Analysis
-
max time kernel
124s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe
Resource
win10v2004-20250314-en
General
-
Target
c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe
-
Size
2.0MB
-
MD5
ef087515e2c4d82f09072c006b871fd9
-
SHA1
b99b91e36f39ce797b38bf7111a3a20293d6c98d
-
SHA256
c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02
-
SHA512
cf3d24be2a44073da9965095a5ca322350d77887ce919b31959080874c67d87c295545259b5afa93fb77d77c856aff18ac67d264b4e658e296d387b6190680ca
-
SSDEEP
49152:iYSRnUkK3t97LFnCT30FffPQbNHhFqr6LcjDHvv/OS6pTa6w:J4nUk8G3MHYPsrPzj6han
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://jumpstarbt.live/trop
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://xcelmodo.run/nahd
https://clarmodq.top/qoxo
https://uchangeaie.top/geps
https://reboundui.live/aomgd
https://jrxsafer.top/shpaoz
https://krxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://0liftally.top/xasj
https://.changeaie.top/geps
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2732-129-0x0000000000400000-0x0000000000420000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ qhjMWht.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a725d0994f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6876dbb135.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1280 powershell.exe -
Downloads MZ/PE file 8 IoCs
flow pid Process 167 4128 rapes.exe 169 228 svchost.exe 196 4128 rapes.exe 233 4128 rapes.exe 28 4128 rapes.exe 28 4128 rapes.exe 43 4128 rapes.exe 43 4128 rapes.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\4e6f50f4.sys 98115807.exe File created C:\Windows\System32\Drivers\klupd_4e6f50f4a_arkmon.sys 98115807.exe File created C:\Windows\System32\Drivers\klupd_4e6f50f4a_klbg.sys 98115807.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_mark\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_mark.sys" 98115807.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_4e6f50f4a_arkmon.sys" 98115807.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4e6f50f4\ImagePath = "System32\\Drivers\\4e6f50f4.sys" 98115807.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_arkmon\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_arkmon.sys" 98115807.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_klbg\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_klbg.sys" 98115807.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_klark\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_klark.sys" 98115807.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6876dbb135.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a725d0994f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6876dbb135.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion qhjMWht.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion qhjMWht.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a725d0994f.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation rapes.exe -
Deletes itself 1 IoCs
pid Process 4340 w32tm.exe -
Executes dropped EXE 21 IoCs
pid Process 4128 rapes.exe 1108 a725d0994f.exe 1536 D3fQA0J.exe 2056 wjtk7Ga.exe 5208 lWUwEmq.exe 5312 9sWdA2p.exe 2732 lWUwEmq.exe 3020 6876dbb135.exe 3512 D3fQA0J.exe 6044 lWUwEmq.exe 3520 rapes.exe 5020 UZPt0hR.exe 4704 lWUwEmq.exe 4676 tzutil.exe 4340 w32tm.exe 13168 fd67EIq.exe 7288 qhjMWht.exe 8100 wjtk7Ga.exe 8604 3f2b9ba.exe 6372 98115807.exe 10288 rapes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine a725d0994f.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 6876dbb135.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine qhjMWht.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\4e6f50f4.sys 98115807.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\4e6f50f4.sys\ = "Driver" 98115807.exe -
Loads dropped DLL 25 IoCs
pid Process 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\d42ccd29-16b3-48ae-9e91-bf9b75719b0e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{ea661f7e-8e7e-46a1-bf0f-6304a077e374}\\d42ccd29-16b3-48ae-9e91-bf9b75719b0e.cmd\"" 98115807.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 98115807.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 a725d0994f.exe File opened for modification \??\PhysicalDrive0 98115807.