Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-07-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe
Resource
win11-20240730-en
General
-
Target
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe
-
Size
1.8MB
-
MD5
4d2cdbb21c65dd9be3ae81f1cb95ab2c
-
SHA1
e674a6331275bd928595ea5617795a50ff19bd4e
-
SHA256
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75
-
SHA512
7bdb160f7a6d64ee9e2dcfc4d93e80b1e578bead95ce1509b65ab5570d0fd0f6f62f0ce002e9bcf53e744a7154f3994d19f002db881256f9955491abffea2de1
-
SSDEEP
49152:/R82W8FltoEn6RA7dV45vZ/kxrFlD9HqQ:/8+z6RA7/o/kPTq
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
stealc
QLL
http://85.28.47.70
-
url_path
/744f169d372be841.php
Extracted
redline
25072023
185.215.113.67:40960
Extracted
redline
Logs
185.215.113.9:9137
Extracted
stealc
valenciga
http://91.225.219.163
-
url_path
/7e93b9fd3ae92094.php
Extracted
redline
30072024
185.215.113.67:40960
Extracted
redline
exodusmarket.io
91.92.240.111:1334
Extracted
quasar
1.4.1
Office04
51.222.21.20:4782
374acc94-a8cd-45c6-bc31-752e0f83541d
-
encryption_key
5B2A5F50FABB3F6748116D7077D95758D0DFFC77
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\adada.exe family_quasar behavioral2/memory/5544-5573-0x0000000000320000-0x0000000000644000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/6380-603-0x0000000000400000-0x0000000000452000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe family_redline behavioral2/memory/6808-723-0x0000000000220000-0x0000000000272000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe family_redline behavioral2/memory/5644-2431-0x0000000000110000-0x0000000000162000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe family_redline behavioral2/memory/6600-2602-0x0000000000090000-0x00000000000E2000-memory.dmp family_redline behavioral2/memory/5932-2724-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5932-2724-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
Blsvr.exedescription pid process target process PID 1180 created 3188 1180 Blsvr.exe Explorer.EXE PID 1180 created 3188 1180 Blsvr.exe Explorer.EXE PID 1180 created 3188 1180 Blsvr.exe Explorer.EXE -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
explorti.exeaxplong.exeaxplong.exeaxplong.exeexplorti.exe028058e168.exeexplorti.exeexplorti.exe1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 028058e168.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorti.exe028058e168.exeaxplong.exeexplorti.exe1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exeexplorti.exeaxplong.exeaxplong.exeexplorti.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 028058e168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 028058e168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Drops startup file 2 IoCs
Processes:
2020.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe -
Executes dropped EXE 35 IoCs
Processes:
explorti.exeexplorti.exe57b802a7d7.exe5337807864.exe028058e168.exeaxplong.exeGOLD.exe4434.execrypteda.exen7Gs36sXpC.exePwvRO6hIoT.exe2.exe25072023.exepered.exepered.exeaxplong.exeexplorti.exe2020.exe2020.exeBlsvr.exebuildred.exeAuthenticator.exestealc_valenciga.exe30072024.exejsawdtyjde.execlamer.exethkdh.exedeepweb.exepureee.exeadada.exedropperrr.exesvchost.exeexplorti.exeummo.exeaxplong.exepid process 3924 explorti.exe 3760 explorti.exe 2420 57b802a7d7.exe 5620 5337807864.exe 5808 028058e168.exe 5780 axplong.exe 6188 GOLD.exe 6308 4434.exe 6860 crypteda.exe 6268 n7Gs36sXpC.exe 6352 PwvRO6hIoT.exe 6520 2.exe 6808 25072023.exe 4808 pered.exe 2752 pered.exe 6784 axplong.exe 6772 explorti.exe 6244 2020.exe 6344 2020.exe 1180 Blsvr.exe 5644 buildred.exe 1216 Authenticator.exe 920 stealc_valenciga.exe 6600 30072024.exe 7588 jsawdtyjde.exe 7744 clamer.exe 7808 thkdh.exe 7904 deepweb.exe 3200 pureee.exe 5544 adada.exe 4492 dropperrr.exe 1248 svchost.exe 7928 explorti.exe 5000 ummo.exe 8160 axplong.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exeexplorti.exeaxplong.exeexplorti.exeaxplong.exeexplorti.exe028058e168.exeaxplong.exeexplorti.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine 028058e168.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Wine explorti.exe -
Loads dropped DLL 42 IoCs
Processes:
RegAsm.exepered.exe2020.exestealc_valenciga.exepid process 6716 RegAsm.exe 6716 RegAsm.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 2752 pered.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 6344 2020.exe 920 stealc_valenciga.exe 920 stealc_valenciga.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorti.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Microsoft\Windows\CurrentVersion\Run\57b802a7d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\57b802a7d7.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000\Software\Microsoft\Windows\CurrentVersion\Run\5337807864.exe = "C:\\Users\\Admin\\1000029002\\5337807864.exe" explorti.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 ipinfo.io 90 ipinfo.io -
