Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-07-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe
Resource
win11-20240709-en
General
-
Target
0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe
-
Size
1.8MB
-
MD5
14a972fb11d69e248f457997b7373b25
-
SHA1
1dc01cc5ec8c4fe6135a76fa26683867ee9de9cb
-
SHA256
0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa
-
SHA512
44a135a0e85c026874efc3e956921bf90574c0cfc4d9e36ac276e24d9737ea3bdfc3b681dc88dc9143e90524fef03b80ffdd463b29308c67be304aed532d2d15
-
SSDEEP
49152:1NPHlH/+jHmzRjoDvqsz6rLotK0XYYWNtnN1:1THuGz4qsE+JXYYoRX
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
25072023
185.215.113.67:40960
Extracted
redline
Logs
185.215.113.9:9137
Signatures
-
Detects Monster Stealer. 4 IoCs
resource yara_rule behavioral2/files/0x000100000002ab79-700.dat family_monster behavioral2/memory/6268-1974-0x00007FF7409F0000-0x00007FF741C2E000-memory.dmp family_monster behavioral2/memory/6268-2940-0x00007FF7409F0000-0x00007FF741C2E000-memory.dmp family_monster behavioral2/memory/6268-3385-0x00007FF7409F0000-0x00007FF741C2E000-memory.dmp family_monster -
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/files/0x000100000002ae49-2166.dat family_redline behavioral2/memory/2128-2242-0x0000000000630000-0x0000000000682000-memory.dmp family_redline behavioral2/files/0x000100000002b37f-5341.dat family_redline behavioral2/memory/3532-5353-0x0000000000E20000-0x0000000000E72000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 6372 created 3340 6372 Blsvr.exe 52 PID 6372 created 3340 6372 Blsvr.exe 52 PID 6372 created 3340 6372 Blsvr.exe 52 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e39513a6ce.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4132 netsh.exe 7016 netsh.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e39513a6ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e39513a6ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 4284 powershell.exe 3964 cmd.exe -
Deletes itself 1 IoCs
pid Process 6268 stub.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe -
Executes dropped EXE 23 IoCs
pid Process 6024 explorti.exe 1476 85876484ae.exe 6972 2d5a8365de.exe 6148 e39513a6ce.exe 6364 axplong.exe 5972 axplong.exe 6896 explorti.exe 7132 build.exe 6268 stub.exe 6340 crypteda.exe 4960 2.exe 2128 25072023.exe 2860 IkqWYlyikC.exe 6332 LmYPnnghEY.exe 6280 pered.exe 952 pered.exe 1704 2020.exe 6808 2020.exe 3532 buildred.exe 6372 Blsvr.exe 6296 axplong.exe 3616 explorti.exe 8100 Authenticator.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine e39513a6ce.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Wine 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe -
Loads dropped DLL 64 IoCs
pid Process 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 6268 stub.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 952 pered.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe 6808 2020.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\85876484ae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\85876484ae.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\2d5a8365de.exe = "C:\\Users\\Admin\\1000029002\\2d5a8365de.exe" explorti.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 raw.githubusercontent.com 102 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ipinfo.io 141 ipinfo.io 15 ip-api.com -
pid Process 1352 cmd.exe 6976 ARP.EXE -
Power Settings 1 TTPs 5 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 7996 powercfg.exe 8012 powercfg.exe 7864 cmd.exe 7912 powercfg.exe 7956 powercfg.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 6736 tasklist.exe 7140 tasklist.exe 6284 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 4744 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 6024 explorti.exe 6972 2d5a8365de.exe 6148 e39513a6ce.exe 6364 axplong.exe 6972 2d5a8365de.exe 5972 axplong.exe 6896 explorti.exe 952 pered.exe 3616 explorti.exe 6296 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 6340 set thread context of 5560 6340 crypteda.exe 198 PID 6372 set thread context of 7932 6372 Blsvr.exe 243 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\axplong.job e39513a6ce.exe File created C:\Windows\Tasks\explorti.job 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 7804 sc.exe 7812 sc.exe 7824 sc.exe 7840 sc.exe 7852 sc.exe 1784 sc.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral2/files/0x000100000002af06-3849.dat pyinstaller behavioral2/files/0x000100000002b345-5293.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x000100000002ab9d-742.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Program crash 2 IoCs
