Analysis
-
max time kernel
95s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 14:05
Static task
static1
General
-
Target
e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe
-
Size
1.8MB
-
MD5
82a0e9df77991b4703d35b285fc54e02
-
SHA1
e5a417e3c955ef4ad266ee25d965beb1a73923f0
-
SHA256
e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92
-
SHA512
94d019ddbb31885afa8babbcc6c3c0b10be3fce76ff4ae44e6a13394fc71388ccb641317ac913fefe8ac4ebff7be4c776f5c5b5ec2940afa06d6b52d0b78f0fa
-
SSDEEP
49152:aZ8PRsjLw6rzMLz8LA6ChqOds5hIcjxU:NRJ6rQYCoOMhI1
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
lumma
https://enthusiasimtitleow.shop/api
Signatures
-
Glupteba payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/5960-755-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4332-758-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/5220-761-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
9fVboIM3ZCRqZsLmD7gL5Rzj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 9fVboIM3ZCRqZsLmD7gL5Rzj.exe -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegAsm.exedescription pid process target process PID 5676 created 2904 5676 RegAsm.exe sihost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
explorha.exe7c4a4ee8ee.exeamert.exeexplorha.exeexplorgu.exe9fVboIM3ZCRqZsLmD7gL5Rzj.exeexplorha.exee672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7c4a4ee8ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9fVboIM3ZCRqZsLmD7gL5Rzj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe -
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeu4b8.1.exeflow pid process 68 5292 rundll32.exe 86 2488 rundll32.exe 167 5356 rundll32.exe 189 6696 rundll32.exe 214 1804 u4b8.1.exe 86 2488 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 6972 netsh.exe 2476 netsh.exe 4872 netsh.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7c4a4ee8ee.exeamert.exeexplorha.exee672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exeexplorha.exeexplorha.exeexplorgu.exe9fVboIM3ZCRqZsLmD7gL5Rzj.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7c4a4ee8ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7c4a4ee8ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9fVboIM3ZCRqZsLmD7gL5Rzj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9fVboIM3ZCRqZsLmD7gL5Rzj.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
u4b8.0.exeu4b8.1.exeFBGHIIJDGH.exee672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exeexplorha.exeexplorgu.exeNewB.exeD4LJZ3VAaLXETttomDRfBuTO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation u4b8.0.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation u4b8.1.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation FBGHIIJDGH.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation explorha.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation NewB.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation D4LJZ3VAaLXETttomDRfBuTO.exe -
Executes dropped EXE 28 IoCs
Processes:
explorha.exe7c4a4ee8ee.exego.exeamert.exeexplorha.exeexplorgu.exekoooooo.exeNewB.exefile300un.exeD4LJZ3VAaLXETttomDRfBuTO.exe8t1IhaQkXjNoQWCtpebIqNSt.exePZU5DJT3kfhwUERQlDi8SNXE.exesQbKtnBWsoIZLrPPyRMb2Dza.exebPQhBej8fqHC81fIEvuHxnS1.exeu4b8.0.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exeu4b8.1.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exe9fVboIM3ZCRqZsLmD7gL5Rzj.exeexplorha.exeNewB.exeFBGHIIJDGH.exeAssistant_108.0.5067.20_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exepid process 2844 explorha.exe 1228 7c4a4ee8ee.exe 4904 go.exe 6140 amert.exe 3524 explorha.exe 5044 explorgu.exe 3568 koooooo.exe 5856 NewB.exe 1792 file300un.exe 5588 D4LJZ3VAaLXETttomDRfBuTO.exe 5960 8t1IhaQkXjNoQWCtpebIqNSt.exe 4332 PZU5DJT3kfhwUERQlDi8SNXE.exe 5220 sQbKtnBWsoIZLrPPyRMb2Dza.exe 5340 bPQhBej8fqHC81fIEvuHxnS1.exe 4400 u4b8.0.exe 6080 vNa5K8IYtQUfOrGgRnemh8MR.exe 5704 vNa5K8IYtQUfOrGgRnemh8MR.exe 1804 u4b8.1.exe 3828 vNa5K8IYtQUfOrGgRnemh8MR.exe 6224 vNa5K8IYtQUfOrGgRnemh8MR.exe 6308 vNa5K8IYtQUfOrGgRnemh8MR.exe 4976 9fVboIM3ZCRqZsLmD7gL5Rzj.exe 5340 explorha.exe 6776 NewB.exe 3140 FBGHIIJDGH.exe 5384 Assistant_108.0.5067.20_Setup.exe_sfx.exe 4048 assistant_installer.exe 6016 assistant_installer.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorgu.exeexplorha.exee672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exeexplorha.exe7c4a4ee8ee.exeamert.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine 7c4a4ee8ee.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine explorha.exe -