Power Settings 1 TTPs 5 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.execmd.exepowercfg.exepid process 1664 powercfg.exe 4088 powercfg.exe 4084 powercfg.exe 5380 cmd.exe 6616 powercfg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exeexplorti.exeexplorti.exe5337807864.exe028058e168.exeaxplong.exepered.exeaxplong.exeexplorti.exeexplorti.exeaxplong.exepid process 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe 3924 explorti.exe 3760 explorti.exe 5620 5337807864.exe 5808 028058e168.exe 5780 axplong.exe 2752 pered.exe 6784 axplong.exe 6772 explorti.exe 7928 explorti.exe 8160 axplong.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
GOLD.exe4434.execrypteda.exeBlsvr.exedeepweb.exepureee.exedescription pid process target process PID 6188 set thread context of 6380 6188 GOLD.exe RegAsm.exe PID 6308 set thread context of 6716 6308 4434.exe RegAsm.exe PID 6860 set thread context of 7128 6860 crypteda.exe RegAsm.exe PID 1180 set thread context of 3392 1180 Blsvr.exe conhost.exe PID 7904 set thread context of 5932 7904 deepweb.exe RegAsm.exe PID 3200 set thread context of 2388 3200 pureee.exe AddInProcess.exe -
Drops file in Windows directory 4 IoCs
Processes:
028058e168.exethkdh.exe1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exechrome.exedescription ioc process File created C:\Windows\Tasks\axplong.job 028058e168.exe File created C:\Windows\Tasks\Test Task17.job thkdh.exe File created C:\Windows\Tasks\explorti.job 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 5300 sc.exe 5328 sc.exe 3172 sc.exe 5688 sc.exe 6488 sc.exe -
Detects Pyinstaller 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5776 5620 WerFault.exe 5337807864.exe 6704 6520 WerFault.exe 2.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2.exeRegAsm.exen7Gs36sXpC.exePwvRO6hIoT.exe30072024.exe1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exeexplorti.exeaxplong.exeGOLD.exeRegAsm.exethkdh.exedropperrr.exeummo.exedeepweb.exe5337807864.exe028058e168.exe4434.exeRegAsm.exestealc_valenciga.exe57b802a7d7.exeRegAsm.execrypteda.exe25072023.exebuildred.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n7Gs36sXpC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PwvRO6hIoT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30072024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thkdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dropperrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ummo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deepweb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5337807864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028058e168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4434.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_valenciga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57b802a7d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25072023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buildred.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exeRegAsm.exestealc_valenciga.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_valenciga.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_valenciga.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3070649267-739947649-3250922198-1000_Classes\Local Settings firefox.exe -
Processes:
RegAsm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 6876 schtasks.exe 5208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exeexplorti.exeexplorti.exemsedge.exemsedge.exechrome.exe028058e168.exemsedge.exeaxplong.exeidentity_helper.exeRegAsm.exeRegAsm.exepid process 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe 3924 explorti.exe 3924 explorti.exe 3760 explorti.exe 3760 explorti.exe 3548 msedge.exe 3548 msedge.exe 2188 msedge.exe 2188 msedge.exe 4248 chrome.exe 4248 chrome.exe 5808 028058e168.exe 5808 028058e168.exe 5472 msedge.exe 5472 msedge.exe 5780 axplong.exe 5780 axplong.exe 5472 identity_helper.exe 5472 identity_helper.exe 6716 RegAsm.exe 6716 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe 6380 RegAsm.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exechrome.exepid process 2188 msedge.exe 2188 msedge.exe 4248 chrome.exe 4248 chrome.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exefirefox.exen7Gs36sXpC.exePwvRO6hIoT.exeRegAsm.exe2020.exebuildred.execonhost.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeDebugPrivilege 3108 firefox.exe Token: SeDebugPrivilege 3108 firefox.