pid pid_target Process procid_target 7144 6972 WerFault.exe 115 1532 4960 WerFault.exe 195 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e39513a6ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25072023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d5a8365de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IkqWYlyikC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LmYPnnghEY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buildred.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85876484ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4108 cmd.exe 5924 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 3272 NETSTAT.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 3172 WMIC.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2860 ipconfig.exe 3272 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1396 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 6836 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 25072023.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 25072023.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 6024 explorti.exe 6024 explorti.exe 240 msedge.exe 240 msedge.exe 4060 msedge.exe 4060 msedge.exe 4236 chrome.exe 4236 chrome.exe 6148 e39513a6ce.exe 6148 e39513a6ce.exe 6364 axplong.exe 6364 axplong.exe 6840 identity_helper.exe 6840 identity_helper.exe 5972 axplong.exe 5972 axplong.exe 6896 explorti.exe 6896 explorti.exe 7148 msedge.exe 7148 msedge.exe 4284 powershell.exe 4284 powershell.exe 4284 powershell.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 6332 LmYPnnghEY.exe 2860 IkqWYlyikC.exe 2860 IkqWYlyikC.exe 3616 explorti.exe 3616 explorti.exe 6296 axplong.exe 6296 axplong.exe 6372 Blsvr.exe 6372 Blsvr.exe 6372 Blsvr.exe 6372 Blsvr.exe 6372 Blsvr.exe 6372 Blsvr.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 3532 buildred.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4236 chrome.exe 4236 chrome.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeDebugPrivilege 4808 firefox.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeIncreaseQuotaPrivilege 6828 WMIC.exe Token: SeSecurityPrivilege 6828 WMIC.exe Token: SeTakeOwnershipPrivilege 6828 WMIC.exe Token: SeLoadDriverPrivilege 6828 WMIC.exe Token: SeSystemProfilePrivilege 6828 WMIC.exe Token: SeSystemtimePrivilege 6828 WMIC.exe Token: SeProfSingleProcessPrivilege 6828 WMIC.exe Token: SeIncBasePriorityPrivilege 6828 WMIC.exe Token: SeCreatePagefilePrivilege 6828 WMIC.exe Token: SeBackupPrivilege 6828 WMIC.exe Token: SeRestorePrivilege 6828 WMIC.exe Token: SeShutdownPrivilege 6828 WMIC.exe Token: SeDebugPrivilege 6828 WMIC.exe Token: SeSystemEnvironmentPrivilege 6828 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe 4808 firefox.exe -
Suspicious use of SendNotifyMessage 49 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe 7932 conhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4808 firefox.exe 6972 2d5a8365de.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 6024 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 82 PID 2672 wrote to memory of 6024 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 82 PID 2672 wrote to memory of 6024 2672 0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe 82 PID 6024 wrote to memory of 1476 6024 explorti.exe 83 PID 6024 wrote to memory of 1476 6024 explorti.exe 83 PID 6024 wrote to memory of 1476 6024 explorti.exe 83 PID 1476 wrote to memory of 2620 1476 85876484ae.exe 84 PID 1476 wrote to memory of 2620 1476 85876484ae.exe 84 PID 2620 wrote to memory of 4236 2620 cmd.exe 88 PID 2620 wrote to memory of 4236 2620 cmd.exe 88 PID 2620 wrote to memory of 4060 2620 cmd.exe 89 PID 2620 wrote to memory of 4060 2620 cmd.exe 89 PID 2620 wrote to memory of 4228 2620 cmd.exe 90 PID 2620 wrote to memory of 4228 2620 cmd.exe 90 PID 4236 wrote to memory of 4208 4236 chrome.exe 91 PID 4236 wrote to memory of 4208 4236 chrome.exe 91 PID 4060 wrote to memory of 1032 4060 msedge.exe 92 PID 4060 wrote to memory of 1032 4060 msedge.exe 92 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4228 wrote to memory of 4808 4228 firefox.exe 93 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 PID 4808 wrote to memory of 2144 4808 firefox.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5968 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe"C:\Users\Admin\AppData\Local\Temp\0a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Users\Admin\AppData\Local\Temp\1000020001\85876484ae.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\85876484ae.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\57CF.tmp\57D0.tmp\57D1.bat C:\Users\Admin\AppData\Local\Temp\1000020001\85876484ae.