Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe
Resource
win11-20240709-en
General
-
Target
0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe
-
Size
1.8MB
-
MD5
c015c231f5d013a7031748f95129a969
-
SHA1
27f74431dbaa7b8bd16a5ddc0b871da65ea62849
-
SHA256
0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4
-
SHA512
baf6f0d3752e49ad769325bde85129d803094ea42e9d9735eafb3f415014e6d2f07a977d8892fef85307bc80e0060f0ef3c364ef3b6d05a0d4324956723a194e
-
SSDEEP
49152:AsoGdXqMpDQe+xIfJJzbTR4O8/t76/rhCDfpIrs:poGtqMpU9KhF6OB/rIDpI
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 84d1226898.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84d1226898.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84d1226898.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 84d1226898.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 92445542c5.exe -
Executes dropped EXE 11 IoCs
pid Process 3000 explorti.exe 5084 92445542c5.exe 4340 bcf4995e7a.exe 3624 84d1226898.exe 2540 axplong.exe 4332 explorti.exe 6108 axplong.exe 2300 explorti.exe 3224 axplong.exe 5240 axplong.exe 5088 explorti.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine 84d1226898.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\92445542c5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\92445542c5.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcf4995e7a.exe = "C:\\Users\\Admin\\1000029002\\bcf4995e7a.exe" explorti.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1580 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe 3000 explorti.exe 4340 bcf4995e7a.exe 3624 84d1226898.exe 2540 axplong.exe 4332 explorti.exe 6108 axplong.exe 3224 axplong.exe 2300 explorti.exe 5088 explorti.exe 5240 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe File created C:\Windows\Tasks\axplong.job 84d1226898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 7124 4340 WerFault.exe 129 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92445542c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcf4995e7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84d1226898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1580 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe 1580 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe 3000 explorti.exe 3000 explorti.exe 1008 msedge.exe 1008 msedge.exe 5108 msedge.exe 5108 msedge.exe 4208 chrome.exe 4208 chrome.exe 3624 84d1226898.exe 3624 84d1226898.exe 2540 axplong.exe 2540 axplong.exe 4332 explorti.exe 4332 explorti.exe 6108 axplong.exe 6108 axplong.exe 3224 axplong.exe 3224 axplong.exe 2300 explorti.exe 2300 explorti.exe 7036 chrome.exe 7036 chrome.exe 5496 msedge.exe 5496 msedge.exe 5496 msedge.exe 5496 msedge.exe 7036 chrome.exe 7036 chrome.exe 5088 explorti.exe 5088 explorti.exe 5240 axplong.exe 5240 axplong.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 4208 chrome.exe 4208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeDebugPrivilege 3340 firefox.exe Token: SeDebugPrivilege 3340 firefox.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe Token: SeShutdownPrivilege 4208 chrome.exe Token: SeCreatePagefilePrivilege 4208 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 3340 firefox.