Loads dropped DLL 17 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exerundll32.exeu4b8.0.exeassistant_installer.exeassistant_installer.exepid process 3456 rundll32.exe 5292 rundll32.exe 2488 rundll32.exe 940 rundll32.exe 5356 rundll32.exe 6080 vNa5K8IYtQUfOrGgRnemh8MR.exe 5704 vNa5K8IYtQUfOrGgRnemh8MR.exe 3828 vNa5K8IYtQUfOrGgRnemh8MR.exe 6224 vNa5K8IYtQUfOrGgRnemh8MR.exe 6308 vNa5K8IYtQUfOrGgRnemh8MR.exe 6696 rundll32.exe 4400 u4b8.0.exe 4400 u4b8.0.exe 4048 assistant_installer.exe 4048 assistant_installer.exe 6016 assistant_installer.exe 6016 assistant_installer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\9fVboIM3ZCRqZsLmD7gL5Rzj.exe themida behavioral1/memory/4976-820-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida behavioral1/memory/4976-822-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida behavioral1/memory/4976-823-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida behavioral1/memory/4976-824-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida behavioral1/memory/4976-825-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida behavioral1/memory/4976-826-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida behavioral1/memory/4976-827-0x00007FF648650000-0x00007FF64915A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7c4a4ee8ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000042001\\7c4a4ee8ee.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\go.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000044001\\go.exe" explorha.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
9fVboIM3ZCRqZsLmD7gL5Rzj.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9fVboIM3ZCRqZsLmD7gL5Rzj.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vNa5K8IYtQUfOrGgRnemh8MR.exevNa5K8IYtQUfOrGgRnemh8MR.exedescription ioc process File opened (read-only) \??\D: vNa5K8IYtQUfOrGgRnemh8MR.exe File opened (read-only) \??\F: vNa5K8IYtQUfOrGgRnemh8MR.exe File opened (read-only) \??\D: vNa5K8IYtQUfOrGgRnemh8MR.exe File opened (read-only) \??\F: vNa5K8IYtQUfOrGgRnemh8MR.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 185 api.myip.com 186 api.myip.com 190 ipinfo.io 191 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe autoit_exe -
Drops file in System32 directory 4 IoCs
Processes:
9fVboIM3ZCRqZsLmD7gL5Rzj.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 9fVboIM3ZCRqZsLmD7gL5Rzj.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 9fVboIM3ZCRqZsLmD7gL5Rzj.exe File opened for modification C:\Windows\System32\GroupPolicy 9fVboIM3ZCRqZsLmD7gL5Rzj.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 9fVboIM3ZCRqZsLmD7gL5Rzj.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exeexplorha.exeamert.exeexplorha.exeexplorgu.exe9fVboIM3ZCRqZsLmD7gL5Rzj.exeexplorha.exepid process 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe 2844 explorha.exe 6140 amert.exe 3524 explorha.exe 5044 explorgu.exe 4976 9fVboIM3ZCRqZsLmD7gL5Rzj.exe 5340 explorha.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
koooooo.exefile300un.exebPQhBej8fqHC81fIEvuHxnS1.exedescription pid process target process PID 3568 set thread context of 2592 3568 koooooo.exe RegAsm.exe PID 1792 set thread context of 5532 1792 file300un.exe installutil.exe PID 5340 set thread context of 5676 5340 bPQhBej8fqHC81fIEvuHxnS1.exe RegAsm.exe -
Drops file in Windows directory 2 IoCs
Processes:
amert.exee672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exedescription ioc process File created C:\Windows\Tasks\explorgu.job amert.exe File created C:\Windows\Tasks\explorha.job e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5588 3568 WerFault.exe koooooo.exe 5536 5340 WerFault.exe bPQhBej8fqHC81fIEvuHxnS1.exe 6176 5588 WerFault.exe D4LJZ3VAaLXETttomDRfBuTO.exe 6564 5676 WerFault.exe RegAsm.exe 6868 5676 WerFault.exe RegAsm.exe 5996 4400 WerFault.exe u4b8.0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u4b8.1.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4b8.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4b8.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4b8.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u4b8.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u4b8.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u4b8.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5688 schtasks.exe 6004 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
vNa5K8IYtQUfOrGgRnemh8MR.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 vNa5K8IYtQUfOrGgRnemh8MR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 vNa5K8IYtQUfOrGgRnemh8MR.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 vNa5K8IYtQUfOrGgRnemh8MR.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exeexplorha.exemsedge.exemsedge.exemsedge.exemsedge.exerundll32.exeamert.exepowershell.exeexplorha.exeexplorgu.exeidentity_helper.exeRegAsm.exerundll32.exeu4b8.0.exeRegAsm.exedialer.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe 2844 explorha.exe 2844 explorha.exe 2188 msedge.exe 2188 msedge.exe 4552 msedge.exe 4552 msedge.exe 2488 msedge.exe 2488 msedge.exe 5068 msedge.exe 5068 msedge.exe 5292 rundll32.exe 5292 rundll32.exe 5292 rundll32.exe 5292 rundll32.exe 5292 rundll32.exe 5292 rundll32.exe 6140 amert.exe 6140 amert.exe 5292 rundll32.exe 5292 rundll32.exe 5292 rundll32.exe 5292 rundll32.exe 5352 powershell.exe 5352 powershell.exe 5352 powershell.exe 3524 explorha.exe 3524 explorha.exe 5044 explorgu.exe 5044 explorgu.exe 5132 identity_helper.exe 5132 identity_helper.exe 2592 RegAsm.exe 2592 RegAsm.exe 2592 RegAsm.exe 2592 RegAsm.exe 5356 rundll32.exe 5356 rundll32.exe 5356 rundll32.exe 5356 rundll32.exe 5356 rundll32.exe 5356 rundll32.exe 4400 u4b8.0.exe 4400 u4b8.0.exe 5676 RegAsm.exe 5676 RegAsm.exe 5356 rundll32.exe 5356 rundll32.exe 5356 rundll32.exe 5356 rundll32.exe 6412 dialer.exe 6412 dialer.exe 6412 dialer.exe 6412 dialer.exe 6580 powershell.exe 6580 powershell.exe 6580 powershell.exe 1496 powershell.exe 1496 powershell.exe 6396 powershell.exe 6396 powershell.exe 5668 powershell.exe 5668 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exeinstallutil.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 5352 powershell.exe Token: SeDebugPrivilege 5532 installutil.exe Token: SeDebugPrivilege 6580 powershell.exe Token: SeDebugPrivilege 5668 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 6396 powershell.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exego.exemsedge.exeu4b8.1.exepid process 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe 4904 go.exe 4904 go.exe 4904 go.exe 4904 go.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
go.exemsedge.exeu4b8.1.exepid process 4904 go.exe 4904 go.exe 4904 go.exe 4904 go.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe 1804 u4b8.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exeexplorha.exego.exemsedge.exemsedge.exemsedge.exedescription pid process target process PID 1520 wrote to memory of 2844 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe explorha.exe PID 1520 wrote to memory of 2844 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe explorha.exe PID 1520 wrote to memory of 2844 1520 e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe explorha.exe PID 2844 wrote to memory of 1228 2844 explorha.exe 7c4a4ee8ee.exe PID 2844 wrote to memory of 1228 2844 explorha.exe 7c4a4ee8ee.exe PID 2844 wrote to memory of 1228 2844 explorha.exe 7c4a4ee8ee.exe PID 2844 wrote to memory of 4056 2844 explorha.exe explorha.exe PID 2844 wrote to memory of 4056 2844 explorha.exe explorha.exe PID 2844 wrote to memory of 4056 2844 explorha.exe explorha.exe PID 2844 wrote to memory of 4904 2844 explorha.exe go.exe PID 2844 wrote to memory of 4904 2844 explorha.exe go.exe PID 2844 wrote to memory of 4904 2844 explorha.exe go.exe PID 4904 wrote to memory of 1380 4904 go.exe msedge.exe PID 4904 wrote to memory of 1380 4904 go.exe msedge.exe PID 4904 wrote to memory of 5068 4904 go.exe msedge.exe PID 4904 wrote to memory of 5068 4904 go.exe msedge.exe PID 1380 wrote to memory of 3400 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 3400 1380 msedge.exe msedge.exe PID 5068 wrote to memory of 5036 5068 msedge.exe msedge.exe PID 5068 wrote to memory of 5036 5068 msedge.exe msedge.exe PID 4904 wrote to memory of 3232 4904 go.exe msedge.exe PID 4904 wrote to memory of 3232 4904 go.exe msedge.exe PID 3232 wrote to memory of 4180 3232 msedge.exe msedge.exe PID 3232 wrote to memory of 4180 3232 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe PID 1380 wrote to memory of 1732 1380 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2904