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 4128 rapes.exe 1108 a725d0994f.exe 3020 6876dbb135.exe 3520 rapes.exe 7288 qhjMWht.exe 10288 rapes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2056 set thread context of 4064 2056 wjtk7Ga.exe 100 PID 5208 set thread context of 2732 5208 lWUwEmq.exe 104 PID 6044 set thread context of 4704 6044 lWUwEmq.exe 143 PID 8100 set thread context of 8152 8100 wjtk7Ga.exe 169 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 3f2b9ba.exe File opened (read-only) \??\VBoxMiniRdrDN 98115807.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\sk\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_2004_1944613533\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2004_1558992415\_locales\am\messages.json msedge.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh 98115807.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 98115807.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 208 3020 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f2b9ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6876dbb135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd67EIq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhjMWht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98115807.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a725d0994f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D3fQA0J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D3fQA0J.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 10140 PING.EXE 10088 PING.EXE 10036 PING.EXE 9788 PING.EXE 9352 PING.EXE 10612 PING.EXE 12716 PING.EXE 10256 PING.EXE 9612 PING.EXE 9300 PING.EXE 8560 PING.EXE 10520 PING.EXE 9508 PING.EXE 1052 PING.EXE 6952 PING.EXE 10956 PING.EXE 10416 PING.EXE 8768 PING.EXE 12520 PING.EXE 12924 PING.EXE 10360 PING.EXE 8820 PING.EXE 8452 PING.EXE 12868 PING.EXE 5928 PING.EXE 11140 PING.EXE 9980 PING.EXE 9732 PING.EXE 12656 PING.EXE 10900 PING.EXE 10736 PING.EXE 9928 PING.EXE 8 PING.EXE 11032 PING.EXE 9068 PING.EXE 8664 PING.EXE 8608 PING.EXE 7688 PING.EXE 11796 PING.EXE 10468 PING.EXE 9456 PING.EXE 10580 PING.EXE 9568 PING.EXE 12660 PING.EXE 12780 PING.EXE 10792 PING.EXE 8872 PING.EXE 6316 PING.EXE 6276 PING.EXE 12300 PING.EXE 11080 PING.EXE 9164 PING.EXE 9112 PING.EXE 8712 PING.EXE 8504 PING.EXE 12728 PING.EXE 13052 PING.EXE 3828 PING.EXE 10684 PING.EXE 9404 PING.EXE 8240 PING.EXE 12436 PING.EXE 5488 PING.EXE 9680 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 345 Go-http-client/1.1 HTTP User-Agent header 346 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133887573011717500" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{1D6AEB3B-C009-400A-8011-6D99C816C4E7} msedge.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 10308 PING.EXE 12656 PING.EXE 10900 PING.EXE 9508 PING.EXE 8452 PING.EXE 6316 PING.EXE 5488 PING.EXE 11080 PING.EXE 10360 PING.EXE 9980 PING.EXE 9732 PING.EXE 1052 PING.EXE 12728 PING.EXE 12924 PING.EXE 10612 PING.EXE 3828 PING.EXE 10684 PING.EXE 10632 PING.EXE 9112 PING.EXE 12520 PING.EXE 12716 PING.EXE 10416 PING.EXE 10256 PING.EXE 10088 PING.EXE 8768 PING.EXE 8712 PING.EXE 12436 PING.EXE 11796 PING.EXE 6952 PING.EXE 5928 PING.EXE 8 PING.EXE 11140 PING.EXE 10792 PING.EXE 10520 PING.EXE 9680 PING.EXE 9404 PING.EXE 12780 PING.EXE 10848 PING.EXE 10736 PING.EXE 9788 PING.EXE 9456 PING.EXE 6320 PING.EXE 8608 PING.EXE 8504 PING.EXE 11032 PING.EXE 8872 PING.EXE 6276 PING.EXE 10468 PING.EXE 10140 PING.EXE 9300 PING.EXE 12660 PING.EXE 12300 PING.EXE 12360 PING.EXE 6364 PING.EXE 9612 PING.EXE 9240 PING.EXE 8240 PING.EXE 9568 PING.EXE 8560 PING.EXE 9164 PING.EXE 12832 PING.EXE 10192 PING.EXE 10036 PING.EXE 8820 PING.EXE -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 4128 rapes.exe 4128 rapes.exe 1108 a725d0994f.exe 1108 a725d0994f.exe 1536 D3fQA0J.exe 1536 D3fQA0J.exe 1536 D3fQA0J.exe 1536 D3fQA0J.exe 1536 D3fQA0J.exe 1536 D3fQA0J.exe 4064 MSBuild.exe 4064 MSBuild.exe 4064 MSBuild.exe 4064 MSBuild.exe 5312 9sWdA2p.exe 5312 9sWdA2p.exe 5312 9sWdA2p.exe 5312 9sWdA2p.exe 5312 9sWdA2p.exe 5312 9sWdA2p.exe 3020 6876dbb135.exe 3020 6876dbb135.exe 3512 D3fQA0J.exe 3512 D3fQA0J.exe 3520 rapes.exe 3520 rapes.exe 3512 D3fQA0J.exe 3512 D3fQA0J.exe 3512 D3fQA0J.exe 3512 D3fQA0J.exe 1280 powershell.exe 1280 powershell.exe 1280 powershell.exe 7288 qhjMWht.exe 7288 qhjMWht.exe 7288 qhjMWht.exe 7288 qhjMWht.exe 7288 qhjMWht.exe 7288 qhjMWht.exe 13168 fd67EIq.exe 13168 fd67EIq.exe 8152 MSBuild.exe 8152 MSBuild.exe 8152 MSBuild.exe 8152 MSBuild.exe 10288 rapes.exe 10288 rapes.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe 6372 98115807.