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe 4208 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3340 firefox.exe 4340 bcf4995e7a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3000 1580 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe 87 PID 1580 wrote to memory of 3000 1580 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe 87 PID 1580 wrote to memory of 3000 1580 0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe 87 PID 3000 wrote to memory of 5084 3000 explorti.exe 88 PID 3000 wrote to memory of 5084 3000 explorti.exe 88 PID 3000 wrote to memory of 5084 3000 explorti.exe 88 PID 5084 wrote to memory of 228 5084 92445542c5.exe 89 PID 5084 wrote to memory of 228 5084 92445542c5.exe 89 PID 228 wrote to memory of 4208 228 cmd.exe 92 PID 228 wrote to memory of 4208 228 cmd.exe 92 PID 228 wrote to memory of 5108 228 cmd.exe 93 PID 228 wrote to memory of 5108 228 cmd.exe 93 PID 228 wrote to memory of 2492 228 cmd.exe 94 PID 228 wrote to memory of 2492 228 cmd.exe 94 PID 4208 wrote to memory of 1020 4208 chrome.exe 95 PID 4208 wrote to memory of 1020 4208 chrome.exe 95 PID 5108 wrote to memory of 3324 5108 msedge.exe 96 PID 5108 wrote to memory of 3324 5108 msedge.exe 96 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 2492 wrote to memory of 3340 2492 firefox.exe 97 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 PID 3340 wrote to memory of 3264 3340 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe"C:\Users\Admin\AppData\Local\Temp\0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7C64.tmp\7C65.tmp\7C66.bat C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa574dcc40,0x7ffa574dcc4c,0x7ffa574dcc586⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1912 /prefetch:26⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2176 /prefetch:36⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2392 /prefetch:86⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3176 /prefetch:16⤵PID:7136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3216 /prefetch:16⤵PID:7148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4672,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4692 /prefetch:86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:7036
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa573946f8,0x7ffa57394708,0x7ffa573947186⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:26⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:86⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:16⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:16⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2728 /prefetch:16⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:5496
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"5⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 25753 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b73e80e-aad8-4aad-9892-35d89675b0d2} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" gpu7⤵PID:3264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2400 -prefsLen 26673 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2674e359-01c1-4099-83ca-33b10c3ffe0e} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" socket7⤵PID:4280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3220 -childID 1 -isForBrowser -prefsHandle 2840 -prefMapHandle 3052 