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe"C:\Users\Admin\AppData\Local\Temp\e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\1000042001\7c4a4ee8ee.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\7c4a4ee8ee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account4⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe842346f8,0x7ffe84234708,0x7ffe842347185⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7848416739783786634,4820298468833434501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:25⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7848416739783786634,4820298468833434501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe842346f8,0x7ffe84234708,0x7ffe842347185⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:25⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:85⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:15⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:15⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:15⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:15⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:15⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:15⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:15⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:85⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:15⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:15⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,13912286642801099194,2159610756350644502,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2560 /prefetch:25⤵PID:3584
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe842346f8,0x7ffe84234708,0x7ffe842347185⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8868193477216254695,6865827200106353714,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:25⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,8868193477216254695,6865827200106353714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:3456 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5292 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:3792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\098131212907_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:6140
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2488
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\1001058001\koooooo.exe"C:\Users\Admin\AppData\Local\Temp\1001058001\koooooo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 8243⤵
- Program crash
PID:5588
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:5688
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001060001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1001060001\file300un.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5532 -
C:\Users\Admin\Pictures\D4LJZ3VAaLXETttomDRfBuTO.exe"C:\Users\Admin\Pictures\D4LJZ3VAaLXETttomDRfBuTO.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\u4b8.0.exe"C:\Users\Admin\AppData\Local\Temp\u4b8.0.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FBGHIIJDGH.exe"6⤵PID:6392
-
C:\Users\Admin\AppData\Local\Temp\FBGHIIJDGH.exe"C:\Users\Admin\AppData\Local\Temp\FBGHIIJDGH.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\FBGHIIJDGH.exe8⤵PID:4760
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30009⤵
- Runs ping.exe
PID:2936
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 33726⤵
- Program crash
PID:5996
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4b8.1.exe"C:\Users\Admin\AppData\Local\Temp\u4b8.1.exe"5⤵
- Blocklisted process makes network request