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"6⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff89635cc40,0x7ff89635cc4c,0x7ff89635cc587⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,8205914124105337069,16249951560490403923,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1832 /prefetch:27⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2008,i,8205914124105337069,16249951560490403923,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2068 /prefetch:37⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2144,i,8205914124105337069,16249951560490403923,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2312 /prefetch:87⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,8205914124105337069,16249951560490403923,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3144 /prefetch:17⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,8205914124105337069,16249951560490403923,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3188 /prefetch:17⤵PID:4764
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x110,0x114,0x118,0xec,0x11c,0x7ff8964a3cb8,0x7ff8964a3cc8,0x7ff8964a3cd87⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2008 /prefetch:27⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2372 /prefetch:87⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:17⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:17⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:17⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:17⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:17⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4492 /prefetch:17⤵PID:6344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:17⤵PID:6196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:6840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1996,12332493071121502088,327275165333909215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:7148
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"6⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1876 -prefsLen 25751 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {61df1413-3162-467a-ae5c-ff1ad8b304c4} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" gpu8⤵PID:2144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 26671 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af75501c-68a6-4380-ab6c-6175d96090c6} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" socket8⤵PID:4088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 3160 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29011681-4913-4ea7-951b-d4b275e28019} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab8⤵PID:1036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3612 -childID 2 -isForBrowser -prefsHandle 3732 -prefMapHandle 3728 -prefsLen 31161 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4be05d83-35fa-4a58-bf1e-5e51673c5f96} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab8⤵PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4700 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4692 -prefMapHandle 4688 -prefsLen 31161 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba648244-bceb-4155-ad03-4ee9aa5ac269} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" utility8⤵
- Checks processor information in registry
PID:948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 3 -isForBrowser -prefsHandle 5508 -prefMapHandle 4824 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cd68233-95a3-4f99-ad3e-613b76eee300} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab8⤵PID:2556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {616c8b79-bc6d-4b78-a6af-88488cdf1ba9} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab8⤵PID:6092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 5 -isForBrowser -prefsHandle 5876 -prefMapHandle 5880 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {efca0b5e-9344-4c5a-9162-6363afbbbede} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" tab8⤵PID:2328
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"4⤵PID:5776
-
-
C:\Users\Admin\1000029002\2d5a8365de.exe"C:\Users\Admin\1000029002\2d5a8365de.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6972 -s 12645⤵
- Program crash
PID:7144
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000030001\e39513a6ce.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\e39513a6ce.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6148 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6364 -
C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe"6⤵
- Executes dropped EXE
PID:7132 -
C:\Users\Admin\AppData\Local\Temp\onefile_7132_133667728219695579\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\build.exe"7⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:6268 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:3080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵PID:1220
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵
- Suspicious use of AdjustPrivilegeToken