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7fc6dc74-3eef-4f11-865e-18bf149629c2} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:5536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3340 -childID 2 -isForBrowser -prefsHandle 3236 -prefMapHandle 3252 -prefsLen 31163 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef26bea0-8760-4577-8de5-39d5daf35898} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:5944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4352 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2812 -prefMapHandle 2788 -prefsLen 31163 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5c2c9f8-0207-472d-a34c-875002af0909} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" utility7⤵
- Checks processor information in registry
PID:5936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5376 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d00a6794-b5e4-4eff-aaea-f7d7c4a9faf6} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:6208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2ba3932-3704-42df-a876-d9a5238f6e7b} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:6240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5772 -childID 5 -isForBrowser -prefsHandle 5852 -prefMapHandle 5848 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4d73a4e-5b59-4059-b0e0-bcf42284f94d} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab7⤵PID:6248
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"3⤵PID:3672
-
-
C:\Users\Admin\1000029002\bcf4995e7a.exe"C:\Users\Admin\1000029002\bcf4995e7a.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 14044⤵
- Program crash
PID:7124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000030001\84d1226898.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\84d1226898.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5524
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4340 -ip 43401⤵PID:7056
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6108
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5240
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5088
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD51d36135b5c0b59b965aa1ff8f8874a4e
SHA1c699ce3e004181308e099dbb93fb3b84999bfc2c
SHA256e26d7dabcf5095750d11407a9341af6c898034b75f9fff158cc4c4757ec9f51a
SHA512d821fffb943189f13117338feb9fb535cf1378566a7f28bd6a5570d33839f91ae04b8eaa0ab7d3cfe35b57a71b5ad2938302e175579b7d38aeec8bdd2fbf44a5
-
Filesize
264B
MD57f771e978a81fbad3223ec872de9df58
SHA1d3460b7673a1e91fee4946cd26605bbf81e7efa7
SHA25676f8b6986193fbca9db9c26fe8812d53151d0488237ae8422dcffcb992181962
SHA5121748af0dcbf2c508782ed0f6086b9dc9f255fb3a983d64b2e667bae3a7f8b8b5e6c58ec9d04946f0507b35d39830ac13436fadc86e85975b58c67beb63438737
-
Filesize
9KB
MD5305d6b310daf8c4cc64603841755b063
SHA1898bc9ccca3e3b45f8ed4221ab5cc90aaa5db05f
SHA256b0dd75352f98e75fb8a3f7586715604a297204bd2e5c717b4b978d2debc53283
SHA512164abd9fc5ec206c278d88346bc0c2dbdb4d2d4b3c9189244b20809c925575c36717caa4aed37a799427c21f0b94ce277dfe6b2a7c6f47d53cd57e38119e6fb4
-
Filesize
9KB
MD5acccf67e5da4042f368ef4ae250fcdce
SHA1f5d22e035f7e8836a0452d36d3331c72c9818a25
SHA2567eaa6ce6023954cfb0b527132d25cd79ea8c4ab6286dfd309409b315674d019c
SHA512fa609692bc0289f4451f0a3b8d90f190996e8e8a7109cced22b1b498294c907be720479753c65e17555d3d6f6d4720719cfa0d6d5caa2027b464a215ffef2d58