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵PID:116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 10405⤵
- Program crash
PID:6176
-
-
-
C:\Users\Admin\Pictures\8t1IhaQkXjNoQWCtpebIqNSt.exe"C:\Users\Admin\Pictures\8t1IhaQkXjNoQWCtpebIqNSt.exe"4⤵
- Executes dropped EXE
PID:5960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\Pictures\8t1IhaQkXjNoQWCtpebIqNSt.exe"C:\Users\Admin\Pictures\8t1IhaQkXjNoQWCtpebIqNSt.exe"5⤵PID:3568
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4764
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:6680
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:4872
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:548
-
-
-
-
C:\Users\Admin\Pictures\PZU5DJT3kfhwUERQlDi8SNXE.exe"C:\Users\Admin\Pictures\PZU5DJT3kfhwUERQlDi8SNXE.exe"4⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6396
-
-
C:\Users\Admin\Pictures\PZU5DJT3kfhwUERQlDi8SNXE.exe"C:\Users\Admin\Pictures\PZU5DJT3kfhwUERQlDi8SNXE.exe"5⤵PID:3276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6704
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:7044
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:6972
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5404
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵PID:2936
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:6492
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:6004
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:2592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:6172
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:1908
-
-
-
-
-
C:\Users\Admin\Pictures\sQbKtnBWsoIZLrPPyRMb2Dza.exe"C:\Users\Admin\Pictures\sQbKtnBWsoIZLrPPyRMb2Dza.exe"4⤵
- Executes dropped EXE
PID:5220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5668
-
-
C:\Users\Admin\Pictures\sQbKtnBWsoIZLrPPyRMb2Dza.exe"C:\Users\Admin\Pictures\sQbKtnBWsoIZLrPPyRMb2Dza.exe"5⤵PID:5424
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4776
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:6372
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:2476
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6068
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1804
-
-
-
-
C:\Users\Admin\Pictures\bPQhBej8fqHC81fIEvuHxnS1.exe"C:\Users\Admin\Pictures\bPQhBej8fqHC81fIEvuHxnS1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:5676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 6246⤵
- Program crash
PID:6564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 6326⤵
- Program crash
PID:6868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 8525⤵
- Program crash
PID:5536
-
-
-
C:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exe"C:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:6080 -
C:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exeC:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.35 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x6e97e1d0,0x6e97e1dc,0x6e97e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5704
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\vNa5K8IYtQUfOrGgRnemh8MR.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\vNa5K8IYtQUfOrGgRnemh8MR.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3828
-
-
C:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exe"C:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=6080 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240329140619" --session-guid=6824d27e-49ca-41da-9968-7cd68d8b4ccd --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=48050000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:6224 -
C:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exeC:\Users\Admin\Pictures\vNa5K8IYtQUfOrGgRnemh8MR.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.35 --initial-client-data=0x2a4,0x2a8,0x2ac,0x274,0x2b0,0x6df7e1d0,0x6df7e1dc,0x6df7e1e86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6308
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x10f0040,0x10f004c,0x10f00586⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6016
-
-
-
-
C:\Users\Admin\Pictures\9fVboIM3ZCRqZsLmD7gL5Rzj.exe"C:\Users\Admin\Pictures\9fVboIM3ZCRqZsLmD7gL5Rzj.exe"4⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4976
