480f43ccc0f79f2d9a9191171d21ec2ea3306a97c60a0aff6707fa3ca9e81e957bf8aad283
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD56e97405d1faad641c284ffbaf6d8ef86
SHA18c3c9bacde73d28e58f700b71a7410e0cfce2d2b
SHA256348cd9077700714a7810bc7459eb708f5c0077db50ed1603c0b988d6c18ac6a1
SHA512e6a37a3e9c5eb8404d84860efd16b19c6eacd6d8147aba0babe083258293081cb8faffb6dbf7f55ea606e7f7741b3f16608ac8a6996a0b34416cb7e4a535b40e
-
Filesize
945KB
MD52252bd7350c2fe134502098fffd3fe0e
SHA1cac34836fb85e204b1c339ee1e8e40443c03386a
SHA2565d0c43f6d6c41bfe8231be3c771cc1f4b1018e7ccd25aa5bf96f371347318e6a
SHA512617ad60959767d481733f0a80709e863648fd4e1c64198625db0bca94f002d48e2b2c2ab145384f349e6d12f045006f0130f7acf1c583b89c6d69465dc638a6c
-
Filesize
1.7MB
MD580c7f6ba56476f282f1eb23421522f83
SHA1325816fc1e9a95a090caf1b1aab58599c735e68f
SHA2565ececd92978f414895b062a77afaf279d45746a7fa6a341a38ff9358958bd2ac
SHA512acb03c8e6a7f450d1238564c93b3fb8f76e6a0622e09777fd55194b06ff409feba480495b893fe44de6299ea4ae734c114e0caa2cac9050cc08087d0d2a4bb30
-
Filesize
4.3MB
MD5dbf74d303e2652e6fd1e1382f8ef0d77
SHA12084b62389ca701b4d81dbfa298d1ae7b3e659ad
SHA25622d3055c50ecee723f18c444d0f9124affd0d2d4f4507796ddbfdb9a90afad2c
SHA512aa112b8d9837bce7acf8d3de449dd5d346abb30f76b5193be2218c430e5588016518425ff5917836cb48fc4dce47bee5213a02987fe81dede251046ca163ecef
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d9443d4f8091029e90ecc8fae6d6db19
SHA1f6013ce72ad5d762521aae666e18bdabc411dba7
SHA2566af920d395620acc907df51efcff6ed88ba6cd0bbc077c7e859432e743781f5b
SHA51270ffbcf1ffdb0e8fb9559299b5b8de00cb0c842011065179e668192f8b68b7c910f0e6b106b14e772118164db98fcfd824954a2d8acb1e60b2d465769a11c14f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5f4ca2ca39769a700c88f6526be282b11
SHA18609322c4fe85fc70f3706886979b902634e0d04
SHA2568c0e20ffff7c28fe02ed5d5441da4b677389d76eae5a79c748bd13de1dca1a99
SHA51269349254de74ad0b84c355c01e0ee328a784ed4c9e17a0041f097e6b90fed579b560d15d11a601016f5bed9f4bca51b154c39e4ffb63ef73200f48676a21ca4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\ae7c764b-76d8-49bf-adb6-dff5e8cd9393
Filesize745B
MD5a0e1792272cece2a37a78d3e4b159b71
SHA1b6ea0a79203aa654647c0a21be5e64a88e3313bc
SHA2563c6b97235c07b836e2756aafc49006d536aa1dfaea142fbba684fdf1e8bd5c71
SHA51229184adf2e976a779b04d58552c996672d35a919f1086114f65bd397465030998052ecd15d05bb8d69e0ca3de3a770eccc1ed68b73d7f7e286d8859f4063b3b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\e2c3ab47-f770-41de-85f0-691ea0f4fce2
Filesize9KB
MD5a073f4d9133eafb61542dc81465c6761
SHA14d0f9ffdc0be403cd1ef09e7c582ed634a4eb665
SHA25651f2e815a2094157086dd8347a38ba882906ce1770b7108b55bafaab8e9d090d
SHA512bbf6a9608a70e05ea1f16e10ca98083f752f25330b97743f171f8809b67f9bbbf945723c1c15a9f9f75fdb0c5ea8904672154b32f954f37ba8537910a7d7cb3c
-
Filesize
6KB
MD52c3c55ada2bb1e55404b1da16bdf38f6
SHA1a78348894f4f4c45c91638992316628c76c3b4ff
SHA256f3b4f54d956ff5c98464967e3c64704606011491649c2fbedc11d129fff7b4e3
SHA512ef0fed5b5ca37a37c102f873789dacfc6e2dddc28c3264f970bcb227940b24281719c75871604f0ff41b9cd9444680a528f0e7f0c0b3fafd57f0b3ad31ace4c2
-
Filesize
6KB
MD5a2010687f0c5fc08b12d2885734c90e1
SHA1d2da18542b5b858181965642a7a2c72ab12d7ead
SHA256a8572c46518e4cd57dffa752a1f597a89ea53ac4bddf1ae32ffaa900a59cdbee
SHA512f41b51d3b150884faa8e8e9bc07245e1cdfac00f406f68f6a7696b2ba88929d473d96aa5d280a69ff36dfa028f40ebae899cf9257c97f9b5e3fccf1b7208bdf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59561729d50873bbcbc1c6fbbcfec040c
SHA1deed43ab83fe8506e6c46011a1bf0e002ea83ff5
SHA256cf71cbb77ded6c9351235847859d9741e75fb6031644df5e9b99a543f1052cae
SHA51230edd3e2071568c106473272d8112580f9d9ea9695dc534908b5302cc47692c60bf1977246f87cd3cd6abe4220b3b1b287b67c884792283f2c9968b67159fe56
-
Filesize
2.9MB
MD534ad56a02ba60cca8fec73d153b578d0
SHA1409465ca80c9abd1bbdfeb03d307280388ee3be5
SHA256a080be49256e721ae4232dbf7f62b376e3057d4e3807cde205a5d715d0cb03e2
SHA512102e39dde4db03ca94ce68f1f022172b5f34c85ebeb13e06c4b5f11384ab535a39802a9f26441b08121e07e98864dd4be9a51ab2859c4bb695bc8a453f7a9364
-
Filesize
18.0MB
MD586ddf66d8651d0baa1cc13d6f8c18dc1
SHA1ee15109134300e555085811f4060048e245269f9
SHA256ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf
SHA512385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c