PID:6828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"8⤵PID:6852
-
C:\Windows\system32\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
PID:6736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe""8⤵
- Hide Artifacts: Hidden Files and Directories
PID:4744 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe"9⤵
- Views/modifies file attributes
PID:5968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('%error_message%', 0, 'System Error', 0+16);close()""8⤵PID:3080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"8⤵PID:6636
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe9⤵
- Kills process with taskkill
PID:6836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:1816
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
PID:7140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"8⤵
- Clipboard Data
PID:3964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard9⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "chcp"8⤵PID:6200
-
C:\Windows\system32\chcp.comchcp9⤵PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "chcp"8⤵PID:3552
-
C:\Windows\system32\chcp.comchcp9⤵PID:4928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"8⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4108 -
C:\Windows\system32\netsh.exenetsh wlan show profiles9⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"8⤵
- Network Service Discovery
PID:1352 -
C:\Windows\system32\systeminfo.exesysteminfo9⤵
- Gathers system information
PID:1396
-
-
C:\Windows\system32\HOSTNAME.EXEhostname9⤵PID:2292
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername9⤵
- Collects information from the system
PID:3172
-
-
C:\Windows\system32\net.exenet user9⤵PID:4248
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user10⤵PID:6200
-
-
-
C:\Windows\system32\query.exequery user9⤵PID:6748
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"10⤵PID:1692
-
-
-
C:\Windows\system32\net.exenet localgroup9⤵PID:1936
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup10⤵PID:4788
-
-
-
C:\Windows\system32\net.exenet localgroup administrators9⤵PID:2012
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators10⤵PID:4260
-
-
-
C:\Windows\system32\net.exenet user guest9⤵PID:6836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest10⤵PID:2256
-
-
-
C:\Windows\system32\net.exenet user administrator9⤵PID:2488
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator10⤵PID:7028
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command9⤵PID:1436
-
-
C:\Windows\system32\tasklist.exetasklist /svc9⤵
- Enumerates processes with tasklist
PID:6284
-
-
C:\Windows\system32\ipconfig.exeipconfig /all9⤵
- Gathers network information
PID:2860
-
-
C:\Windows\system32\ROUTE.EXEroute print9⤵PID:5748
-
-
C:\Windows\system32\ARP.EXEarp -a9⤵
- Network Service Discovery
PID:6976
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano9⤵
- System Network Connections Discovery
- Gathers network information
PID:3272
-
-
C:\Windows\system32\sc.exesc query type= service state= all9⤵
- Launches sc.exe
PID:1784
-
-
C:\Windows\system32\netsh.exenetsh firewall show state9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:7016
-
-
C:\Windows\system32\netsh.exenetsh firewall show config9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵PID:5720
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵PID:4560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵PID:5128
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵PID:4428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5560 -
C:\Users\Admin\AppData\Roaming\IkqWYlyikC.exe"C:\Users\Admin\AppData\Roaming\IkqWYlyikC.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Users\Admin\AppData\Roaming\LmYPnnghEY.exe"C:\Users\Admin\AppData\Roaming\LmYPnnghEY.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 3847⤵
- Program crash
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"6⤵
- Executes dropped EXE
PID:6280 -
C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:1444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"6⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"7⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
PID:6808 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:5436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_MEI17042\Blsvr.exe8⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\_MEI17042\Blsvr.exeC:\Users\Admin\AppData\Local\Temp\_MEI17042\Blsvr.exe9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe"6⤵
- Executes dropped EXE
PID:8100
-
-
-
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:7752
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:7804
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:7812
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:7824