-
Filesize
9KB
MD599c83a330d6eaa51b1839d3d4efc3be3
SHA15bc39fcc5cfced93c73d48bba45a133413bb1e00
SHA256c4e36554bae7ef90fda160fd090ecac0d150445ae873a9f6111893d68fa55860
SHA51280f75787a981059feb37ba39cc034c554723c0a1df439eb5cbecaefe5de7b9218e52c30d9bf6b87272a8ea893de161886fd2a84cac8a582c490f08735b1a5502
-
Filesize
9KB
MD525cae31bd8f49551ef6d99280c1ade0d
SHA1b7dba5c6508653b2e4588023ad60e2db591f286f
SHA256ef5283ae864d850af368e4bc69d9109d83b3012a5af3c31ed82fcc0eb67cd41f
SHA5125878bc5e633a6d372b719f8c8cddc97cb9544c444058de163454d0875bffc8436072151c349a9aa343cca86475fc49f4a866084edd4b908ebcbdc027b7755d79
-
Filesize
9KB
MD5918449c5755f5cbe1811902b4879ee01
SHA13644c4326262c26d8da02c5f8d2eda0089a32a03
SHA256896e3a5100a1fb7eb97b151357e1a998ec1cd6cbbb152f497c855f4c5f77b521
SHA5126fdb0e86cb925feb44ed76dad7a6fc55dbc74160889188d3ad91fa329207a4fee4cf3ee22ba621e98735db71f8dc5d8448bdd8db2f3cabc400f767fc65c45a24
-
Filesize
9KB
MD5a0edd035d68f6915fc07af3273f9e7ba
SHA15854c612acdc639dab2d83d6f1c2ce3014721b3e
SHA25637a0bf84a022f04499e162510e35d5e51de0d218b73ac9f0ec6809fd6edc26d3
SHA512618dccf4ae34f5f5dec9a65e5fb3450ee865c0cfc1f5048e80a2ea30f37e3e381f0ff7bcd4130e3d459504897f053836c81b61d5e6edaf6cc17962185149cace
-
Filesize
9KB
MD5823cae64fb20967c21477a8329d6a417
SHA108c90cb068b18b0ea260b3492c733369cefc7958
SHA2565af4f45742d662d92a3560376a055cb3edc57d5bf66404e83490435a062347e4
SHA512eea1d5b891897fd8cdd74f539901d1b1974d1a4341548124b5f1a65c05050e0458d26a839bb6b93b20e8fba935c8853b5568b3ec3f1d5699c4ae8e1d9913d697
-
Filesize
9KB
MD56121ddd93367bf633f6abcd8a46cd4c2
SHA158336f6ec58ddd7e612e2f8ffcb31c290403d17a
SHA25627a81288fdca17ab33bcb529ff39465305daddabda103654e6eae1453b8f4e15
SHA5121bb2fd8ed337711d01bd687210c23fd29424b6e6a0f694fcbe703bddccc7d7279304ea7ab9cec54e3c6d6681f9d3387f9848288c82fe672a70facd1c9c4878db
-
Filesize
9KB
MD58930a6a83b0cae53cde418648b783b31
SHA172f1a8a759e4cfb08c50ffd3ddfaa04b9dd33343
SHA2569190f1e4ca47d71dca28f6a4515c66c93b29e372fe60e70c917e98c2716d4d3c
SHA512c05164e2f313361d77df6402a55338f17c533777534a822ffda9ee9b51a80742723a0325fa46f8076a5f50df056351e9b49b00be515de0f17ca5914f3df5ab03
-
Filesize
92KB
MD56406db559bc97195268d355eaf777691
SHA1bc145ec69e4862d4a5455936138a6b0e0cd15dde
SHA256612921ab6c820ab5f5b5baac4323ba3a7fcd70a641a14924b569aaa10e63eb04
SHA512b5384cb8078b4563da0fc3bfb8b828d58c371026aab29aab525510edc9803585239f420e6e302bf24dfa31af85dff81a64e79ca9de911e344d81f637f9c0f330
-
Filesize
92KB
MD5373736898fff68679a2390b02f237b6b
SHA13a1179bfc31721e772921113d53c763d7079450c
SHA256c76f1d45f2734cca2628cd652f051ab345a5903c76f622c93f0a8c8342780272
SHA512aa981a53a7a4b8995dedba25546726992f17ceb31d4ba514718d77af16c5686e873c5f26c6655c402a1af94c4f6bb7c72627aeb2f54c028c4800f0727586fb05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD51d9fff03271424907dbfaac2bc3559b1
SHA1a076c2d72f7b8a9bd65cba8b7229383df5720994
SHA25606f70d4731372bf32558a9b82dc92b0a2e7e9f1d35680b2b3e47fe816704d07e
SHA512c919fe9bb51026b978506dc04105b3eb428f40f6ca7dee2151c3ecf46dccb92241048437c163c4d92f7590d299fa6e25e25e962ba09bc27e9094d5e841e4daa4
-
Filesize
1KB
MD5903851ba29b42ee1cc30e0b5f33e02be
SHA16a5904c6be8e17d8c641a728896f24ae05e0b421
SHA256bdc2bfe290da37118884fa6f80c4266b2c37de3f62cb143f35941e2d60a6881a