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:5320
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:940 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5356 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:5668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\098131212907_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6580
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3568 -ip 35681⤵PID:6140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5340 -ip 53401⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5588 -ip 55881⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5676 -ip 56761⤵PID:6468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5676 -ip 56761⤵PID:6744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:6780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:6748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4400 -ip 44001⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5340
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe1⤵
- Executes dropped EXE
PID:6776
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe1⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:7100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
6Credentials In Files
5Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD5dd2c8ba57ab4d7a8487c136552de85b8
SHA11c0a2d65f5b1838f16e9baaffc37a6ab45062447
SHA25685d7357009c511024e405703925edda0f12f491ff37ac05e4b534349c7e7dce0
SHA512be9665c4d61560757e00286fe44cf85cb9a03e3e1646016f8084a7d511d70e3520fa818fb68dde5a41f5bbcea2c26e98419cd17c7ddc3c5b41334234e80fa2ee
-
Filesize
124KB
MD5bc837550d56f4d15642eb70339c31eab
SHA1c99da125db374bf70cce3a0f4176f1f5e045647d
SHA256c0a447611a586fc7fc2cf94ba1c927d20f390fd63375a0688867b6454a8ef3f1
SHA512c98322e3c374fb172fb64d232c526ca71f1f73ac749b428cdc02239b65a788c6c9069b888cea6c24ef6eb9904a3e42c997e066d83a29424ed608554b3268c434
-
Filesize
2KB
MD53fda9af645225440fd4dbfec9c26bd4f
SHA1f9c53f2faa52297797a54ec11b97c3d09b0b7f64
SHA2561f8646fc2d9b5ad009f08c1151884ba830b58ae35669450f5208795a931bc2ca
SHA51223f96685d6797c0bdbe6cb06e6ef0c7165168ac56816baa0e987763f3e816eea2c6eca27012d0e9077122028e7f47f5fce3c0fce2b18af1889a9da28c5a04a87
-
Filesize
6KB
MD5a658e7b6662f4f96695e049c215822fc
SHA1a3cd4c24e17e3ed077858ffa807bfbea8886a0b2
SHA256a8428de4f62a5f08458dcb0f248677a950f773697783e83ae293c69f38340c66
SHA512195d78c1676e4c44fbacb39a81c1bffb535054641851b84cb0539dc83f95b59f909bd3d6e86c27b1b10efcfefed9b57b06adbad37f11753c129a622b9a7fc30d
-
Filesize
7KB
MD5b57811a1d313b5f51ee3f33f6dbda8c2
SHA1d593f094a33eb66b3530181c7431b96b5d13d6e8
SHA2560aaf1b4dc781b2f31c1ccb8d15975c244ec8d06a805b3208d561cf85f4d3276d
SHA512372c794232f46010689649c4d97132d376e90a9a434c5b27937635b55d85c68dd37bb4f7d2ea55c4d7182031b84bfde330ab321692d4fbbb501b5a38d93455f4
-
Filesize
707B
MD5f1cb62761ef4fa6aa60e77cf6db11502
SHA124ffc0c1bf80154dfa6b1c9f1e56a5a27793f40a
SHA256d54c655a30927cbd9c406d68b74d72cc843678286a6353a694d843df13eac1d9
SHA5120f8799b86b2b2a0578d91b38d15a6e3f80df5b6fe7699cadf810bad8a2e25353ee6710bb46113b4bb963eb9d01d4f85885ca247043ab685f20c5776e6cad0d78
-
Filesize
707B
MD582e4d93f3ad4eb22241ebb716d7eabdf
SHA14cfdd458793cb8859a8489968eb376b077ff47ce
SHA256f59850161d897a6c5a3405a758a51df935d013197f0f319a13360b8ce25e0168
SHA5126ff0030426efe51aff12c114d106dda778bde4fe078051c84859c22ceed07c8a3f48d00b583364efe285fd8ee28ded48919d2fdca25b39b51cc6a96218d6b934
-
Filesize
707B
MD5b3c68cd363ab4c9cb63b9feb5cd3d151
SHA1fd8388511b332557520bd3b5679ee84ca507aa5c
SHA256bd3d8e67714106487d6979942a2a1dd7eb6ae104c3b648fe90a701c6c0b969f4
SHA512327829e999bc1c7a1beecb529f5ab0253b2bfbd5457da6d59de4c1a9ddd2f9bd5ffb7f80c7a058ef6d9112b856abc94b4dcf37048aac7940ac27b88660b985a3
-
Filesize
707B
MD5951aecd2210a509d53c4355189e09dbf
SHA1f34d16f76b2185bc2bc2cc2d7a98c0e78af306f1
SHA256b1c2396f3f590c216eb78d6bc99d643beb4c2ecdca0ba6fd597a8d6cc5857792
SHA5125fd6aa61dfa714668f0c2e4f4ef9a3c5523cc86f4a79d5d0e7b9fd5c53898c9fa6b6a5fc261252db95764c459ee92c86164c70c885ae4be92dca2a80d974a99e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
8KB
MD587bb52e3f7932cc2d841e855659c01b3