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:7840
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:7852
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:7864 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:7912
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:7956
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
PID:7996
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
PID:8012
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:7932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6972 -ip 69721⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4960 -ip 49601⤵PID:6704
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6296
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3616
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
8System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5a9656876f5827e7fe9d3c51fd293fcae
SHA1c85b66a9d296e82a3792125dc07d50df2cf36d4e
SHA256556070b2b114cf521989bed70ebf42b47bcb31ac5357c4813f1ffc7bfab66a18
SHA512233f291b30a72ada032ea579ff3facbcc7db413a10b69d32b6e7990b784cc7d3da83c433c1af5aeb60e89c3e8f669b4bd10fb475391497b3cd904bab3735dddd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD51c35416e74cecabb1c835fc9003c7da4
SHA18c01f04284d0ffb02783f94db0b613d0fdd3dd11
SHA2563085f3bc1464cdd85b89c37b9cd2e3d6e8923d6557ccff8a4cb6019dcbcba425
SHA5123b67a8532b2e428c036c741d6ea8784d1c193d4652cf4c582519d08a4e5834e508748058b182b091fd3707c62cc6f74d51eb9fc0998f1142db65ee6eee1ed732
-
Filesize
9KB
MD5aac30fd3d798e83dfab0f21a96df9fe0
SHA13ffda62eec093d23633a29fe90daf455ef99e5ca
SHA256670c8f8e4b9471bf0fcfcad9564c8c3da6b7eeb390dc2aa778c1d85a464103a5
SHA5120daa067ffd71bbe90929abc8ad340b58ee3ce4795ed35b8d9469865c2baf9ea9d6fc499a4522c86c2fabde0dd268e99c4141ef030780ef11ba77b717e311f2ec
-
Filesize
92KB
MD50b5ab03c7eda789f509488e851694447
SHA18913c17f9a800a6ccc17a18e53a0c6f52699d658
SHA256de487eccf0c9b29458639710074ca51ca0106e92704341ff64751050034ff597
SHA512190755b699f3be87596c1dd6b4c5b6aa9fe1d90ca340ea52eeeaaa39df2c3420d32b6844dae346f7d150370449ea6aa4f9ab2e320e89d97f50ec68c855447f0d
-
Filesize
152B
MD5f53eb880cad5acef8c91684b1a94eed6
SHA1afab2b1015fecbc986c1f4a8a6d27adff6f6fde9
SHA2565cb8554e763313f3d46766ab868f9d481e3644bfc037f7b8fe43d75d87405a27
SHA512d53f3965428f73c0dfed1d941a9ff06eb70b254732410b815bc759b8c7904e11292ad7e9624c12cccaed6763e7bea68208bc0b67fc70b7616d25bda143833794
-
Filesize
152B
MD5b0499f1feacbab5a863b23b1440161a5
SHA137a982ece8255b9e0baadb9c596112395caf9c12
SHA25641799b5bbdb95da6a57ae553b90de65b80264ca65406f11eea46bcb87a5882a7
SHA5124cf9a8547a1527b1df13905c2a206a6e24e706e0bc174550caeefabfc8c1c8a40030e8958680cd7d34e815873a7a173abe40c03780b1c4c2564382f1ceed9260
-
Filesize
33KB
MD5daa6948a37ac312342600f2b96db15ea
SHA10bfa2e04bf51480baf1fc7e7819f65cd3b0c90ba
SHA256de7cf820e8eb0aa51d82aff3a848fd853dfa878674cc67094aee0ac115c85fee
SHA5125af3ceb0a4c56b767792ad349b83a179191d9fe6dca8e3795cb48edb87ae6a8b89e51a64ebedd68857c674befd71dc1664a2e8380ac21abacc9566329d8c2e14
-
Filesize
38KB
MD5a1cbc8600fb0e0b668df61bb5d1737f9
SHA165aaea9cf40ee7aafcf033f35980aac172b0a267
SHA256b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb
SHA512c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e50a023a2141f14474daf991cc49c911
SHA19bcda8e5da64ba14cb70548dfaac3bbac7db7322
SHA2569f681cf572723a46134c1911bbbb58c044adc1ee743ce26332df7e33c8b4dce8
SHA512a15f36b4db10b8edf4a94c54204fdca3f11f00f62d0050ede92b971167157ca96dd6c2dece52abdff3e0a331cb39b6709c60b766ae036b0ab2fa57e57869e50d
-
Filesize
1KB
MD57c456ebc57e9d7ce804dfe239d1c1e4a
SHA1f56e353cbbec5612d7cf5ca5c16d08ae922537a9
SHA25697a585d8dc17683cc0642595d92029fcb1cbfdc0a79d9e08eba4818bfd35ca19
SHA512b8a1b74289a22bca1b3caf23f68acc3530de6b6fb7844b262acc5d5fb251ef44938790f93167d951b8a10584b9315e6478dcf035af53739f7ec4996e13cd06c1
-
Filesize
6KB
MD5c887bbdb6d12dfb4591e55b434def401
SHA1c41f94910ab4b28e1e3f07baad7b4943eb31a487
SHA2563b267c2ee842c394a63f1fce01804eb090e632f9f4898fdaba03d8b9400b0094
SHA5123b72e09e0f9ec8a818c057e0a0d010a750fc37a47068f80c31d0672245b8fb38626c9b2fb37ea6bf39e13027a3a7255fa2c95195d0e898af22cf049d35b31c84
-
Filesize
5KB
MD5dc9e9100236c2cb28904911f192eb741
SHA1082a11da93ff2ae50f32499514a97bf9dda0a76d
SHA25659fa80ed56ba4ad15f08b6f920b7e47be30fc9c0c94f6b6913ebcfa992552afc
SHA512c0998fa430adc3e3779073d88eca9c101ec1d52eb4c5925d665775867780e23ecc3bb4a3cd567c368212340108526a69737039b00f84105a781ccb68f86daaef
-
Filesize
6KB
MD58ef9b3397d12a48747e0a3aaaf2a0291
SHA14e798bae588db9302143c7775005692f6d54b156
SHA256428307cf0708618fc1ade448ad4ad0929710f771baf2556c46dd0430f457092a
SHA5121f28104bb07a72f3f3ca9f7ed2de57365fe138369eaadb1ed838fd88392156b82a6573be060400683bbd0a9eacb8de0b760d0076d4a335f571d9216e87827979
-
Filesize
6KB
MD5252ffbbc4fdbb165f8112ec6c948beec
SHA144b2a945dd26dcd69e5793bcef68c785ca2c17b0
