Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe
Resource
win11-20240709-en
General
-
Target
9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe
-
Size
1.8MB
-
MD5
33deaa408984ab9e79f4b7864feb75a3
-
SHA1
53f66d532cc556d29ded01b3cdfe3aae77cebf89
-
SHA256
9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc
-
SHA512
786ea3d97cc400e83ac7d067d508b568be042a2c4f6232da18761feff236beea6f3d5cd800ba197030acf79086917e14c63013a1b59660b77c6b096dd4ed6d1e
-
SSDEEP
49152:8shtW+ObQly4ff1kECEiNRhX/PvILmgI5aX1Y5O3CU2O:FtOaiNRhX/CmgI/tJO
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
valenciga
http://45.158.12.58
-
url_path
/e47233787df7c9a6.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebf2bec0bb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebf2bec0bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebf2bec0bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 7fba472eae.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation ebf2bec0bb.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 11 IoCs
pid Process 3904 explorti.exe 3648 7fba472eae.exe 6988 8bb006a9d9.exe 3180 explorti.exe 5512 ebf2bec0bb.exe 2824 axplong.exe 4328 stealc_valenciga.exe 4292 axplong.exe 2352 explorti.exe 2772 explorti.exe 6252 axplong.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine ebf2bec0bb.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7fba472eae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\7fba472eae.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8bb006a9d9.exe = "C:\\Users\\Admin\\1000029002\\8bb006a9d9.exe" explorti.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 5012 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe 3904 explorti.exe 6988 8bb006a9d9.exe 3180 explorti.exe 5512 ebf2bec0bb.exe 2824 axplong.exe 4292 axplong.exe 2352 explorti.exe 2772 explorti.exe 6252 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job ebf2bec0bb.exe File created C:\Windows\Tasks\explorti.job 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 6080 6988 WerFault.exe 131 6256 4328 WerFault.exe 140 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_valenciga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fba472eae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb006a9d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebf2bec0bb.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_valenciga.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_valenciga.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 5012 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe 5012 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe 3904 explorti.exe 3904 explorti.exe 3652 msedge.exe 3652 msedge.exe 4364 msedge.exe 4364 msedge.exe 4256 chrome.exe 4256 chrome.exe 3180 explorti.exe 3180 explorti.exe 5512 ebf2bec0bb.exe 5512 ebf2bec0bb.exe 2824 axplong.exe 2824 axplong.exe 4328 stealc_valenciga.exe 4328 stealc_valenciga.exe 2352 explorti.exe 2352 explorti.exe 4292 axplong.exe 4292 axplong.exe 4284 chrome.exe 4284 chrome.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 4284 chrome.exe 4284 chrome.exe 2772 explorti.exe 2772 explorti.exe 6252 axplong.exe 6252 axplong.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeDebugPrivilege 2984 firefox.exe Token: SeDebugPrivilege 2984 firefox.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 2984 firefox.