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeDebugPrivilege 6268 n7Gs36sXpC.exe Token: SeBackupPrivilege 6268 n7Gs36sXpC.exe Token: SeSecurityPrivilege 6268 n7Gs36sXpC.exe Token: SeSecurityPrivilege 6268 n7Gs36sXpC.exe Token: SeSecurityPrivilege 6268 n7Gs36sXpC.exe Token: SeSecurityPrivilege 6268 n7Gs36sXpC.exe Token: SeDebugPrivilege 6352 PwvRO6hIoT.exe Token: SeBackupPrivilege 6352 PwvRO6hIoT.exe Token: SeSecurityPrivilege 6352 PwvRO6hIoT.exe Token: SeSecurityPrivilege 6352 PwvRO6hIoT.exe Token: SeSecurityPrivilege 6352 PwvRO6hIoT.exe Token: SeSecurityPrivilege 6352 PwvRO6hIoT.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeDebugPrivilege 6380 RegAsm.exe Token: SeDebugPrivilege 6344 2020.exe Token: SeDebugPrivilege 5644 buildred.exe Token: SeLockMemoryPrivilege 3392 conhost.exe Token: SeLockMemoryPrivilege 3392 conhost.exe Token: SeShutdownPrivilege 6616 powercfg.exe Token: SeCreatePagefilePrivilege 6616 powercfg.exe Token: SeShutdownPrivilege 1664 powercfg.exe Token: SeCreatePagefilePrivilege 1664 powercfg.exe Token: SeShutdownPrivilege 4088 powercfg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exemsedge.exechrome.exefirefox.exepid process 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe 3108 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exechrome.execonhost.exepid process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe 3392 conhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
firefox.exe5337807864.exepid process 3108 firefox.exe 5620 5337807864.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exeexplorti.exe57b802a7d7.execmd.exechrome.exemsedge.exefirefox.exefirefox.exedescription pid process target process PID 1352 wrote to memory of 3924 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe explorti.exe PID 1352 wrote to memory of 3924 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe explorti.exe PID 1352 wrote to memory of 3924 1352 1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe explorti.exe PID 3924 wrote to memory of 2420 3924 explorti.exe 57b802a7d7.exe PID 3924 wrote to memory of 2420 3924 explorti.exe 57b802a7d7.exe PID 3924 wrote to memory of 2420 3924 explorti.exe 57b802a7d7.exe PID 2420 wrote to memory of 2148 2420 57b802a7d7.exe cmd.exe PID 2420 wrote to memory of 2148 2420 57b802a7d7.exe cmd.exe PID 2148 wrote to memory of 4248 2148 cmd.exe chrome.exe PID 2148 wrote to memory of 4248 2148 cmd.exe chrome.exe PID 2148 wrote to memory of 2188 2148 cmd.exe msedge.exe PID 2148 wrote to memory of 2188 2148 cmd.exe msedge.exe PID 2148 wrote to memory of 1168 2148 cmd.exe firefox.exe PID 2148 wrote to memory of 1168 2148 cmd.exe firefox.exe PID 4248 wrote to memory of 564 4248 chrome.exe chrome.exe PID 4248 wrote to memory of 564 4248 chrome.exe chrome.exe PID 2188 wrote to memory of 4048 2188 msedge.exe msedge.exe PID 2188 wrote to memory of 4048 2188 msedge.exe msedge.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 1168 wrote to memory of 3108 1168 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe PID 3108 wrote to memory of 3324 3108 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe"C:\Users\Admin\AppData\Local\Temp\1cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\1000020001\57b802a7d7.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\57b802a7d7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\96E1.tmp\96E2.tmp\96E3.bat C:\Users\Admin\AppData\Local\Temp\1000020001\57b802a7d7.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"6⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa0937cc40,0x7ffa0937cc4c,0x7ffa0937cc587⤵PID:564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,14670228167070528150,14342933958015684702,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1828 /prefetch:27⤵PID:3148
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,14670228167070528150,14342933958015684702,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2124 /prefetch:37⤵PID:2388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,14670228167070528150,14342933958015684702,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2216 /prefetch:87⤵PID:1128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,14670228167070528150,14342933958015684702,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3088 /prefetch:17⤵PID:3392
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,14670228167070528150,14342933958015684702,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3112 /prefetch:17⤵PID:4292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffa09233cb8,0x7ffa09233cc8,0x7ffa09233cd87⤵PID:4048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2036 /prefetch:27⤵PID:4504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:87⤵PID:1120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:17⤵PID:4328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:17⤵PID:4276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:17⤵PID:4536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:5472 -