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5020 UZPt0hR.exe 5020 UZPt0hR.exe 5020 UZPt0hR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 1280 powershell.exe Token: SeDebugPrivilege 13168 fd67EIq.exe Token: SeDebugPrivilege 6372 98115807.exe Token: SeBackupPrivilege 6372 98115807.exe Token: SeRestorePrivilege 6372 98115807.exe Token: SeLoadDriverPrivilege 6372 98115807.exe Token: SeShutdownPrivilege 6372 98115807.exe Token: SeSystemEnvironmentPrivilege 6372 98115807.exe Token: SeSecurityPrivilege 6372 98115807.exe Token: SeBackupPrivilege 6372 98115807.exe Token: SeRestorePrivilege 6372 98115807.exe Token: SeDebugPrivilege 6372 98115807.exe Token: SeSystemEnvironmentPrivilege 6372 98115807.exe Token: SeSecurityPrivilege 6372 98115807.exe Token: SeCreatePermanentPrivilege 6372 98115807.exe Token: SeShutdownPrivilege 6372 98115807.exe Token: SeLoadDriverPrivilege 6372 98115807.exe Token: SeIncreaseQuotaPrivilege 6372 98115807.exe Token: SeSecurityPrivilege 6372 98115807.exe Token: SeSystemProfilePrivilege 6372 98115807.exe Token: SeDebugPrivilege 6372 98115807.exe Token: SeMachineAccountPrivilege 6372 98115807.exe Token: SeCreateTokenPrivilege 6372 98115807.exe Token: SeAssignPrimaryTokenPrivilege 6372 98115807.exe Token: SeTcbPrivilege 6372 98115807.exe Token: SeAuditPrivilege 6372 98115807.exe Token: SeSystemEnvironmentPrivilege 6372 98115807.exe Token: SeLoadDriverPrivilege 6372 98115807.exe Token: SeLoadDriverPrivilege 6372 98115807.exe Token: SeIncreaseQuotaPrivilege 6372 98115807.exe Token: SeSecurityPrivilege 6372 98115807.exe Token: SeSystemProfilePrivilege 6372 98115807.exe Token: SeDebugPrivilege 6372 98115807.exe Token: SeMachineAccountPrivilege 6372 98115807.exe Token: SeCreateTokenPrivilege 6372 98115807.exe Token: SeAssignPrimaryTokenPrivilege 6372 98115807.exe Token: SeTcbPrivilege 6372 98115807.exe Token: SeAuditPrivilege 6372 98115807.exe Token: SeSystemEnvironmentPrivilege 6372 98115807.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 2004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 4128 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 89 PID 3900 wrote to memory of 4128 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 89 PID 3900 wrote to memory of 4128 3900 c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe 89 PID 4128 wrote to memory of 1108 4128 rapes.exe 95 PID 4128 wrote to memory of 1108 4128 rapes.exe 95 PID 4128 wrote to memory of 1108 4128 rapes.exe 95 PID 4128 wrote to memory of 1536 4128 rapes.exe 98 PID 4128 wrote to memory of 1536 4128 rapes.exe 98 PID 4128 wrote to memory of 1536 4128 rapes.exe 98 PID 4128 wrote to memory of 2056 4128 rapes.exe 99 PID 4128 wrote to memory of 2056 4128 rapes.exe 99 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 2056 wrote to memory of 4064 2056 wjtk7Ga.exe 100 PID 4128 wrote to memory of 5208 4128 rapes.exe 102 PID 4128 wrote to memory of 5208 4128 rapes.exe 102 PID 5208 wrote to memory of 2732 5208 lWUwEmq.exe 104 PID 5208 wrote to memory of 2732 5208 lWUwEmq.exe 104 PID 5208 wrote to memory of 2732 5208 lWUwEmq.exe 104 PID 5208 wrote to memory of 2732 5208 lWUwEmq.exe 104 PID 5208 wrote to memory of 2732 5208 lWUwEmq.exe 104 PID 5208 wrote to memory of 2732 5208 lWUwEmq.exe 104 PID 4128 wrote to memory of 5312 4128 rapes.exe 106 PID 4128 wrote to memory of 5312 4128 rapes.exe 106 PID 4128 wrote to memory of 5312 4128 rapes.exe 106 PID 4128 wrote to memory of 3020 4128 rapes.exe 112 PID 4128 wrote to memory of 3020 4128 rapes.exe 112 PID 4128 wrote to memory of 3020 4128 rapes.exe 112 PID 2732 wrote to memory of 2004 2732 lWUwEmq.exe 116 PID 2732 wrote to memory of 2004 2732 lWUwEmq.exe 116 PID 2004 wrote to memory of 1920 2004 msedge.exe 117 PID 2004 wrote to memory of 1920 2004 msedge.exe 117 PID 2004 wrote to memory of 3672 2004 msedge.exe 118 PID 2004 wrote to memory of 3672 2004 msedge.exe 118 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 PID 2004 wrote to memory of 2456 2004 msedge.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe"C:\Users\Admin\AppData\Local\Temp\c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\10512750101\a725d0994f.exe"C:\Users\Admin\AppData\Local\Temp\10512750101\a725d0994f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\10514460101\D3fQA0J.exe"C:\Users\Admin\AppData\Local\Temp\10514460101\D3fQA0J.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\10530610101\wjtk7Ga.exe"C:\Users\Admin\AppData\Local\Temp\10530610101\wjtk7Ga.