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2984 firefox.exe 6988 8bb006a9d9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 3904 5012 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe 87 PID 5012 wrote to memory of 3904 5012 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe 87 PID 5012 wrote to memory of 3904 5012 9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe 87 PID 3904 wrote to memory of 3648 3904 explorti.exe 89 PID 3904 wrote to memory of 3648 3904 explorti.exe 89 PID 3904 wrote to memory of 3648 3904 explorti.exe 89 PID 3648 wrote to memory of 2324 3648 7fba472eae.exe 90 PID 3648 wrote to memory of 2324 3648 7fba472eae.exe 90 PID 2324 wrote to memory of 4256 2324 cmd.exe 93 PID 2324 wrote to memory of 4256 2324 cmd.exe 93 PID 2324 wrote to memory of 4364 2324 cmd.exe 94 PID 2324 wrote to memory of 4364 2324 cmd.exe 94 PID 4256 wrote to memory of 3576 4256 chrome.exe 96 PID 4256 wrote to memory of 3576 4256 chrome.exe 96 PID 4364 wrote to memory of 684 4364 msedge.exe 97 PID 4364 wrote to memory of 684 4364 msedge.exe 97 PID 2324 wrote to memory of 832 2324 cmd.exe 95 PID 2324 wrote to memory of 832 2324 cmd.exe 95 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 832 wrote to memory of 2984 832 firefox.exe 98 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 PID 2984 wrote to memory of 4568 2984 firefox.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe"C:\Users\Admin\AppData\Local\Temp\9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CDC0.tmp\CDC1.tmp\CDD1.bat C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffc1be3cc40,0x7ffc1be3cc4c,0x7ffc1be3cc586⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1904 /prefetch:26⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2472 /prefetch:36⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2112,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2588 /prefetch:86⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3132 /prefetch:16⤵PID:6436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3168 /prefetch:16⤵PID:6448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=228,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4612 /prefetch:86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffc1bcf46f8,0x7ffc1bcf4708,0x7ffc1bcf47186⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:26⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:86⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:16⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:16⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:16⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"5⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1912 -parentBuildID 20240401114208 -prefsHandle 1820 -prefMapHandle 1812 -prefsLen 25753 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e372cf7-0761-471f-b232-b6ac17d6c24f} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" gpu7⤵PID:4568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2400 -parentBuildID 20240401114208 -prefsHandle 2368 -prefMapHandle 2364 -prefsLen 26673 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce026020-89e5-4cb6-a640-7f1121fd6b7e} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" socket7⤵PID:2976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2968 -childID 1 -isForBrowser -prefsHandle 2980 -prefMapHandle 3000 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b25c4308-fc78-4812-b0fc-a7df0afda63d} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab7⤵PID:5560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3444 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 3036 -prefsLen 31163 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c18d0e0a-53b8-4967-b6ef-ba16d76da5e8} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab7⤵PID:5860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4624 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4620 -prefMapHandle 4616 -prefsLen 31163 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {673a8734-8113-4214-bb7f-884d3cb33c04} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" utility7⤵