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:5472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:17⤵PID:6424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:17⤵PID:6432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:17⤵PID:6940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,226120936506112307,10318380157307821196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:17⤵PID:6948
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"6⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1868 -prefMapHandle 1856 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf7d0cbe-6632-4b6f-a403-b712220ced9b} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" gpu8⤵PID:3324
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c508cdfc-2b7c-4165-aa31-e7b79549574e} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" socket8⤵PID:1068
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3348 -childID 1 -isForBrowser -prefsHandle 3340 -prefMapHandle 3336 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f2db304-261f-4eb1-b0fd-dd614e2ed5e8} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" tab8⤵PID:2396
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2936 -childID 2 -isForBrowser -prefsHandle 2940 -prefMapHandle 3164 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8caedd09-b2d3-4524-bc04-a7df21f797b4} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" tab8⤵PID:5124
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4904 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4772 -prefMapHandle 4832 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d4f049b-3459-4410-91f0-99c1acd1fe8c} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" utility8⤵
- Checks processor information in registry
PID:5944 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 3 -isForBrowser -prefsHandle 5536 -prefMapHandle 5532 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {718b09df-9320-4917-aa07-f313ace01b31} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" tab8⤵PID:5816
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57894283-8465-449e-88d0-1f7b5478a965} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" tab8⤵PID:5804
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5836 -childID 5 -isForBrowser -prefsHandle 5844 -prefMapHandle 5852 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc617d5d-b45a-4244-ba37-363f2d64cb1f} 3108 "\\.\pipe\gecko-crash-server-pipe.3108" tab8⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"4⤵PID:4128
-
C:\Users\Admin\1000029002\5337807864.exe"C:\Users\Admin\1000029002\5337807864.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 14645⤵
- Program crash
PID:5776 -
C:\Users\Admin\AppData\Local\Temp\1000030001\028058e168.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\028058e168.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5808 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5780 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:6372
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6380 -
C:\Users\Admin\AppData\Local\Temp\1000003001\4434.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\4434.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:6708
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6716 -
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:7128 -
C:\Users\Admin\AppData\Roaming\n7Gs36sXpC.exe"C:\Users\Admin\AppData\Roaming\n7Gs36sXpC.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6268 -
C:\Users\Admin\AppData\Roaming\PwvRO6hIoT.exe"C:\Users\Admin\AppData\Roaming\PwvRO6hIoT.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6352 -
C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:6520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6520 -s 3887⤵
- Program crash
PID:6704 -
C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\25072023.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6808 -
C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"6⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\pered.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"6⤵
- Executes dropped EXE
PID:6244 -
C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\2020.exe"7⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:6648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_MEI62442\Blsvr.exe8⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\_MEI62442\Blsvr.exeC:\Users\Admin\AppData\Local\Temp\_MEI62442\Blsvr.exe9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\buildred.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5644 -
