Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe
-
Size
11.7MB
-
MD5
d742a20ae5bace7b2685c26fecd0bc66
-
SHA1
4bb1418db663a9f69da2c8089d9a6bbb487ec5e6
-
SHA256
84f41a3516629d92f2dbd7bc287dd61db2a8992da3edc0982db9002eef4043fb
-
SHA512
9acbace2aa1bf805ea7dca7f7f7ff7a660beca83f95051360cb6951cbaf0eb7a37d7adaa7ea671902c991133bdbfaa93c1d8710b5a4d00709c2c2b514a39991e
-
SSDEEP
98304:np/GsFKjdfMliYEDuKZ4N2tTIQfQVqgO+E5Cuen3TjUh:np/Ku3QfV5pe3T8
Malware Config
Signatures
-
Detects executables containing bas64 encoded gzip files 13 IoCs
resource yara_rule behavioral2/files/0x0008000000023385-23.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-122-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-158-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-174-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-202-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-224-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-243-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-264-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-297-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-310-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-320-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-331-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4268-341-0x0000000000E00000-0x0000000003EC8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File -
Executes dropped EXE 1 IoCs
pid Process 4268 myst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800001900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 myst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\490A7574DE870A47FE58EEF6C76BEBC60B124099 myst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\490A7574DE870A47FE58EEF6C76BEBC60B124099\Blob = 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 myst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 myst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 5c0000000100000004000000001000001900000001000000100000002fe1f70bb05d7c92335bc5e05b984da60f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f63030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e814000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e20000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 myst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\490A7574DE870A47FE58EEF6C76BEBC60B124099\Blob = 1900000001000000100000007a6a66f56f5c2341ab447592ce0ddef9030000000100000014000000490a7574de870a47fe58eef6c76bebc60b1240997e00000001000000080000000000cf97a737d6017f000000010000000c000000300a06082b060105050703091d0000000100000010000000443c22825ef037029f082f6030595f73140000000100000014000000c98077e0629282f5469cf3baf74cc3deb8a3ad396200000001000000200000009a114025197c5bb95d94e63d55cd43790847b646b23cdf11ada4a00eff15fb480b00000001000000300000004200750079007000610073007300200043006c0061007300730020003200200052006f006f0074002000430041000000090000000100000054000000305206082b06010505070302060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f000000010000002000000056db6d3c33811b6420936a9b42f80eabdb96c6f17c128ebec63e70db0b6cb77d20000000010000005d0500003082055930820341a003020102020102300d06092a864886f70d01010b0500304e310b3009060355040613024e4f311d301b060355040a0c14427579706173732041532d3938333136333332373120301e06035504030c174275797061737320436c617373203220526f6f74204341301e170d3130313032363038333830335a170d3430313032363038333830335a304e310b3009060355040613024e4f311d301b060355040a0c14427579706173732041532d3938333136333332373120301e06035504030c174275797061737320436c617373203220526f6f7420434130820222300d06092a864886f70d01010105000382020f003082020a0282020100d7c75ef7c107d477fb4321f4f4f569e4ee3201dba3861fe4590dbae7758352ebea1c611548bb1d07ca8caeb0dc969deac36092868228739c5606ff4b64f00c2a3749b5e5cf0c7ceef14abb733065f3d52f83