- Checks processor information in registry
PID:5692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 4636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb20d9e8-1c64-45af-a93e-d0ea9d2d355e} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab7⤵PID:5116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5532 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ed9d8fd-3e85-4536-8165-f1d1de4f3851} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab7⤵PID:5256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5680 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55148f8f-bc92-4f2f-ae27-302448147e17} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab7⤵PID:5272
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"3⤵PID:1544
-
-
C:\Users\Admin\1000029002\8bb006a9d9.exe"C:\Users\Admin\1000029002\8bb006a9d9.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 14204⤵
- Program crash
PID:6080
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000030001\ebf2bec0bb.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\ebf2bec0bb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe"C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 12686⤵
- Program crash
PID:6256
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5656
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:6684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6988 -ip 69881⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4328 -ip 43281⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6252
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD572230d8efc579eaab4852e555f410c00
SHA15650597c7f86092b999b284b9364b083f3a140e8
SHA256fec0c11ef40a4bffb95b80f18e445dfaac26d65650e235bd1f181219823d943c
SHA512a198b9a0a26961d96da5e0d4c0a55ea54ec084306a476c93a9663d5d45eb0b46c75cedffe9613cae993782e242fc737cdca150a018876ec9363ac95fbe1f3fd1
-
Filesize
264B
MD529eaec9b2d04f4eae6ff0f6fc9f1e55e
SHA1b37ed5a9beacf0276343bd533bedfebf35c578e3
SHA25634a013ec4a697aec6974c49b8418046825b9b64059278a978cc56c390f0324ca
SHA512e2302d4bb892aea13191ab7055f9a29823ab755296e1af50f8fe833655c4da1e8182b13e779cc191fc9161322a9cc84783aba0cbca7c45bb516a6c26938058da
-
Filesize
3KB
MD5e90271bc03d6a731bfd4722f5d2f97c7
SHA10dfc67efced8b7ee4ce0428b8e4633108a3f50d8
SHA2566764b5e5b3299e0646f68097d2be9b0ce29852026f4561eaad7f2d2275aa0848
SHA512cff4417f7f7ff291825f651adc86d0e8ee2ce90835346621082fcd289783965472dc002083a779140951c50c23fa767c6bc2a1724128a7120bfafaecacf6ba8a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD553bb52226fc190db9d1541be5840778a
SHA1f9e30e4d4c80a1141852cf72c25c61efc2f73ddc
SHA256be8abbb8c53296764b6362b6f1c64352dfef61487dba02a97a50edcb8822d75e
SHA512417e09693b3ce8bbf3fd29f5467e4c9b9c7a14a0cc33cc7edc58357569138664f68a2c4552aaca0dc107e3da952d84e1eaf9d6f299f9bf9eff305de59e370ba0
-
Filesize
9KB
MD54b465b73d3bb394894ce95b76332d119
SHA1aee9339e5fd48460b34f21dc833cde71e7e25b38
SHA2568001b7bbb0caaf4b326f29166db95199e4a69620e3565a69a4623965dc2e1d88
SHA5124108ab9c9ebdb3e29b2029f146a6470c2608fb528f1ff8130e41fd43079b02c61207e27d699a68ab88cae4670705891ed72ea787b6ee1947a7061ccc5ad1c805
-
Filesize
9KB
MD5d64fce7f84ed09f45ae101bd5fe61482
SHA1cfd5acf25aa3e0b0c1f229a68319b9e3e2e2174f
SHA256f1dc6b83784c53b5b31f2ccecf75c43216e8a5e477d1d27efd828c1f9f401650