C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\Authenticator.exe"6⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe"C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:920 -
C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6600 -
C:\Users\Admin\AppData\Local\Temp\1000057001\jsawdtyjde.exe"C:\Users\Admin\AppData\Local\Temp\1000057001\jsawdtyjde.exe"6⤵
- Executes dropped EXE
PID:7588 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "7⤵PID:7692
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -priverdD8⤵
- Executes dropped EXE
PID:7744 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7808 -
C:\Users\Admin\AppData\Local\Temp\1000058001\deepweb.exe"C:\Users\Admin\AppData\Local\Temp\1000058001\deepweb.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5932 -
C:\Users\Admin\AppData\Local\Temp\pureee.exe"C:\Users\Admin\AppData\Local\Temp\pureee.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3200 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=509⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\adada.exe"C:\Users\Admin\AppData\Local\Temp\adada.exe"8⤵
- Executes dropped EXE
PID:5544 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:6876 -
C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe"C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe"9⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\dropperrr.exe"C:\Users\Admin\AppData\Local\Temp\dropperrr.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4676
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3172 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5688 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:6488 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5300 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5328 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:5380 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6616 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
PID:4084 -
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5620 -ip 56201⤵PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 6520 -ip 65201⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6784
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6772
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7928
-
C:\ProgramData\eeia\ummo.exeC:\ProgramData\eeia\ummo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8160
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD58d135dab7e05dde0d7ca19c577e5f231
SHA1f3613b9a449cea22425370120a27244797e5de38
SHA25622b3412d56b0f2e3ea24134b0219e928ceb78ae9bdd748c5b2cf66f0b267b4c7
SHA512921e83cde2ce825e94afee543d488ca11a5821217086286d55f707cc34d6e8018b80bf34f6b4750851c0f5b193aeb758a387ff2c5b1c34fcdddd4c3c17f7ae11
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.5MB
MD5e70b307e33e856cc9cb70a59a32102da
SHA124b6d3e99b0e5ee94b7b591c40f7ac2b0ba6f555
SHA2568d7e591c16734d05b2b7d4b074a16ce05dc89d904d63e6de9add91aaeef4cccd
SHA5120c59c31f54214c1875a9314f689346c4755371bfbbfd245f3c90a00cd32b3ff8a378fdcd1b4fd597a956b39d310e3b31993103990166013ff5c61c15e63aa50b
-
Filesize
160KB
MD5aeb2fe9a98daa6801ed2d537c4b13711
SHA130eb8edac31db3e589c102e3a61df69de0ae9ce2
SHA256d1c8d16cf15836293c12c8fb76829d10b1d7bc9aeafa1d94052ac79e70635089
SHA512cd54395d7fdb70009cdf0c6f488f1a6f73cfc56d4ad2a8f099291a11f715e1243e1d36af2de16bde98059bcf4876bd85a77338e941170d00e9a6d50eb400bb33
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5b86416f6c9fbc16f3f1edef6838397c1
SHA138d223b0eca237c30f34456e793fa94a50295bbf
SHA256aa7a039267b9b501f3b619c296cf82509f8400a5b138582c882dd70c61e08dcc
SHA51255d590bab68ea7e0d45c24ae1b5483157d1b9172e7ded10341855b8b142d74f217a62fbe061d188ffb4d0019569a5ffbe9d5540ce6759bf51ee07b895e4d6bcb
-
Filesize
8KB
MD509f54a764dd70443f3e86937a4c02cbd
SHA1a5f06a431cde1b0cdbc22aed9cb927e48d769e3d
SHA25610c9209bc02ab6ed4014c7251479eb0edbf3be98518104ef2975617cc4b970cd
SHA51281342ecc27cf5727829b229e9c2dca212173a5b93dc869b4e2586980271ba970f8a6dedbfb3e8d9736681093380f1f72a776ac96b209bd2bb883dc2c29dd4f56
-
Filesize
100KB
MD5c3b33657e237e444bba3afe91607aa7c
SHA1f440785e38c50885d5b0aec2bff13a0c73737525
SHA2564483d01c9119788063f2c7257f9b623f76e84bdb2c91dfd79257b52f7c1edd7e
SHA5128412f069a5a5e04bf64cfd0e06598c8f5414856ac6d93e9e57a9c0bf5d616e2a1db4e6d46423d6a7df7da1c02c0385a3d03b0d13b053c87c117b9f937d32afb7
-
Filesize
152B
MD51e055230e18b5c829279f7bc999b631d
SHA1025d3d0c87346b7822c481517e833edea2120a40
SHA256fe144bb89636e3fc5c3cc8619995d065f032f04faca4c87503facb615fff777f