b67ee3e7f59eab60f9d3f19d92748ae41c96ac5b80e9b5f43187a351fcc77ea16f8e5377d497c15533923e182f75d4ad8649cb95af54066cd806138d5bffe1261959c024ba8171799044506824945fb8b311f1294161a341cb2336d5c1f13250104e7ff48693ec84d38ebc4bbf5c014e073ddc148a940aa4ea73fb0b51e8130718fa0ef12bd154157d3ce1f7b4194267625e77e0a255ecb6d96917d53aaf44ed4ac59ee47a277ce575d7aacb25e7df6b0adb0f4d934ea8a0cd7b2ef259016ab70db807817e8b381b38e60a57993dee21e8a3f50c16dd8bec348e9c2a1c0015178d6883d2709f1808cd1168d5c96b52cdc4468fdcb5f3d857731ee9943904bfd3de38deb453ec691ca27ec48fe41b70adf2a2f9fbf7166466699f4951a2e2151867064a7fd56cb54db333e061eb5dbee9980f32d71d4b3c2e5a01529109f2dfea8dd8064063aa11e4fec3379e14523ff4e2ccf26193d1fd676bd752aebf68ab4043a057355378f053f861420764c6d76f9b4c380d63ac62af368ba2730a0df521bd74aa4dea720349dbc75f1d6263c7fddd91ec33eef56db46e3068dec8d626b0755e7bb4072098a17632b84d6c4f0203010001a3423040300f0603551d130101ff040530030101ff301d0603551d0e04160414c98077e0629282f5469cf3baf74cc3deb8a3ad39300e0603551d0f0101ff040403020106300d06092a864886f70d01010b05000382020100535f21f5bab03a52392c92b06c00c9efce20ef06f2969ee9a4747f7a16fcb7f5b6fb151b3faba6c0725d10b171eebc4fe3adac036d2e712eafc4e3ada3bd0c11a7b4ff4ab27b10101fa75741b2c0aef42c59d6471088f321512930ca6086af46ab1ded3a5bb094de44e34108a2c1ec1dd6fd4fb6d647d0140bcae6cab57b777e411f5e83c7b68c3996b03f9681416f6090e2e8f9fb2271d97db33d46bfb484af901c0f8f126aafefee1e7aae024a8a172b76feac5489242c4f3fb6b2a74e8ca89197fb29c67b5c2db9cb66b6b7a85b125185b5097e627870fea96a60b61d0e790cfdcaea248072c3973ff277ab43220ac7ebb60c84822c806b418a08c0eba56bdf9912cb8ad55e800c91e026083648c5fa381135ff25832df27abfdafd8efea5cb452c1fc48853ae770ed99a76c58e2c1da3bad5ec32aec0aaacf7d17a4debd407e248f7228eb0a49f6ace8eb2b260f4a322d023eb945a7a69dd0fbf4057ac6b5950d9a399e16efe8d0179272315de929d7b094d5ae74b48305a18e60a6de68fe0d2bbe6df7c6e2182c168394db498586662cc4a905ec3fa2704b179157499ccbead20de26601ceb5651a6a3eae4a33fa7ff61dcf15a4d6c322343eeaca8eeee4a12093c5d71c2be79fac287681d0bfd5c69cc06d09a7d54992ac9391a19af4b2a43f3635d5a58e22fe31de4a9d6d00ad09ebfd78109f1c9c7260dac981656a0 myst.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 3752 msedge.exe 3752 msedge.exe 4528 msedge.exe 4528 msedge.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1096 identity_helper.exe 1096 identity_helper.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4268 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 99 PID 1284 wrote to memory of 4268 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 99 PID 1284 wrote to memory of 4528 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 101 PID 1284 wrote to memory of 4528 1284 2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe 101 PID 4528 wrote to memory of 5024 4528 msedge.exe 103 PID 4528 wrote to memory of 5024 4528 msedge.exe 103 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 4256 4528 msedge.exe 104 PID 4528 wrote to memory of 3752 4528 msedge.exe 105 PID 4528 wrote to memory of 3752 4528 msedge.exe 105 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106 PID 4528 wrote to memory of 4336 4528 msedge.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\.mysterium-bin\myst.exeC:\Users\Admin\.mysterium-bin\myst.exe --userspace --launcher.ver=1.0.49/windows --config-dir=C:\Users\Admin\.mysterium-node --data-dir=C:\Users\Admin\.mysterium-node --log-dir=C:\Users\Admin\.mysterium-node --node-ui-dir=C:\Users\Admin\.mysterium-node/nodeui service --agreed-terms-and-conditions2⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:4449/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7fff674d46f8,0x7fff674d4708,0x7fff674d47183⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:83⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:83⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:13⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:13⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:13⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:13⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1288 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48.3MB