SHA512899e89ec04285612971660bd3b54074d99acd3d92a5b33821713d91b85679fe5ef3faf505ad7e5c3acf23bedc2950570201fcdd36e604155826db58909b29595
-
Filesize
9KB
MD5e800e8ff6d01a21d2ee0e6b75640603d
SHA11a3e1a7331027b81af87be23860a671b36fa719e
SHA25612eea4c85976338410a10027028e71f99e86843ae5906ea68aba6fbdc1a4983e
SHA512f6284a3520023783d93e36c9a0784ab12737357c4a97facbaf6d096537864d85f1039c5784db69ffcdfe3d15f7648f9713d3b9ab399425cb10aa3775c49af830
-
Filesize
9KB
MD592486defcc9390dd3a2b0cec431c1337
SHA1217141ac88a84c44b0b736b9c3564a8012944e66
SHA25665cc3b866770498d7a0eccacbf17a879dec765c0c5b8794d253e1e8925e83267
SHA5126f6d758117b4665263aaa7793c0e3b50f7cf5e1ab20a0110673742313c8b44f9620e5edfe07585a6cc1e9ffb2d0ce740d54f482162bb4ea63fcdc4a9667b0002
-
Filesize
9KB
MD5acd81bb2b3c6aac0e8e7f9839f16b349
SHA199e081eacdb71e976f930e49b9c2937057eef4b4
SHA256a8b9a970c4d8749855616fe3fa72caae06afe9d4011ed18639c7924d36b922e9
SHA512bcf1ccf307e11e3098b758d9aca940e42a8b15c189b27403bc1b2336a9b5d099e4aa80d8650f243a06dce7d2693a48b8943bb242a37017068918b02fbb5692c5
-
Filesize
9KB
MD56f12b7af55d330958b6a8da02af783cc
SHA1b7bdeac3693b7898c7ded7d6f663d7a9eece45b1
SHA2568cb1139c6129cf92af000599932c28389ba00b80df7c503249c25a6b7ef4ebe3
SHA5129c6d780bdcd543242557c448a4c274f89aa900f9e858e204c188c6b1edc243d2a24e117e9184f5cc9a2485b7324a7ae5245ce7b39601c1cece29835f61975906
-
Filesize
9KB
MD54867c4b841e0b0e50ea3c8d71f1f44cb
SHA1b8ffe676451268738a72445db31bf4f357cf9058
SHA256e5864498b9427ec68668c3bd4a51eca11242e32b7f7350ca46fbd5d2f7aa3e9b
SHA512d3474dd44a001f341651fd9a2eceed2be544d2aa98ab108d66035b37d613e1ea4e830c9c2dac8ab4abe2fbfdbf131f540dae383644c9f6dc334a4950feee523d
-
Filesize
9KB
MD53c21768e43d002f93cd6cb314f7ba48f
SHA1e9f97d2e18ba8291115cea3b9504100a3671bb35
SHA256f9bf93669457e1a03df027a9ce57b930bddd8dab782faf334e5322aeea165b9a
SHA5126eb5f72e338dffaf88c139dbccd2cb4569f1f170a8a8b54d91a6bac9c80dfa869e8f10f1a13e0fd575fe00388dc7fa7d9d6aa8d616a0b93edac5fc06bc63cafb
-
Filesize
9KB
MD5c933a01db23d12b88e2b6c9b870e4aba
SHA15d5465887ea671fa9381baa2d769ed4fc438cad4
SHA2567037b989f14c95a4b217376d4ff82be03a507ef1678bfeee9ab58389531ca333
SHA512471f175bcc2cb3680f162897b9cf317582772514a8f986d5d3c376a553ede725e297d99f42b91407f27604b9e24926d7a8ed8da1908acdccc6dc3017d7dd9899
-
Filesize
92KB
MD52a20b34de23b55958b125f781243c521
SHA18a32768ee4bf8a238c170384075c68a475f73a94
SHA2563d642ad79813182fb97b26e35ddbae7d439238299ca42323e4ab8f0b0a5f11cf
SHA5120b3eb59d52a56c27cad22946dce1265472cb7deecd33ca711989be78dc3e910f29d957d21b2837cf9e5b415687b9578f30a9d5364ee1444cda5c7c874f9a1936
-
Filesize
92KB
MD5ba567896ef4f2dac6550c5cea37c400f
SHA1791a1636f34b92a4ef2df2ed1aa48ca93f9ca97d
SHA256c8a834ba2b13b8ab520d66982d4fa341cffdf5b501d44ffafba6c4f928ed4b7d
SHA512c9ae58a58f5aea99b933f81b00a3eeef89bb40d066a0b9bb613fd42fbfd87e78ad80e55cb314aa358602ac917a6ad03e3d74f9910395250793f73accf338fae2
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
33KB
MD5daa6948a37ac312342600f2b96db15ea
SHA10bfa2e04bf51480baf1fc7e7819f65cd3b0c90ba
SHA256de7cf820e8eb0aa51d82aff3a848fd853dfa878674cc67094aee0ac115c85fee
SHA5125af3ceb0a4c56b767792ad349b83a179191d9fe6dca8e3795cb48edb87ae6a8b89e51a64ebedd68857c674befd71dc1664a2e8380ac21abacc9566329d8c2e14
-
Filesize
38KB
MD5a1cbc8600fb0e0b668df61bb5d1737f9
SHA165aaea9cf40ee7aafcf033f35980aac172b0a267
SHA256b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb
SHA512c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD515fcc5a0cf4457549e108a8f8a64104d
SHA112bbb230e476a8335c76e431d028c3ab66c9dc7f
SHA2561d501bbd2d388fd112ccd7d64513a98a45811cd365f6c0abf2d258c5a41444aa