SHA512446a328effa484804f758f7279c693b278383fa29489a81fd4ddf581af10e634331ffd5b22e34688d3bc18172fede091966c69dfbd644a5f05dfdacc0777b2ea
-
Filesize
152B
MD5f21010c94e1009f08062dd9e5a111f3f
SHA1a02eb37688abf5ccacdd4eba9c3d274ab2a44abf
SHA256f7f88cda54d24605bbfb55c55e0d02e9fc73271b715b71fb51394095421f82a2
SHA5125d8cc69ae7bb6373194ce9bf69e30459516e7105da72df41715fd33c3282c7d16b06c5c23137d65596b60e524a688d69814249e126d270e187b58f36505f7aa8
-
Filesize
33KB
MD560b8b39a48e099a79b96aa1cc1e0cfc4
SHA1fdf8cae154235a990f757624591ec05b3891ac26
SHA256cb5000e7cd62ab7f1fe45f8eb4ce9c4187f7b211436fa7dfb3aa2fef44400854
SHA5120976939732ffc39a891c13248508fb2473c402a0f83cd1abde02db00c71404ae442537f71b596e6ac64e91f16a9f15d49f3af583d60f87812dd0916468534b58
-
Filesize
38KB
MD58ad98b9733d7cb5dba046cb0622b8623
SHA1ac19b48fcd3bd8d632b9c8b654fe6349d2eba513
SHA256d1a0b50df2150a0ac812bbdbb3a61f4f85dc9c226ec918464bf6d51e4a6ccc2d
SHA51265f7befc24a499d72b07ceef592e49ba3c7b8a55a5c4b651e7fdaad61418bd8167b1950faef7c275bea997dde94b25461f1fd5000985d7a19f38cc75907a37e8
-
Filesize
116KB
MD53c810e636a74ed31b116fe619d8045c5
SHA105803c1aabd43d0a8c90e801b0dd033c96848a56
SHA256ce863227d9851024741f8b482296c7a9e0f3ba7e141db9c829b59ef3560ae565
SHA512372dcbf31980d81b7a24583d3522eb102a4f1f356f7acc5698e6c5e06a65b6bc6f16084d0c2c8e0f444664d569e8fc4e99d8b7af7a0b57ab0d66b31b29c330fa
-
Filesize
5KB
MD5803a9633cac903c763d5acd227325732
SHA1ff86e663665526b1d3c280719d4da573e31d8717
SHA2568a31f59b03c8ad0d2c1614aa11f06b804c374bfcf920626a1b5702eef147d3af
SHA512a595d1c5edf624181e8a34f53330ee1c64edf92c4cf93cafc1b9700bee0563e2e0505660b78791ba2e762997ff5226f6f563a019bf14bf4cbb41a10e93536c68
-
Filesize
6KB
MD509f18c0f8f5b3611e056fec87bf7c5ca
SHA17cef734207e0ecc92f261e30714e45fdb663d5b4
SHA256dfc608b072e80ed9ec328d30357487887c7ca5d6bf81e58425a1d1b2cb042d1b
SHA51284dc0c8036ba7288d4d135569522eb5b3f0a3144a4233daf24275887967cb28f64ac366708fabf69195d1db1e5e4a76ce42436b603f5e531983bd496370b43f2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a77f6b799f50b12942a6d021fb05c1c2
SHA1ebc91ee07bc896da18681321d4fd7e01d0aa5472
SHA25664acad6963d72ca7b13361bc82a23d71fc32f61dfa5938d509f184fd3b053d55
SHA512aaf50179b90585ae1e06876d9924711e848dedfd67c6396d6f83d18f7280b475a43bb79d040497841666af4c44b2fa3c6dc181fefb461d4b056ae25eaee1b58c
-
Filesize
10KB
MD53fee5c804c6963b6b701a60fe2d7e563
SHA1d0390f3b8469e5cdde155c87785d91cc4748b984
SHA2562575176d2fa176b2ec09f3f3917741de07b7a8c9be535570f5f0e07f957cc1b9
SHA51201b4495e85f4023afe3e9d62927847e9efd9d31ca35990685a3d005dc8f18946b3736764cd005f99002e077bb7065921b484d5a5ca9b5f9dd9290791e6cdbae6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0uwbru0h.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5f5f2b34335df8b7633efa2ba56e7b1a5
SHA153c982c2e32cd286fdbd1c5844c0356db6c947f1
SHA25619b937a97fb1f150a5b60e67750d10102d7b354991c50a1d22d99037086383c9
SHA512e4a025b1ff34312a1da3341bbc98fdd96bc05b27c6959cd5cac15de17369b0191748515b600177542c74b44862918986235ad1b51e42f11476e220d3a250323b
-
Filesize
1.8MB
MD54d2cdbb21c65dd9be3ae81f1cb95ab2c
SHA1e674a6331275bd928595ea5617795a50ff19bd4e
SHA2561cdc8fa106c894862958257680456c387e04d3cff191e13b19feb02d34f61d75
SHA5127bdb160f7a6d64ee9e2dcfc4d93e80b1e578bead95ce1509b65ab5570d0fd0f6f62f0ce002e9bcf53e744a7154f3994d19f002db881256f9955491abffea2de1
-
Filesize
529KB
MD5d3e3cfe96ef97f2f14c7f7245d8e2cae
SHA136a7efd386eb6e4eea7395cdeb21e4653050ec0c
SHA256519ee8e7e8891d779ac3238b9cb815fa2188c89ec58ccf96d8c5f14d53d2494b
SHA512ee87bcf065f44ad081e0fb2ed5201fefe1f5934c4bbfc1e755214b300aa87e90158df012eec33562dc514111c553887ec9fd7420bfcf7069074a71c9fb6c0620
-
Filesize
413KB
MD5607c413d4698582cc147d0f0d8ce5ef1
SHA1c422ff50804e4d4e55d372b266b2b9aa02d3cfdd
SHA25646a8a9d9c639503a3c8c9654c18917a9cedbed9c93babd14ef14c1e25282c0d5
SHA512d139f1b76b2fbc68447b03a5ca21065c21786245c8f94137c039d48c74996c10c46ca0bdd7a65cd9ccdc265b5c4ca952be9c2876ced2928c65924ef709678876
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
184KB
MD59dc823e9664351213ce73a32d6851cd5
SHA1b0314f6b9f5d513317cba84f86ae86e912c930ac
SHA2565536fb1508ff354c9cde0cb7082d1c9de9fd9c4eee515a3a7e352a0d0e63f32c
SHA5125d8b64d1199845cd11911f77072a698c6a21bdbd9131449b495536f442dcd44b8db791d554a29784e08578014b6e654a4ffc50ada6ac92e17cec248d86484076
-
Filesize
304KB
MD5a9a37926c6d3ab63e00b12760fae1e73
SHA1944d6044e111bbad742d06852c3ed2945dc9e051
SHA25627955c80c620c31df686ccd2a92bce1d07e97c16fda6bd141812e9b0bdd7b06b
SHA512575485d1c53b1bf145c7385940423b16089cf9ab75404e2e9c7af42b594480470f0e28dadcddbd66e4cd469e45326a6eb4eb2362ccc37edb2a956d224e04cf97
-
Filesize
10.9MB
MD5faf1270013c6935ae2edaf8e2c2b2c08
SHA1d9a44759cd449608589b8f127619d422ccb40afa
SHA2561011889e66c56fd137bf85b832c4afc1fd054222b2fcbaae6608836d27e8f840