SHA1728892ab83e95c6e8c2ea64b020d2fb04db05e1d
SHA2563f4d75c9cfb86e2f47c2448bb5c12ddcf92a7a827a4b39e5f4728cc2cd73ce0e
SHA51236d0567d88ee28cd2503167b832054d247e42d2105bfdcc7f6e50f34815cae94f697c3c387303b8b8c163ffd9a7de4a1af9e82845cd09f1a33ff286f5f3dafcc
-
Filesize
11KB
MD5c94915d1375c5b8cf4d38cfb830413dd
SHA1050560b2bef9c23a0ea0f505d75069857e2bf0d4
SHA256576c2820d0f5efcf45ccb548e5aef05fd8cf98d8148db3a080f12d542bc58342
SHA512fa5ecb35516c3ac6418ae015c3651c2724f5d7d28dd5854e2d5acac48a7c40ddf9fef89be39bbf21361c78f6127578c4e40d5c673860315d55835da97d675c9e
-
Filesize
11KB
MD5bf6cf36aace3e1be1afa411d86adf6ed
SHA1cd76374af27d89a6ddc349e4386d7b543817997a
SHA256906278bdd70b9cd58c716e7b11656824ac95e78c2a2e22e42dea72d5e7442e0e
SHA512666500fa4c14a7541560e4ff96fb1f7578e1e275809c6e1e9ead5b71e42630f56af663d0dd491844f8f537026668d6210430b96680a5e1cbacedbfc37b270846
-
Filesize
8KB
MD56dd71ebcfb2f2951e50c7df2f28c68b2
SHA172291ca93b7eed08cb003d985dd542e0da47d70e
SHA256869b258c0633551f34bb591184b759ca38f06b928887f48baafaa5a4d89faea7
SHA512c6f0b5193b1a8433612cd614bcfe89dbfab99edf0193bd3eb7dc29395360396e13f4783caf001127ee156edcff351f39c58fbce6a4629de7989bb1c0fec1b80a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\installer_prefs_include.json
Filesize230B
MD582ca55d161189b1e7021f35a1f3e3918
SHA10301a745de202a7c5df9b22da57c5a200303f76e
SHA256b9c00ce7544e192578af26f27797fb681d000ac82b608f8fdaeb8b2cc36aa256
SHA512cb862a7800cbb3bb5cef5a37f0dc767c0cf9ace4c202c8a6601336104e841b8a447fd0f822ef53718dbffefd3d042a1baf3ed404811eeec5414d9d3ea6b843fa
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\installer_prefs_include.json
Filesize1KB
MD540651f287feea6ec45b72687d2c1da5c
SHA14bb16084e2786c9b6265f2eeec7711632a1754b3
SHA256f52a9191ca9ef63288fc1d0314df3974cdd47eff517d03c1975c520848f93313
SHA5122150d6220cbb602faf1b95353981adeadf3a6a0d2454dd56881c7baaf743e56ee7a9d671f5df91df2c070a5d3664793dc02e0af0afb7175c961ae0413819ef7b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\installer_prefs_include.json.backup
Filesize215B
MD51dfea2f25a19565f470b972abc641812
SHA1cda808cdd109fc8c4d58e35431310c9294206eb5
SHA25633c4e288a3dd87a164847de8ae36e742e7c22da0d8b4fbd6b78ff74b1f208478
SHA512d23d05799d824266550ecd56f1d95c9f8ac028c645d6cc371773b140316f5edb996ad9b89b4af7f3856a95f074f36286dde70dcdbd19a2616dd1d01d135d5d3b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403291406191\opera_package
Filesize103.9MB
MD5401c352990789be2f40fe8f9c5c7a5ac
SHA1d7c1e902487511d3f4e1a57abdee8a94d5483ed4
SHA256f62f4ebc7eca46d9cddfb02cc0305da5efdd6f3601fb0f53da555e19558869a3
SHA512efc6d4224e3721e91efb2ea8f4b74685cba607260c69d08eac26866c52b8127080a42799d9f76ab1661b8ca63c946fcf35dddf0a63ab3cd258ea44a27dd769c8
-
Filesize
1.8MB
MD582a0e9df77991b4703d35b285fc54e02
SHA1e5a417e3c955ef4ad266ee25d965beb1a73923f0
SHA256e672e78fb7b85da95197a7f4d02e84b989f0c4831451d13bdefc1dd50eec0c92
SHA51294d019ddbb31885afa8babbcc6c3c0b10be3fce76ff4ae44e6a13394fc71388ccb641317ac913fefe8ac4ebff7be4c776f5c5b5ec2940afa06d6b52d0b78f0fa
-
Filesize
3.0MB
MD5800229e81ac8622c7303cf08d8ba5336
SHA1cd601151c5f3fcdfa0c213594e1aee78a7420879
SHA256eead74d6e44ef88fc319d627fffc927a0c6594c6a7e7896f3cedd0f4ba08c861
SHA512a6110fee0ee93e92571cc5ab7d6b096d66373252b52feb6967f5fb1019ea7e939e187a0b8f80d5867f5f4081a74f1d02b33b50210b42228aeee6e9f6f1e6f968
-
Filesize
894KB
MD52f8912af892c160c1c24c9f38a60c1ab
SHA1d2deae508e262444a8f15c29ebcc7ebbe08a3fdb
SHA25659ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308
SHA5120395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb
-
Filesize
1.8MB
MD56f1ca07821a548cc136ced5b2e6d5c48
SHA1a149e288de958cd5f14ac5f58b1c330091e25a3c
SHA256c9a2b7b61eecdabdbcf5dd2ac65a8d54b12649b46382fbd55ed47d1dfcc5cd2f
SHA512051816a11e02d6c4dc891f7a36c02131e77ae82113738078828943f0182a77ecd19925f892a06004a09677e57444ee74088259bd9f25cd9a57104514fa1041dd
-
Filesize
379KB
MD590f41880d631e243cec086557cb74d63
SHA1cb385e4172cc227ba72baf29ca1c4411fa99a26d
SHA25623b62a27e3f5c424b16f31e5009af4f24c8bd13b1f035f87879e2a29236be7a0
SHA512eeb85b34aa66a7e9a1b1807012999ee439433df23126a52ffa8d4b3cb2026be3bcf63ca25f143de58ba929c0d4feeaf2a603fd6ec6b5379fc48147c22f3783e3