SHA2566079f8c9d5d4ffe1cffa877b7388b2a740e8d3786bc3f00cb55c386910df5fa5
SHA5122c9703c4a0d3b712fbcb50cba9bc6352277913c9e5b766b2fd3cf91dae04dfeb9eb3f772155c5b0067e589ca2398befbf4ac2bb4db5a88d77e192bc04aac7310
-
Filesize
372B
MD521a1e53fd27b7066428f33a1f4d7ee98
SHA1fe6078bde4261164cba1d52e6f0631952c28606b
SHA256a9d973d0dafbdedf61318f54a09f1a4a465625ecf869c69d73ecb1b80c65852c
SHA5124f5fb1a00b3931ff603376d9cb3f682a77b0a927da91b74dc0f9fdb2d0223d581b7198610b09ed11e8d82f92aad33dc1822cf84c405a066e07ca8583b5bef717
-
Filesize
204B
MD588b5329d95e6859c5a1bf57fa81d4237
SHA18864ca2ac0070dd61f5f8b4ed38d8acf58efcda8
SHA2563d7721f6d519df63668e00c201004ce98c51f13e940a3114d702de3693a7ce1b
SHA5124a591d4a92b2f482ba4505a7ca0572758b8f52307060a5259caeae1703b7a916c3890c72bdcbcb57ff3da51ff06707c50d25cfcee1cd730d9603d54972966569
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD52381d6f651487164e531fc1d029838f2
SHA1229f1a1d48abfd70fb18a0b4aff1710f9dfbef50
SHA256a9849bc982b775e875e19a963973a46b5d79ff0458584069bf3a5a4656bcb67c
SHA5123a2ecd3d61c0828ad2485eb5595c9e5a1cb689e9e1a857399a030cb905d15f0bef3d951727111e13a30575865b006b6ece7a830eba9d3fa9a1de4abe05f59aec
-
Filesize
11KB
MD54c2867d9152657b8d6026cb9d68da58e
SHA115ca0218d3b31847b8d326c0032de04020d90adf
SHA25615061c9843284b365c149a7487c3827dd9ff0358d349516aaef1900214b14534
SHA5124da6ba6fe3899173016b6cd062f3b0e79a46bbb0168fb518a7772bc3712c583c00d3f9900ae8dddf1180f4d7d0cb989af80f6456ab0dae768870313090805236
-
Filesize
10KB
MD565b8ae87dc024adcca49b97e1b8f3c6a
SHA1d3a9d4ec58a7702df0d6a03c9c13d0158bb7d203
SHA256000c09534ee42901c2e797e22210d08fe7500b1c79cd954ccc79cc106ede18f8
SHA5125d2e848ac88d35fc4e4893bc55594233b8ed0aec2c1b4edc9e8b9bdc1db81464ec2d85aa76bab7e10d0ac420d54aea813a4857fbbe01ee4aae9eaa0d6a6e85bc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n9orreff.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5b143168d26b33429538f38a97ca55ff3
SHA1f5c4d3f5d13ee93259ce97f60c9387c84ef24fb7
SHA256239bac62ae47773b58f1214932e88ba47dd49be20a73cb566235f5a5d494c253
SHA5124184b4baa3a1afaaeaaa65d62c6e741d75fcc198f6a2dbcce454c1a0a87b01bb90cfa6af4d6105a8540411a9cfd680ac59037d42b305f4f5fe35d91440f15814
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n9orreff.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5f4dd5e9b5254d11840e6e7fa7973dbb8
SHA134b2e3e0a4fa82dc02910e82def58aca08d561e4
SHA25616a70ea7a2b7e8aee7f4be3ca9a76512b72291e4c4d533aed71b8b4319a0edbb
SHA512d2feace2d1595a70c45d920b9c6fac32ea8a3c358e4536589c98b52f927788d0dfd0531c17d027bb8190f9ca2b096060a5676bb89f4341e1258dc5227820715b
-
Filesize
1.8MB
MD514a972fb11d69e248f457997b7373b25
SHA11dc01cc5ec8c4fe6135a76fa26683867ee9de9cb
SHA2560a56efa1e8fa963d9b878e07c3eeb2ff3afdb1c35c32a527642613c97a224caa
SHA51244a135a0e85c026874efc3e956921bf90574c0cfc4d9e36ac276e24d9737ea3bdfc3b681dc88dc9143e90524fef03b80ffdd463b29308c67be304aed532d2d15
-
Filesize
10.7MB
MD5c8cf26425a6ce325035e6da8dfb16c4e
SHA131c2b3a26c05b4bf8dea8718d1df13a0c2be22ee
SHA2569f7be9bf913d8378f094b3f6416db9aa4c80c380000202f7cfaddadb6efc41b4
SHA5120321e48e185c22165ac6429e08afac1ccfdf393249436c8eac8a6d64794b3b399740aa5b2be23d568f57495d17e9220280ed1c2ea8f012b2c4021beb02cbc646
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
248KB
MD5d3759d5a234b497cf2d79a4b8fdfd279
SHA1834fbe1074432cdbc440715166fa325c8710d4dc
SHA2565d3c79bc9d6bc31703aa9001556967fe8433903ecfa43897ff949037bfd4cf61
SHA5122444ea3721db9f4bb32eac6dfde77e2f21cb28a76039f3132ccb6bab9068f5a148aa66de2f478c360ed5eef74117520c3c8eb8b4a6ccd539672a6e0a2e0cedbe
-
Filesize
304KB
MD5a9a37926c6d3ab63e00b12760fae1e73
SHA1944d6044e111bbad742d06852c3ed2945dc9e051
SHA25627955c80c620c31df686ccd2a92bce1d07e97c16fda6bd141812e9b0bdd7b06b
SHA512575485d1c53b1bf145c7385940423b16089cf9ab75404e2e9c7af42b594480470f0e28dadcddbd66e4cd469e45326a6eb4eb2362ccc37edb2a956d224e04cf97
-
Filesize
10.9MB
MD5faf1270013c6935ae2edaf8e2c2b2c08
SHA1d9a44759cd449608589b8f127619d422ccb40afa
SHA2561011889e66c56fd137bf85b832c4afc1fd054222b2fcbaae6608836d27e8f840
SHA5124a9ca18f796d4876effc5692cfeb7ce6d1cffdd2541b68753f416d2b0a7eff87588bc05793145a2882fc62a48512a862fa42826761022fed1696c20864c89098
-
Filesize
12.3MB
MD595606667ac40795394f910864b1f8cc4
SHA1e7de36b5e85369d55a948bedb2391f8fae2da9cf
SHA2566f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617
SHA512fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142
-
Filesize
89KB
MD554c5864073c75e18b3743cfb560c5310
SHA119877d0d8cdc81a3fbcdf92e5387273ee23e22ed
SHA2565f8568a05ac1f933f6d608d182fef22f773ed28cbaa6b834a9f31ebaf19130d0
SHA512fd9348f50b5a2430d62b63ce0aa994e2139f89f420a3022afd389557b5742080af77e8a2a8bfecff6a2d24cc3b5760090269e74fb2581ac82a4a23772f5ab193
-
Filesize
304KB
MD54e0235942a9cde99ee2ee0ee1a736e4f
SHA1d084d94df2502e68ee0443b335dd621cd45e2790