SHA5123b6e146376aa3145d3e1c2d2827ec502f0038415d2c511f66c97efbeaf6d657947203f88091bf6a87e1a8a38660c989a6b490b9c807b55fcf4f41e0656ed7315
-
Filesize
1KB
MD5d2348677a70629ede0badda6e0d51cd3
SHA1c34b68ec7626ecb64a4afb9a95560999a064f6c5
SHA2569b6bd8198b5d91c3d8e61ce4898b9892fa510ca8dbfb94178fceae2b1376379b
SHA512397593688d5f2210993e49e56e18039079f694b613d7f9d22e3d7a62d657dc2a17f10ff18cb229c83ee241407683f26706e0f052d67a7d4c820cc74d233cbc9f
-
Filesize
6KB
MD517a460d63edcb179242d8d027a726782
SHA1ebe6a3c813e3c52f00ae76023df1f1bdbdc16456
SHA256c3db30e53570ae1f2d05b31bc35240cd0098997c25c687f8a29e0d3111ed9cbd
SHA5128d13997cb86786614a6beb811d7ac5da4b773f6ecf96789a8226e38a86aa9746152866dab0bece2eef4e3a526bf6fa69dad254e1ed786ed12080d718dac5947d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ae0e3822-0128-4266-8463-4d9e0feabbe2.tmp
Filesize5KB
MD51136bafb54037dbb8691be380d3af1c1
SHA19565f5e57527ee2da71d8d9dd54e0feb32821f89
SHA256025f3db297141c7502f82f1ab66e9fd839916278c44e597345122b3dfbb64927
SHA512b62cd8c66f282db3131bd37a8bef95db936005332d6d884297951d646f2d4a652fb3ca4f01f79344393df00a10ddf05fe2eeab8da54f8934cd670a2411bfb891
-
Filesize
10KB
MD513ee2efdd2939408bfbe00a5ee72885a
SHA166453d1b180f24913ccb39d4b966faca828d84dc
SHA256bf49ae998fd39068be2610b6ab22edcd25005bf4621a0612a54a92c7ee50db3a
SHA51231da2dee2c8435c5275aa91f181a6f37b168f1827675b6ede24a9b3f8b41c26a8cf93c9a89e5af3860799e1425d06702c02ee592618a9d2a9a7a253aa9e17663
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD5c4188fe05e53d5577feef8b6bae72a00
SHA198abd71a96169ebbb0311ac7a6e633aaf90200ec
SHA2569db4d6fce72ceede91e9e88445300a9ea0c79d32b78b70c6920b4399dbd598eb
SHA512dcec7e6aa66027d6564b15915e36c6a7a9b855be89fc56a58832501e813032a262f684e4cca27aaea1285967d8d13de33b5a157829951d35da1ee6ad1aed65c9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5c41c1777d629ed0a17e641f379d282ef
SHA11efeb92783dc1a2eaf1ac35aae14c0979dec5bfa
SHA256a68c32854ad84d64191b74c375cb01e5cf2d926664f95115ddf85748b49dd9c5
SHA51252e3b84ee967259f1e2d256300159c051bcebc1710471198fb5b4ef4846a33c4028e13cd80e8b5ee0ff81c026afb158c3198b4121fa5e4484da253cc530268e4
-
Filesize
1.8MB
MD533deaa408984ab9e79f4b7864feb75a3
SHA153f66d532cc556d29ded01b3cdfe3aae77cebf89
SHA2569e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc
SHA512786ea3d97cc400e83ac7d067d508b568be042a2c4f6232da18761feff236beea6f3d5cd800ba197030acf79086917e14c63013a1b59660b77c6b096dd4ed6d1e
-
Filesize
89KB
MD57d94aa499d63578cdb0004ca9d696d9d
SHA1b11b2a6763631d7170ef6b3e69ae196133f78901
SHA25697c5fcf7e29d110aa1c65fec05a466db8d7e40c9aa9e4f362521be1439fab83c
SHA51282157a71f7990294300c6129a395ecfaea7c80abcd02b873e4e44cb0295c9ea547a61c4259d3895f24f57c14a39b8470afb389eaed8895898510908075a3e83a
-
Filesize
1.8MB
MD5644bc5da7c2b3f6c761e6e7e2a8b20d6
SHA17a169bc212a264daf59aac579824cc593c22da53
SHA256e95fb4261f157fd17d5bc6e76da693aa1109de2a29f17522c6adb1f2416f1ee5
SHA51219cb19923a007a21904af3c17390f3a26906d6aae87ec3f3d4bcd4bc60d80355bf67f9d4fb1ab3bd432b9532511073b9e7ba89025836406f9b1431dae1240fa7
-
Filesize
187KB
MD5dc4df67829d076c9c33c0d728a9a6ddb
SHA18362b7c722fcd493a473c0ad12c38c381f0c3e90
SHA256b11d77860541c64edc90ba2b3841ce41913aada626bc56d6c10a9214f3040da8
SHA51203da0637bf30b8d01591629b501b339b77e57b920e0cfd406222b0b28d81399e950da58f0088b7b7cf80cda49084b611056812618a586328232f9697f56e2ea2
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\AlternateServices.bin
Filesize8KB
MD5d47ff3c4e40e2966b4a66bfaee954cca
SHA1c4a9d9bf39ab5557e99058d6a71fa1ae9b680fb9
SHA2569d33df037fc8f480cc105ea6705e9b60ffe325899a3a946454cdb1e33686bed1