SHA5124a2b778392a867650fda33fa16124ceaff828383e185a80d7f4c7919fab12408169b0ff2fd0774b0cace108b439cb011d861d901c6be4bcaacdf5087db9f3071
-
Filesize
5KB
MD5c7e6ecee0ede3ab7bcd1ebab167bdc04
SHA1e6b1767d30d17518cc085cfdf64576f92efa3495
SHA256a6cbada0fac4e159ba402a184ad8bcaca156e237e74a6b82ef3f07a28dc4aaa6
SHA5129f25d2daec7a95b33c7356284e4319b770c96e70208f00d695f1111b6de96ee0a7ed8b6aacb668571e455a8bc71c9e235f79b2cfefc993f1a8faf79ba9d7f95d
-
Filesize
6KB
MD5e02f421ac40015f0aa8eee763b2cfc5b
SHA155b0d432a0875b8562b4f85da51021cdc2c85e3b
SHA256cbc029061890cd7ad354c096f5bd3c6bbf16526a18c7692b7a56bd1a35d00dd4
SHA512f583aec1d358015d59d69bd813acbf272a69971ff55841969b4680dac682f884aec49b02b4165b0cb01e5ad777cef21844d0dad0afd7460bfb617843e2a724b7
-
Filesize
10KB
MD540e320d4b9d915a034de9ba7c6f68721
SHA1c5beabe974650004e2f18ae1aad3322ec0e0b6bc
SHA256bb7197325145705b983a02a1a624dc3b2546c00540123058a073c7a21fa71742
SHA512c252abb5e48c6042bc081878ddeb16c18b35063806b936a75dc3a77ef483f2f528c7641de989cc5c58f6c501fdef48e4fca9c85bb41101c252c17cdf953ef1b6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zirruo9e.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD594ab9d1aa30d1611f7ddf8b540016c2b
SHA106fea7653b4f916ce85582cc3b0f69c99396929d
SHA25654f77da1168bcaf25bf96ddac1f4f8f3e5c1073dfac5cb8026310d38989bf0dc
SHA512c0d4b72333fdbbff86b71134149f97dc326609479dfdc678d0dd45f130e0c36c66c42e753c6c40897f59776f39b612897b7af33fd8b644936495e400b9b8534f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zirruo9e.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD53f201f62c57de620e65cf7c76014e44a
SHA1442a222a9b13fe51ad56c371172b9e41fba7523e
SHA25667a25aff5210a2d962d66ab392a824c15835e3812903a64bc2ccef1ff6b9d3c6
SHA51224aa813fbe990b853e7d11607bcbca5fedda474d37eaf744e15659eab01fa0da2f44d62cbd9bc759bd3bb3ff962783ac557b0df0bcd5035da5ea90ed090d692d
-
Filesize
1.8MB
MD5c015c231f5d013a7031748f95129a969
SHA127f74431dbaa7b8bd16a5ddc0b871da65ea62849
SHA2560d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4
SHA512baf6f0d3752e49ad769325bde85129d803094ea42e9d9735eafb3f415014e6d2f07a977d8892fef85307bc80e0060f0ef3c364ef3b6d05a0d4324956723a194e
-
Filesize
89KB
MD5bd7c3142fff42f65a90d694673662a57
SHA14355c8585fa4e7f0c0d2fb36eb33d671169866ba
SHA256bd2fbe2d4b67cee1a265bd007f2e284361ab77815f670304d1a643bd9bf12a96
SHA512ebfc23c5d78eaa705976393b641cbe7fd1006f22c31a1aa4e7450e1aed5fe5548fe4f31127be9af3668080c435c2d7e1fcca538a567a9f6eab98d484d2a72f4c
-
Filesize
1.8MB
MD526bcb02dc05d82acf18da769ea313906
SHA1b0b98bafecf15a2042b585f72edd524256e5f6d6
SHA2561693a2e2a9dec635eae38092d75637ea7fe71d380849b6d213adb8fba03735b0
SHA51292ce97d129d5f7b5d5fff72ed43bda08e0141b7a33bb38ac2abf07d013d8ecc264491543c2e6ad14d7e9c5ee7f96bcc20e7ff03baba60b54c3b9a22876cb72b7
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\AlternateServices.bin
Filesize8KB
MD5816096366af8547216d397048d7a94d3
SHA16c77991f9ce049802f75829ba728e644785433e0
SHA2560e3ab0f0fb852913a67d1730f1eb57d433f971ca0c2bee83026b27b00c22577c
SHA5122cf4d70efad93f6b1a7d61e52d1652c5ca2acb44d92754111e0223d2fa881f44a50dc721fa00a1d2fcef16931a4a2983a4011e835b206b0ad79e79cee80fcd3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD521d44a627c3e017fa811a368590dce2d
SHA13f2ccd6d8d53c69d032de5e2a7a104606991a0c7