SHA256a0d7bc2ccf07af7960c580fd43928b5fb02b901f9962eafb10f607e395759306
SHA512cfc4b7d58f662ee0789349b38c1dec0c4e6dc1d2e660f5d92f8566d49c4850b2bf1d70e43edf84db7b21cb8e316e8bcc3e20b797e32d9668c69a029b15804e3f
-
Filesize
1.8MB
MD5b4720c6b85384eb6bfd8435a44ca73e3
SHA121f112312adb61a932d6d7ed2b044465bb4dcf46
SHA2563b028d3534d1381e00c3e53e38175c9232c99371a40375d439c3865f5fb7553c
SHA5128898e563616fc46f21229ecc70310d496b2cfcad6f320713932501d03c35712e094ec04c4c25e96f4a0cfc206426252e08b3d01428928076a957683b3c650d48
-
Filesize
11.0MB
MD5dae181fa127103fdc4ee4bf67117ecfb
SHA102ce95a71cadd1fd45351690dc5e852bec553f85
SHA256f18afd984df441d642187620e435e8b227c0e31d407f82a67c6c8b36f94bd980
SHA512d2abe0aec817cede08c406b65b3d6f2c6930599ead28ea828c29d246e971165e3af655a10724ca3c537e70fe5c248cdc01567ed5a0922b183a9531b126368e3f
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
81KB
MD5a4b636201605067b676cc43784ae5570
SHA1e9f49d0fc75f25743d04ce23c496eb5f89e72a9a
SHA256f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c
SHA51202096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488
-
Filesize
177KB
MD5ebb660902937073ec9695ce08900b13d
SHA1881537acead160e63fe6ba8f2316a2fbbb5cb311
SHA25652e5a0c3ca9b0d4fc67243bd8492f5c305ff1653e8d956a2a3d9d36af0a3e4fd
SHA51219d5000ef6e473d2f533603afe8d50891f81422c59ae03bead580412ec756723dc3379310e20cd0c39e9683ce7c5204791012e1b6b73996ea5cb59e8d371de24
-
Filesize
6.9MB
MD5f918173fbdc6e75c93f64784f2c17050
SHA1163ef51d4338b01c3bc03d6729f8e90ae39d8f04
SHA2562c7a31dec06df4eec6b068a0b4b009c8f52ef34ace785c8b584408cb29ce28fd
SHA5125405d5995e97805e68e91e1f191dc5e7910a7f2ba31619eb64aff54877cbd1b3fa08b7a24b411d095edb21877956976777409d3db58d29da32219bf578ce4ef2
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
119KB
MD587596db63925dbfe4d5f0f36394d7ab0
SHA1ad1dd48bbc078fe0a2354c28cb33f92a7e64907e
SHA25692d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4
SHA512e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b
-
Filesize
154KB
MD5b5fbc034ad7c70a2ad1eb34d08b36cf8
SHA14efe3f21be36095673d949cceac928e11522b29c
SHA25680a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6
SHA512e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c
-
Filesize
75KB
MD5e137df498c120d6ac64ea1281bcab600
SHA1b515e09868e9023d43991a05c113b2b662183cfe
SHA2568046bf64e463d5aa38d13525891156131cf997c2e6cdf47527bc352f00f5c90a
SHA512cc2772d282b81873aa7c5cba5939d232cceb6be0908b211edb18c25a17cbdb5072f102c0d6b7bc9b6b2f1f787b56ab1bc9be731bb9e98885c17e26a09c2beb90
-
Filesize
95KB
MD57f61eacbbba2ecf6bf4acf498fa52ce1
SHA13174913f971d031929c310b5e51872597d613606
SHA25685de6d0b08b5cc1f2c3225c07338c76e1cab43b4de66619824f7b06cb2284c9e
SHA512a5f6f830c7a5fadc3349b42db0f3da1fddb160d7e488ea175bf9be4732a18e277d2978720c0e294107526561a7011fadab992c555d93e77d4411528e7c4e695a
-
Filesize
155KB
MD535f66ad429cd636bcad858238c596828
SHA1ad4534a266f77a9cdce7b97818531ce20364cb65
SHA25658b772b53bfe898513c0eb264ae4fa47ed3d8f256bc8f70202356d20f9ecb6dc
SHA5121cca8e6c3a21a8b05cc7518bd62c4e3f57937910f2a310e00f13f60f6a94728ef2004a2f4a3d133755139c3a45b252e6db76987b6b78bc8269a21ad5890356ad
-
Filesize
3.3MB
MD5ab01c808bed8164133e5279595437d3d
SHA10f512756a8db22576ec2e20cf0cafec7786fb12b
SHA2569c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA5124043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
682KB
MD5de72697933d7673279fb85fd48d1a4dd
SHA1085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA5120fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c
-
Filesize
63KB
MD507bd9f1e651ad2409fd0b7d706be6071
SHA1dfeb2221527474a681d6d8b16a5c378847c59d33
SHA2565d78cd1365ea9ae4e95872576cfa4055342f1e80b06f3051cf91d564b6cd09f5
SHA512def31d2df95cb7999ce1f55479b2ff7a3cb70e9fc4778fc50803f688448305454fbbf82b5a75032f182dff663a6d91d303ef72e3d2ca9f2a1b032956ec1a0e2a
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
28KB
MD5adc412384b7e1254d11e62e451def8e9
SHA104e6dff4a65234406b9bc9d9f2dcfe8e30481829
SHA25668b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1
SHA512f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07
-
Filesize
1.4MB
MD5926dc90bd9faf4efe1700564aa2a1700
SHA1763e5af4be07444395c2ab11550c70ee59284e6d
SHA25650825ea8b431d86ec228d9fa6b643e2c70044c709f5d9471d779be63ff18bcd0
SHA512a8703ff97243aa3bc877f71c0514b47677b48834a0f2fee54e203c0889a79ce37c648243dbfe2ee9e1573b3ca4d49c334e9bfe62541653125861a5398e2fe556
-
Filesize
18.0MB
MD51cf17408048317fc82265ed6a1c7893d
SHA19bfec40d6eb339c5a6c2ad6e5fa7cebc147654c5
SHA2561352ad9860a42137b096d9675a7b8d578fbc596d965de3cb352619cbe6aaf4e9
SHA51266322d7cb5931017acaa29970da48642d03ce35007f130511b2848b67169c1dd4167f1e5a31e5e1dfe5f7122846482bdb878b5cd695ac58009033fd620813a0f
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\AlternateServices.bin