SHA51214a7e5428d85961e379d18a1db9308a690c9ef09d77ffa848fc3dd2ec83bac8d689323d75c7b7c51717eea89cdf86b83283865a71845a65d64eaf4144e40cb98
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\AlternateServices.bin
Filesize11KB
MD5b95cdfa422aaa1e0118ff31bf2568538
SHA1019790b4f439645f5b5ea9365c79196dd6902d97
SHA2565df40057cef7ddb204f9a7d79e555f92753f5ea0f5548f8f62324a7c6fc50e5f
SHA5122af290343fd87f78f7aade54de7833df632a584ebaaf7ea1ad6a89c7c19002f840b4cf8dd6290bfef0e4570b2e7ec35e9c062bce138c54bd1e5214159a3b7616
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b01b38ba0f23e78cd0ec0cd7ed4ed840
SHA176d24d18dadc1a7840370793a1e75aea0bc7494f
SHA256562050ee436e0f2a682a1477bea6bbf2f380f9cf26d014a0c01ad247670bce0a
SHA512680314a03ac44f51d0761c1f2a972a32d8c70e2670479a7639ae96b9e41b304d49c22dcf3136fcf6057cc02080b3173afbae44a31da7694ee949debf0d7088ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53dc4df1711aed3a209d287dab6558de2
SHA194418bebf0da80c8b1799b857e14981178243b99
SHA25678864417ab51a2f82150be0f659cbdb81e83eb364c3171faa061411535bd22c6
SHA512527d39cbf4dd1425672bfa52231fc0673114d98a9c8b47408e24e7ce4da7588386a9773f34d4ae3909d835be43c4faaf0270c99de444ca3c64d67cacc317205b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\pending_pings\67ea4e06-6486-44c0-8243-cc8e333f1452
Filesize982B
MD589c2ce108577c948012fd64823f13322
SHA1bf26440160bd742a9f45ec14ed8dd2280c65a810
SHA25620ddc846e1cb3919b0adc8bd29f000425d94deec66181f182bfb57350d222ba6
SHA512d1d89b4f2799a3e148cf9ac3324ae5c74de9a4c1295de8fc4356e94d38b8764b68dd7179f4af8d06478f12f3c4d08729b22aa513ee9a88e8ad1551130a5ba05e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\pending_pings\87c90e1a-69f5-4d73-a10a-0183a00d3273
Filesize27KB
MD5bd567389074f0f64fdb012677ffeae3b
SHA18ad11f8c14776a3c8d910f4d64dbc00fdf8b2d29
SHA256b5e0dcb0d7bae8521f2f502cce0406958f11c41a07888cbd8ac0beb168c51c31
SHA512bbbcb59f7a38455fe4d52121aefda41151ee192784638d7eba85583dc57738ed508e465ed1330d6fff3636202f6efa2c118a4406a00f9e637f010a0033dcbce0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\pending_pings\90ccdb7d-aefc-41a3-9df5-64e0a0469e42
Filesize671B
MD5348e0d7c912545eab5910b256d7c6cfb
SHA1741a4b656a532fc57d26a3a3fcdb98ac872abbc9
SHA256018ae0ef4b274af599767fe2e69deb8257805737565cc24ad40179aabb1cc3c6
SHA512d5f484bff9fa7a23cb8026c4b3508d420286ac4a7e1ab760da43f28eca511cf3ac03b4d1370b830be00bfa654739f1f0b2e16b4793e07cad82729acf5eaac040
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD51cea05af5d4f529dcbab38bc144ec71c
SHA1f9e1f0fc4377ebd6aa5462de9cfe0d92999c36b1
SHA2564c3da5c41cc475f547a55cb256c6c2499809bbef1257d7178c4b282a85765a0d
SHA5128b1977f27c22dadf6de0fb7eaec528c79176e9eca60492a15e718432a0f25d4f2631e4421cf73d1ced04e02b3f4bdd8e19616ddfe13d11ac8c15a12ba41368aa
-
Filesize
15KB
MD5c8a60febac6eca980d2cb19eae4aabf5
SHA14da3cb617ebf88467fb0808c3efbdd8093a1916f
SHA256900c7121560b9abdafe664a30d5815bd55e34db1b98d365c7a9adb926f530700
SHA512231d800343c88c41ccac84ab97ae8f15735353d60e21a9ce51cd531493f54aa09ac49e100de9da902324b65f994b38cd2bd2c507dffbd3825ace8a4ec05a67b9
-
Filesize
11KB
MD506a8ca28b8eacb0c888c17fc8b4c19c3
SHA139aaaa0304fcc0668ddb8ebf59c98760f692e622
SHA2568824e4d689a329b54450c1535fe3ba0d35cf338e455b29d4c151d78dd7657e89
SHA512ecd725d2664560d790175e9f7346e77a7c3f5f0174b668818d5c8311b15e55d52d9927500b2514fd89444d76df1d90f41f23162dec053b8c81541f358df3e091
-
Filesize
8KB
MD5e2d4de6a79b640ad113a48b26bb2c560
SHA18a2d5ef34fd281ff2613a62a3fae0b96faab002f
SHA25610e75f0353f587c492d7efc6f24c7d1a5e5881e81eedb73309190b2a2180fcba
SHA512f262967d728cf8a7ea1a0d8a37ae3868403448a7035fbc4eae23cf9dd169efaa6586ccc98b0e933c9e6c4538201ceeee9328ffb71278bc1ad64430b2eaa1b0ee