SHA5124a9ca18f796d4876effc5692cfeb7ce6d1cffdd2541b68753f416d2b0a7eff87588bc05793145a2882fc62a48512a862fa42826761022fed1696c20864c89098
-
Filesize
12.3MB
MD595606667ac40795394f910864b1f8cc4
SHA1e7de36b5e85369d55a948bedb2391f8fae2da9cf
SHA2566f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617
SHA512fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142
-
Filesize
89KB
MD5f19f62959c79af73e6353063cfab9482
SHA18f62871b4c9a2ab35033561e4dc0d478e629391a
SHA256bafb29d6c0e54ea3dc758787b59dd494d24bc0d96806c8569fb2d026e2c50c65
SHA51246cb00fbf95292c7ed2c3603a9be660b1fb35de1f6f8bf34b6e2131ec8c140e6b5df5e22a582a35e7cbe71c0aedaa1b3d7e532d3bf82f7148e25a8f8d22a28ed
-
Filesize
304KB
MD54e0235942a9cde99ee2ee0ee1a736e4f
SHA1d084d94df2502e68ee0443b335dd621cd45e2790
SHA256a0d7bc2ccf07af7960c580fd43928b5fb02b901f9962eafb10f607e395759306
SHA512cfc4b7d58f662ee0789349b38c1dec0c4e6dc1d2e660f5d92f8566d49c4850b2bf1d70e43edf84db7b21cb8e316e8bcc3e20b797e32d9668c69a029b15804e3f
-
Filesize
1.8MB
MD5248d72640b5697bedb167b6922f7d9ec
SHA1232be32e0792a7308654b29f2001b4ece7c2dcbc
SHA2566ea68397c9ada660d60cd92137460f9ec823d57374a5ea490b834362d1641227
SHA512002d4f34ac151a89a9e778ca2f80d69572af44ff8c936ca8c2b383706d07598729b1908ed5f49921dd9fca9c4f920d5c2660cb8da2ad0514097dc7ad6291d571
-
Filesize
11.0MB
MD5dae181fa127103fdc4ee4bf67117ecfb
SHA102ce95a71cadd1fd45351690dc5e852bec553f85
SHA256f18afd984df441d642187620e435e8b227c0e31d407f82a67c6c8b36f94bd980
SHA512d2abe0aec817cede08c406b65b3d6f2c6930599ead28ea828c29d246e971165e3af655a10724ca3c537e70fe5c248cdc01567ed5a0922b183a9531b126368e3f
-
Filesize
187KB
MD53c18dac89d980c0102252ad706634952
SHA14f92c678de5867fcec46dff19560390a7affbc7c
SHA2565b1538d09a2374d64a845d748f8008438e53938bea792c05bdcf926dfd4503e1
SHA512fa184527e6165bc8e17373c2687d927b8bfb97f1140f111cfb3cbfbb7a54bb7d00961a810a73cc8b353e20b0d8c3b117167e4351e9d482c9297687e16a6f254d
-
Filesize
304KB
MD5aedfb26f18fdd54279e8d1b82b84559a
SHA1161a427ef200282daf092543b3eda9b8cd689514
SHA256ba7517fbc65542871d06e7d4b7a017d5c165f55dda2b741e2ba52a6303d21b57
SHA51230c5836584b3d74e9a0719e0559f2b83900210ee574ae780d793cdc6396bd9b7cb672f401dfa15a58687ad1d769d5ef5c0b0b24de83dec3c8429a259c9a37bb2
-
Filesize
898KB
MD54c3049f8e220c2264692cb192b741a30
SHA146c735f574daaa3e6605ef4c54c8189f5722ff2a
SHA2567f74b2c86e9f5706fc44c8d5093a027d1cd5856006aa80f270efae26d55c9131
SHA512b13dc855c3c06b56aa9bf181680b69003839adeaf16c5372912004a7bf42882e340c445c58e24e083692b4dcbb15c3e0cf244664458ccdd0dd7668b440277e0a
-
Filesize
294KB
MD558ccb4c9da26dbf5584194406ee2f4b3
SHA1ae91798532b747f410099ef7d0e36bffeca6361c
SHA2562f502689b799fd964bced77e57edf4206809bb11da16cf4f7895df1df54cdc97
SHA512dff6b4bf25fc5b5cf1a64ee645fb0310b072ec69c89a6e863cf9e0800e1d36f8dc4e567cf19c7dc8ac704d351b604cbf8d35959c3a64a10aa6b54f5c8fedb3c2
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
16KB
MD5e7d405eec8052898f4d2b0440a6b72c9
SHA158cf7bfcec81faf744682f9479b905feed8e6e68
SHA256b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2
SHA512324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
119KB
MD587596db63925dbfe4d5f0f36394d7ab0
SHA1ad1dd48bbc078fe0a2354c28cb33f92a7e64907e
SHA25692d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4
SHA512e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b
-
Filesize
1.0MB
MD572d4e288992c783409b299f4fc842d39
SHA1ba2ed3d465949d6a5e583286161cff01eca39258
SHA256ebf947f7a753533dda44368adf308808ade5b2aa6022470c38af6aca4e230085
SHA512bf7d46a3cf25f0b1569f9f81c1498cccecf9df8254ce597ff0031e484f228c61ce12329cb079276f3b319e99d0076214d6548524ec55cb2aa8ad83103d5badbd
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
964KB
MD5cd7a487bb5ca20005a81402eee883569
SHA1f427aaf18b53311a671e60b94bd897a904699d19
SHA256f4723261c04974542a2c618fe58f4995f2dcaf6996656bb027d65adeeca6caf7
SHA51224da7a345429f2bc7a1b1e230f2d4400b8d57ecdf822d87d63fd4db0aed888b3ea3e98f8cb3f5b83986bfb846c1bd6eac2ac9382caba267c6ceca6ee77d79417
-
Filesize
3.1MB
MD59c682f5b5000cd003e76530706955a72
SHA11a69da76e05d114a317342dae3e9c7b10f107d43
SHA25636e6a3dd4bfc86c4e707f43cd9515707442d6c424b7661cb41766cfdca322522
SHA51233bd859542e1ae74d8c81427af44022cb91861dc02ee4202505f1e010487d06cb27e1aa83be6af17be4e2d8973289595b2ebe9bdf99a187956662df30b6dc88f
-
Filesize
476KB
MD535e7f1f850ca524d0eaa6522a4451834
SHA1e98db252a62c84fd87416d2ec347de46ec053ebd
SHA2562449fe334bbf8f09ff80422578a6c6961d20a0a456b214f6490c5ed1ae859c9e
SHA5123b013378a51a29652ff84f61050b344f504ef51a51944d469b1d0e629e4abad979416a56b9cffb6cfe20b80dfbebffec35dce6f5dc10b02907dee538f9f17a01
-
Filesize
662KB
MD50006ad7b9f2a9b304e5b3790f6f18807
SHA100db2c60fca8aec6b504dd8fd4861a2e59a21fe9
SHA256014d6c58dd7459c1664196ccd49b796f861d7d7e7e6c573bbb9cdc7cadc21450