Filesize8KB
MD52ac5978f31103652f1cf763a56fd5cf5
SHA19c2d85bebc7cda8063d97bc8e4930033cfd21225
SHA256d632a3564f3675845f4cd46b260eed00a6a06830f5a5d978f7a3c4e14aad563e
SHA5120f080a9304a97118006d89ad261af9934333acedd44441ae13aabc1ce346fc440235a76987a9a01b8fc30d4b85abe43fd1c0a2c63e5ce8b7e49d89eb6414dee7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\AlternateServices.bin
Filesize12KB
MD543d46c82d42fcf6829e4d0be09916d98
SHA1fceba5715983316d3763cb31078bfffc04ba7dd2
SHA256ff4e563bbb144a7cce52987556142cef0533484a14d7ffc7b4cfdcabde696907
SHA512b580e08440a0546a5e0bc7a83128d587602dbb61778b32e48ed1573eb0ffd93345c715042a3f987bd50c7f880c7b542b7acda3ed6ebb1b91cc6c26b1a6e6b0b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5c6adf9ba7ad550b57ddceb4bc203e75f
SHA126c7a6e90e0adc31d040129acd87d6703e7e59ad
SHA256fe3185012f7ccbd0d0c29baf91e7942adfe0bf07b56d69a823670f0fcd91da63
SHA512e518038acdc2bb059b13902e8f84b2ad4ae4b43f3ae9c7c34e3d1ddf57c47ca6bbc7e559f1beb894e902fbc784824511279eaeb73c2913beacca6b5662caf0b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5ee29637c1ae6817b1cc8f48360a565e8
SHA10585cd52de48f0311f7ec70eb71b449a80ddddf9
SHA256ae21d2c921ae530cbc00ed50bed13dd0f36a853a8fb432a8765f813677ca3d8b
SHA512c929566c554f6140dca89085707b5072d0c31a94b6202c91016628d133eafe644f5a40977966f54cdfa8088663a0bdc027526eec9de132a700a2a536d40926c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD5d00c48fd76537fb2ed241b03d8422411
SHA17e609b989078dba4f4f029b65045e8e096963f67
SHA25652f7cec21d62caa85ca9c381ff9b7a0496a7c18128aa323a155744da50fdc192
SHA5121f679af0bb5ac78f81cb26047884a139c5385caccaee36348ad41faa83a9ee199e51541d7f32243bc83c3d415d81326fcc9cf8b28afc3471b916659cc0172603
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD569c8590c4d277edf83d4dc8aab5c8aec
SHA1d2c824e2807f2c6e9abe76ff0146d9d7c3918788
SHA2564982c634b98f3d26a44d03ce3081879c3d68cf2ef4d2c8fc2887f54b66bd9a7b
SHA5121e36417da3ab527d6d323ba3812fe8248962e4aba462ded3a5b50e07ce407699d2ecf4a8c4da56a696f40cad46052e5b9c9afd09ec7207600b189815a8b37d7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\pending_pings\43ffadc5-046d-4666-8caf-323431c36e5c
Filesize659B
MD590b5874a9bdaf6cbf3a97b087a81ca94
SHA1bff29e84398ed2566d1f379ab461fad289d06d34
SHA2568f1bd11d0d399c4d6bfb78ee9873b02dbc865c17b4da0a93289ed1cfa2e8e3ea
SHA512bb349171a3d36007f2e1c76a63d0b44ff5abc10a7a768263c35a7d6c664d3932976daaaf20dc48346184df4e5a2254720171b02d05628f6d56c6cc17c0cd4b3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\pending_pings\5c16cdde-566d-4d3c-8945-8c83952bccf1
Filesize982B
MD54cd4cf6d5d56da6f1a5a6a5b1ccfa351
SHA1648d8ec97cfee2db057c893289fa36706c8481b9
SHA256e59ca69ebde007678ef8a1839fe6813050cf91f3717c4cd90b53c4650ff9d4c8
SHA512d547ce9696e02d13a1e3853347ef26376df78ace2410adc43a6ab36897c9188935e2cfb376549732dfd508bee4230937891251803b7a8be43b5ebc08bc2e975a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD59bb8b88c9e4745fa7d7e692f42a14ab6
SHA1b2a9f466575dd2924aa83a00ebb1d41075c87f1c
SHA256835b2d8985e0aef68a1c521464d5c168258548c5c3deb84eccffc95167bc3676
SHA51240a000d5e0bbd846a76898e7f9d5761eef96223f8713d1488a99a36d8c698373d177b5abf9e12065eee56910531588720979fe50e5eb3bf131455ab6b67e8822
-
Filesize
11KB
MD54f1c7d2acfbf5318785d344dbee21fb5
SHA1ae263067ca47c8f1ffbe5b713afa6dbf83791133
SHA256f896620b0ab3f86b7c21803d2ea7090927e571f32cc1f500c28e0bdbd26f8ed1
SHA51273f2da01598613f3761c369da00ed85d65531cfcff49a4e7774a177e7cfa8164458c63cc5b5162481e48712c0b7ff0e18063094ed06213c7e379c46215b037c1
-
Filesize
8KB
MD5bfe6421058a36985bc4a49cec4ced771
SHA148dfdcb09334bab2068658282377b26e1a7d1b84
SHA25671e48c24aceb810127f319eef2eeb0e75365faa914fb72fcc11974470cc1ee2d
SHA51255d39d5fb0215bf2ca37a8309dba5e8fcb09c7ed6992028a626ae92cf5463bdd4a7194ab37475f8b865234f289bc835113830ee508be21acc270b512a96dd87e
-
Filesize
15KB
MD5617fed9c2ac7c93bf9307b8568b178b5
SHA14502d1ac5e6843ec36e5a1ff63bcc95cbea4c39c
SHA2565a438b3c2eec305375c259f8595aa9e50f9869e9085f5ffebe07209086b8c9bc
SHA512b1d267abea8da681ba1cd0db18e9431a5c2bdb3b7f695a540f02ddc0b16acd3be11c7c62a644b41e56b30533caeb70325358d33951550d79f97c61c3cb92be78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.4MB
MD56fa890c22ac9a61c3400f2e770c2d38e
SHA109b5a16b823312ec6253e6abfeb32ccccae8cf53
SHA256c44389a4427351e4492b1080d7a6e21035bb4c9e6d91172c3d2a9b58443f0479
SHA512b3e4c71f8f8175bc5c4718b6b2b94ea2e40a03cdcf5d5a7a53a0c4f39d7942c735efb14c1feca6dda3f5219e5aca7a4f5bfd5d4e5c61732fd914e9addb7106ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.4MB
MD5317a139c3115538d48b81222a6ad9611
SHA12f0c6f35ad35ca2a8ee36a79cdee36c45b64753d
SHA256e168a4ee4639e20342de284e18547a32ba2107eaff1dcc7cd7250c0e236f2bbf
SHA512e0d904dadacd2adb972a6a7dc047f3751cefa2b54ea1832027a01cacb465bed22445f9a1b8399a7e441e25f3cf7ee2164d6884cb42dc9163927f7ab9eff9c50b