SHA2563562c54bdaf686b9ea9650708a56024b9bae8224449ef941d934a02fbe5de919
SHA512bd0d7809adb8d7f21af5ac5bdff8fe0cccf409e51a50e287564bf41b78d792f0fb6c24a2004a9de56d868af41a07a9023900c2a21c9489cb20b064da76c8c71b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e7cdd36b16deced11cf6cacdabc10edf
SHA1c0d7ef8bae7c16b6fd041f511c66deb9b3005aef
SHA2564ae9c91a0d5719bfaba6ac6f10160e7e147d6089ae7f5fbf743a822b299db7cd
SHA51262c7cec526105a62ead2003f16993bca7bd33a3c385a27146cb60519ba9867522b5cc61a9f6fc32b2b337cc996fd74a6c63fbd98d6850a87b231158daeb511cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\000b01b7-4e26-483e-a8c5-c9813f481635
Filesize671B
MD5d4265f492c33987dc18dde1827898c8c
SHA1ab0f0a631896d8588affcc4ab2d36b70148e0454
SHA256f75aedce2b92932be380d123b4e906d873d234036d5ab6aa34d0ba9e118286d5
SHA512e87ededdb58639f4220faac94fa4fb76decb5c7eb750b3a167f0f73f013f70610e82a51a1cdb40da545d7a504b1dd29eaf44d2a9ebc647bfd0c9ed3b3abbfa12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\043e3e20-e64e-45a8-a3a3-a202b38e7c9c
Filesize27KB
MD5cda3270fbe5427a05f8a162f22214dc5
SHA1bac40c6365795c78e8133252f53775780937bbbe
SHA25637afdb182227db0c66d1f97c36d48d45bbab3282d7da586632588dfea2ba9d28
SHA51226713d43812517032a28977f2a2c0f8c609def9e3904eb6f1565b8a42e893d63b168b00a4d0a5adf6d46c41a069342d203a7898974177bba15b74353f91f7f10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\b369d34c-c9be-498c-bdfe-5f3784a2395d
Filesize982B
MD5c12f4b570272fd8d21cd1e3285856e42
SHA1fc51fdbd177f91cc6ff956ff455a8347d0247d99
SHA2562f35e177583efb2577b05ebfe65bb328b99fd44a8299264b44c4b96c5e8d0b09
SHA512d66efbe3ff9a0513e48624c28f15b128bcd3e9e501335e29d1e2506c07daff11302e54d9885c469d682ca7f67e2e1b40c433708f927575d5692a86df5d907864
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD58cce3b62f4adde06161b798836440357
SHA19eb1dd06520ac7e2c2ecdef063ee6b93cdc15e83
SHA2564e897e9a95e7943a438e56066c2ae774592a42e52ea692b635360640b542e229
SHA512fa9e8a163e78717a0cf4972a0aa355ca6eb261ffd54d995c4d1a2cf93f030df5aea93c84e568724a8d2572f4f9a554028159f1b97b20ecf22379c637b051c4a8
-
Filesize
12KB
MD56ccb4e0f64916d84f02ca34eca3ee294
SHA1f3ae533cb56ab129dcae2dba1aea3ad92231214c
SHA256748d45ba5c1d3d6c3a9ff7e723eeb5f9999a14e1747a540722902e42cdfda4a6
SHA5121827207b50c98b2c38ed8f2f516b7856964894f2c3b3788ccc27eb660fb32bca0d6cda68317132ea98a38f9c88e041d65112ac22f52819578682446c6e7c359a
-
Filesize
15KB
MD5c46cda3956b67ed25ca5475c4504ed0e
SHA11f817ce77489d1ad8c49f6ccd1ffcd8b4c1b939c
SHA256d0857a4108c65ca6d84c5aeb33c3b4235e8589f7a595b617190b41946355dfc4
SHA512e6bffb0506d6442b3d749cb196f24793423cb021af43c152cccc6b3b082c0fb3bd773634ce071803f1d352480f7054a2390be49883cffd3decf7cc50a9b64964
-
Filesize
8KB
MD5b06193dc99c6c95f4731062357a36966
SHA1e4253147120b60121e326667b30b7a94a5759ecb
SHA256d2a6a6434fcb168142dd1e78b2cf69e3d5e72c0e16135c612ea14107b7c79e1b
SHA512b79f2992c5476badddfdd9075cde3948718d4572d5acdc7972e85887c4d2370e1979fdc4f260d43626a457d8ddc06ac40f8c1d6bdbc7d5ca09530062ac082214
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.4MB
MD53c625444cb691d34bcc3a91174dfb0ad
SHA11237c967e2ff27c035a6af67f69e8f7f84763486
SHA2563051b88fdffc5ae040f6b64c3d96ce173bb1b4b3af6fd24ca3b9d2910aac9000
SHA5122fe2aecd6913de7bd48093baf550063ad744b0e950ccbb10d91222486c8b1cb630bce63e97cd52f0e6352de1313ca3a2b0df49d7e5cc4ae4271921e82dde78f7