SHA51231fcde22e25be698ef2efd44cc65b758e8c9e8b62504f3254f9cc44bfaabdaa0c94cefceac12833372f8b2797b6bd0205bb9c8f1626e25ee4117d886198fb7db
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
96KB
MD5204081e6e7b9e680e4f452d1924126f7
SHA18b1cf1eb230ee3fb5238b856406fef37f9f567b1
SHA2562f42ebfc8ffa32511b6241e0b3ffeb58d8bfdd0f16833f664848f98d092358a9
SHA5120aa3722b53426894d92f37ba9e37a4400a31c5709cca6801b24445d4237b9916bd69c0e74fc40eabe98a799a661169c18026f5988d0a5624c193bdbfb3b6cc77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3070649267-739947649-3250922198-1000\76b53b3ec448f7ccdda2063b15d2bfc3_4ac99bb4-a77e-4681-a9f9-8f660b389911
Filesize2KB
MD5f95dc611b00d6019a362e5b32a89105b
SHA1c929fa2ec0eeae2e7e37a1c3e9b5b78edc12b2cd
SHA256148236697b814cef58a8d60e705f63b8c22caa172748d8bcc68beef851636757
SHA51290f99a427da5b36dc936eba3445c091840d3a66141d56119fe2c319a8f73c62b663a24148e997a53046aadf0fa70dd25c1d5ca3558e2986cc4723cded0b1d4ac
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3070649267-739947649-3250922198-1000\76b53b3ec448f7ccdda2063b15d2bfc3_4ac99bb4-a77e-4681-a9f9-8f660b389911
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0uwbru0h.default-release\AlternateServices.bin
Filesize12KB
MD50ab0b1fd52154cb616c2b9a89548f155
SHA1309d438b26c84982b4111e4e45d91697eb92c263
SHA256b024bb972a912d49eec22d053896e7ab5fbc3ecd86973f2019deb8269603112c
SHA512a6d4560c906ffcb8624f5d2d994a73690dc267f220e9e0ec441349ddffc08aaef0c45c43f9104aab941695b2768e3040770bd066f3be58032f31cf6691fad31f
-
Filesize
256KB
MD5bcd2cbe2563b7bdb7e2f55c4ff6605b3
SHA18d8bd290f16fa7fbce34fa2a698a6043909c78ed
SHA256777d9b14b0691399390305550728b1b488fc6094c24fa86a4746e80ffa64b751
SHA512234778418d240a52fc649e0393750ca8464ec7b4780dcad2d71c7fa1197a212b873e759747dc1c9db06c5920a03168882a41e5f940552a2b03554923b5e7535b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0uwbru0h.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD51b5824e7fc22fd8ca7312fc989295982
SHA1733d2259aa86ff8a1439c9a29673436e4712800b
SHA256aad17ec82f72ab7a64df5b897eaae0fd16f6412e8fa5f831d79079ad00cfa67b
SHA51211ba630db7944e2d080c187913ddef19e32b9873da826b00119312b235e5eb0816d3d553d1d2bf728a928f3847dc95e4ee1e58d15bc917f2dee98f4b93739895
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0uwbru0h.default-release\datareporting\glean\pending_pings\cd47c5bc-4ac5-436e-9edf-65dfec95335b
Filesize982B
MD52beda2f0e21f132e84bf82df9b9fdce2
SHA1bb4f3fa209a5b9779b7410b76319e6626d88dfe4
SHA2562bd503a40aaafd5caacefed44718a5817d2dd5b39057e9829f6a4d7077b23adc
SHA512f7607f76b656f451572b0c558f8c5c232addbfb66ba691569541146361797e18e92d61b1e19081d054cc8bba40a3dcf57e38c852cfddd659f3d835a6ef3533ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0uwbru0h.default-release\datareporting\glean\pending_pings\f3732c0f-38c5-498f-b197-0e16fe612073
Filesize659B
MD5e44bea98b11b89c8682576fd8337b587
SHA146aeced75e4289d906fc979458ab84c8aa108455
SHA256c8576d11d53394e22cd4a8cd0a6b53e6919250f19b037d11b5787c63cc6cde90
SHA512362e877916a9519bb5e6b3591ca1741b573bc664b8c0a474aad990ac2d2dc262ce07709a829ce5238bbbfd2528d7a3f9f2d53d09e38820013a63bd605ea2726a
-
Filesize
1.1MB
MD5b4829063db806c0fbac9f8b5c9dc2759
SHA1137b1048ae13eb0b0c93425b40ec82ca1d86d734
SHA2564793702865d868fe8d26653adac49199eb1b5ba473d9187670f164271ced34fd
SHA5126855988ef778a0f60e40f9f19aea8b6f1f25de202bfac76305d9db7d14ce6ed788c91a20eb4b5ed8d7f04b39f856b12b294183dbcc10211dc978cfa5b6a5816a
-
Filesize
10KB
MD53f40f6a39d10d82d85d56e19934687a2
SHA16d6666b2f63b01f63dcedcd9ec2cf650dd843c87
SHA25640a4ac1ce37c05da01f1fe64754bcdc222a499180a33e602c17ed04190a13cd9
SHA512122b2cf672685b105cd2a74e2a5602dd1490a4470003beb017ecdc8b55271052c6dae74cbc7003564ccda884563eb1e7ef77512f9707cb8bb40f3d3ade9e0057
-
Filesize
10KB
MD53d1d0dfec7bb3db727d56cf9c5d3cb92
SHA1d53f1b10a1c844c057ce63ea33258ecb9976d365
SHA256b971bdb0429997a617bf35bdd8750dc48c6172e55098e0f9abbaa787337d818a
SHA512cd04d9bc298375ef816973211becc53ecc371033a15e01cbe7d62def82eeae792686042eb15a929e534031cb0c1264962d6270e23e8b806ca38ccc18f75c5e7e
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
2KB
MD5a32f3a7f1c5bc602f84982788f9240ac
SHA1f6c393178b66166f29ba0a8c35957fe6781ff86f
SHA2562411e8ae53f505584cb23d2573b07ca6e64c883e6559e5ba4f63ec3d14035a00
SHA512f13cba6da49418a8b6e1c9c8651562229e6966fa621eacb6e11028de6b9a9f409f57a65b3b5821b37bde1ba22ae6715024955260cd5155c4d5eb70cb12b1f3eb
-
Filesize
2KB
MD59a9ffeb14f917669cf92c1e3162ad874
SHA173026d15a89272692e4e454abe9bf3052d702996
SHA2567ba9de98fab19a241c6f9bb1899e4f4e4877db352b11a7d1646081a32d356d62
SHA512fe6e5c2e224e7ae213dac800331580b570d2d3d79159c7976147583d3bdfe8829a0be8b3fa33a66d7943e17cf7c1612f0e6180c2b8396ed830d8bbf53453bbba
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e