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
386KB
MD516f67f1a6e10f044bc15abe8c71b3bd6
SHA1ce0101205b919899a2a2f577100377c2a6546171
SHA25641cca3fa0f500dc6c17d1f02fc906d2b0c769210af9c4286760b84ecf46cab89
SHA512a11db01bf55e3497644918c7dcc6180e0911261f39f062e653f000e1365dc9668fe5bd1d0fee0ae5c740a6477bcea510ba8c5ff6831c3bdb0d7c0590d2487e3c
-
Filesize
4.6MB
MD5117176ddeaf70e57d1747704942549e4
SHA175e3ab6b3469d93cce9ea2f7e22b71b987ccdf2b
SHA2563c5b34de987116a4d3240e319c0da89a951c96b81e6705476a0fea27b22b20af
SHA512ca2a356929c92d314aab63d7f3b246d72783212dfa3a4507f28d41a51ca0eedc78e85b1cd453aa8e02c12509f847a0216bb702154f903291c804c8a98ec378b9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD515e1d2b49d49a8b732553ea22db0ba52
SHA1fa9ca12aa8b7ce3bf4c17c5cfcb508047886b198
SHA2565eac76f43e899f053adbb8e73fd3827201c326ac880ce675503a5175bd2aa66e
SHA51295ff8e5e4e9c3fc75f96a0fb0a9df175760bef2535adc63f16dd9b1ebe714bfae99e0acb039d49e669377345a83f8af4baaaf6a75359d9023a72a67a45445e5e
-
Filesize
2KB
MD53e8655a33cff27c68d6536028c4f2423
SHA10cd518ce41d31f1cc9f24192a3a1ba486f27c46e
SHA25655793d4661262093677be6059c1ae4387b294db4655eb4c2ab5de0b201c4a37e
SHA5122ff89adb1d8f9886e7eb419fe890ca9db457c4194f80c043378e35a711c70d434d9a884f4742370b65b9d3774872e4248755ec7b39e7e88abd6c7b36cb6a23c1
-
Filesize
233KB
MD5f655c987a74774fcc43beda4ef44477d
SHA1e263b1d33cf69561c5e02ff078df90dfb9b0700c
SHA2564ddb70f6593a3b8989c814b1cf9bc6607ee72c316685f904bf1e7014f87e85a2
SHA512464d0059e7353dbed812c9bc4f0fd8c90e0accc8bf299014b5536d5ed0597950fc946b61a2618d7cef43c010f6f9c58194e224a4d47fa944ced44b961615d8d1
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
3KB
MD55a9d7e03fdef4c5bf9f4f673374039b9
SHA127ac0af4cb2549b93a8c225343a04e432671df39
SHA2565708f387fee49aa31ef7d97765ff66785b7da3ca8d466e819f6d8e6f271b23c9
SHA512c4a1541e731b01dfb6ca9f78c30570a248d6c003a43e1368090b5669e87f30d16350666d7860d697eee8a28ccf28e8dd0964bfdf0f2c36ebf40cd763d497a2ae
-
Filesize
3KB
MD550ea0af1cda2af6b227e5ba70631fef3
SHA1486cae026eb692d7a43df4218ae9e204db894b20
SHA25613bab2f210c1baaf8c01a7aabfdeab5dee374bd51a813d045e6ac29a3901ba5d
SHA512131cda4dca41c7b9a163baa0cc111792dcc2166a7d9e7f4e34806d394e833881e387fe4e3ad7491926abd42775bf9255cc70b491a3e45cc30a635b008ba27d02
-
Filesize
4.1MB
MD5a7837001588691fb8bc8304f72ef19ee
SHA1eb7a63f9514900f4598b92e2fbec146e68b6726d
SHA256fe69939c74e1d2aa7966eb332c70dd24946050105d82706124d6687900044662
SHA512fe2231ca4ab7dafea143b299e0ffc6bff75c6fc9e945e3e03cf70d2073c7bb6f7bb1d1145e18c933b6e9203c78c25cd3ee0994c876f6ac134e44148fbfb7760b
-
Filesize
4.3MB
MD5858bb0a3b4fa6a54586402e3ee117076
SHA1997c31f043347883ea5ed2323a558b6cc5ea9c8e
SHA256d97a7fc44bf341b9b2b2e65b46dab4f7d329afe15b4308b5aa56d5bfd7b99d35
SHA512e8374b115f056b5d345c9b5f9c42b3d49e0640d7fad869448f686add6e52b783ecc7fd35ee15a67b944843491a91becf5b7c0bd5603eda01042dd2904c1ad8fd
-
Filesize
378KB
MD56f17bbc203edea71880585d74262f262
SHA16987d2e4d289921f84bab709bd74db970bd8056b
SHA2565c3759c4051742b1366d7d2b7b4162c2a0035288970808a3ccbaedd19d6d18d1
SHA51211e3635a2ee674b3e9175b8fd89e5afd417efbf2a6e8a7368523e41f2efdd48a6c07533417ac98cce9dd1e1c77f5519796f768637d1114df77fc47fbc4fbd7a8
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
437KB
MD57960d8afbbac06f216cceeb1531093bb
SHA1008221bf66a0749447cffcb86f2d1ec80e23fc76
SHA256f6e476e8ccb571b9d7a76234953ad428e883ff4712b0062498ba3275d9749b84
SHA51235d12e81eb892aeb2237049beca61a81469dea5b1c9b7a0b9f49fbf95a95c756509d9e76c732fb10b504f9f9692e1fbe83ea2fd09d791f793a928c01974b8147
-
Filesize
4.1MB
MD560bcf281239531a5cc5910bd7afb51b6
SHA187a7a117464fe016ee163cd294e646710321b3e7
SHA256425eabbe8a3d4829ca4c56e18a908e9d19704727d6e6af070073fa427b0ba34b
SHA5128a30b984469d90b1a17337c58b756244795d9470bf2b274266ce9200d1d3dc0be5a87a4af1ddbee5e5ea1c8056ad01e9e3fcfba3f73c5c751184763cb97cc400
-
Filesize
5.1MB
MD5f175a1c598b156b4b13fa6395d8cc8d8
SHA1626848344fe101c29b3bbb9875ce441d6bc8de64
SHA256ae53c9a47eae2e126c17855742cfab1d56e04622188530a369b9cc2a8f7c6010
SHA512e99e8ef823e2a4accbddb637c0db5e62d4a6eb5e28c6e9ca685a92366bdd67e0c291f643ce25ebfc7da5c5ab0ec92c0d664d97a6354dcae2c15f4b97ec3d4f37
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e