MD5f5c41bdae7b1ebfd399180692a38e0c2
SHA11746bbd2f2b950f72ba189f4087d430ce7a53df3
SHA25613d8e234eb12d1fcbad3919dafd7720d8f336f441081072260293b7b0a8269e6
SHA5126b192f327c5080ddbe3e752f36af7d13e6b644e27231054d3a3b011fb21763ed72d989da1da2ce79b09c01480a8b6ce8db686361e6af16b229b24e7457bec20e
-
C:\Users\Admin\.mysterium-node\keystore\UTC--2024-06-06T05-54-35.050949100Z--162cec1b71fbf7708582d1cff1ef7ea99cf6d57a
Filesize489B
MD58289eed061c4747ba303414895a743e9
SHA19f866362d5530742ff16cbc1a084f0ebcb2d03a4
SHA2561ab3b1e3c46b7350bf09095524f02a0dc6696081341da724f397555a6526d9d6
SHA51229487df3c4d26683bc3dbd43d6474f7609985a9708b1ed4b78101a24ea55ae311de88253212975a22003c59e980fa79fa2a9f10eb470f4888111a9b4dc4fa527
-
Filesize
22KB
MD53e48183cb4e096c170ceb84b84a5f158
SHA1b655ccf59ed80428dc36f20d227637c0037a22a5
SHA2561ec452a62a72caba3bceff2d5ea4cb4f18c52637929e34bd7e5a04efbaff9c16
SHA5124e3137908e11dcc74784feae41c9d2f49636587fa0025dddeed2ab0fcfa34e95f4aa9a12664da6be82d7504f15f73d8136bec3dac5854c50387201d9b17340d2
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD51b5987400d1cb2916a9af537667ab755
SHA182ad29c4f4cd495ff03bafcfc1ee2c5286abfa84
SHA256fcb9b66310e8d31b77a54d4b24b81e43b2e456bc29c62ef072cb500bd3cd231f
SHA512b8016ab5c12b43aebfb24c6801439da379d9a04f1afba90e7a5e91625f552a2140cbbc9773386f7e4b98da67a892af239b086a48730c5e25c8267888ad639f7c
-
Filesize
421B
MD5f0cec3a37c0940d9bddef77e4cb6136c
SHA1e17bd067ddfecd51fc55eaa9630ca39d9362c317
SHA2567206f58e5ee78c92a3c167ca7778ebf7d0fa72c26b0c919ac902956038ec2921
SHA512520d6458f50f5122a332d2f437a4c68370cd2513cf99c458f804d9d4c066f409b06d01f5320a83e41a027cee336f64ffaf127aa1150e115848b44f72986a4302
-
Filesize
5KB
MD5e631e3626c40b4b4336b1eb95d09f237
SHA13f16aa3507d8fe3da03a490a143acd46421b326b
SHA2563c429564d6d34ae62bd78b69fa8354ec32b52324aac3943aa8d9e8312486935b
SHA512a82bc7e1b329ca951ff8cf127a50ccbf73ffb62c47041f8c9cafac331c1624c19ee730d778a42fb5375fd60664e6b639b821c2d0eb282b3175856c33da440857
-
Filesize
6KB
MD5b7e252b5f7526cc3afa360b6f0028b4d
SHA122486c1386a85b0b5eee0480554a0032e737a0b0
SHA2568da14b19673f572e6b2096b59d8b5c5957ab55b1310e018b017139dbb350889b
SHA51215f0f2a3d13d8dd472e2f107ca4829b01f74c34d26d7f5c8b94746388f6e194e17f254856c519df0ab2fa535e69962372b3d9b258b1c628adf2c0dbb1fcdf8e7
-
Filesize
6KB
MD5bcd519c1f91c9fb626a4bb91e6b2a75b
SHA18f3cdf1b5049559db79137fa82d2235c44a6d28b
SHA25612b2c0b0fbc1bc3ecc39fd30a37f77311fe8afdb49a0eb52c5b73ebda71e18f8
SHA512b70ef459bb5f9ea76d559eef6f54042cd1007f13b67c529304541994f8dca788124a0d8304402f943685bf833d23f452000179ad65cffba3386023a9762d098f
-
Filesize
537B
MD5aa3756c7dc09a967425a5d9f75d29ead
SHA1bac02a6ba4aa0469928de75bb1265e9486545113
SHA2562f954d593bc82508b667ee04c886cb4fcb10971fee37eb914342cb5343cc0a62
SHA512a6f29b700bf7130c59a1b4fb021fa23f9e3e4abb516d8f15221761a5d73e25676af049f2d7ab33838eb85c6d086b083bfdc532e057d928de50ffb8c6057729fb
-
Filesize
537B
MD5a234cc4dfa82784770e73abf22a46153
SHA1d3b26dafa49d5c8e8ed60e72e746be4818ab1c55
SHA25600a69575ee8db6800136edf3a5d67a4a0eaf4f1b7322aa9b3eb444f61cf03680
SHA512ef34d1ce035680e8ba7f16b6c1a44387d398000901f475ea22f56fba8785deea40dd36bee4c2426bc9d605e42efb0527d49feed3f48533b955237c5a4df5f250
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b41d006fc92331ddfcf3f0a2688912ca
SHA1ba8d56db06dd6029629ed796e643b7e273b1de2e
SHA2561abf5151938da6b694e7e8d2a7f418cee9e393625dccab69cb0fd35bcce54b44
SHA5120143f09dd50db01f39b562af4de5c20052816a70785de983fa1da5668b760919d0594f05b9855437d9fb2ce75a469aec5c57be6bcd3728d75e86621aed8a2dd7