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe"C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe"C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2ec,0x7ffad67af208,0x7ffad67af214,0x7ffad67af2206⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:36⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2272,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:26⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2624,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:86⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:16⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:16⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3456,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:16⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5084,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:86⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4620,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3720 /prefetch:86⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5320,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:86⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:86⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:86⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5972,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5984 /prefetch:86⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5992,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:86⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6264,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:16⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6124,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:16⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=4960,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:16⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6648,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:16⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5028,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6768 /prefetch:16⤵PID:7108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=3612,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:16⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3628,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:86⤵PID:7764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:86⤵PID:7780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3644,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6728 /prefetch:86⤵PID:7800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5268,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:86⤵PID:8344
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵PID:1544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534240101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10534240101\9sWdA2p.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\10534250101\6876dbb135.exe"C:\Users\Admin\AppData\Local\Temp\10534250101\6876dbb135.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 7164⤵
- Program crash
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534260101\D3fQA0J.exe"C:\Users\Admin\AppData\Local\Temp\10534260101\D3fQA0J.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe"C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6044 -
C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe"C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe"4⤵
- Executes dropped EXE
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵PID:7092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534280101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10534280101\UZPt0hR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5020 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:2872
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:228 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵
- Executes dropped EXE
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵
- Deletes itself
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\{f12c11ec-bc93-488c-ac26-8ec0cfd80b50}\3f2b9ba.exe"C:\Users\Admin\AppData\Local\Temp\{f12c11ec-bc93-488c-ac26-8ec0cfd80b50}\3f2b9ba.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot6⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:8604 -
C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\98115807.exeC:/Users/Admin/AppData/Local/Temp/{b82a663d-898c-4dfb-8f7a-29940880528e}/\98115807.exe -accepteula -adinsilent -silent -processlevel 2 -postboot7⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:6372
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534290101\fd67EIq.exe"C:\Users\Admin\AppData\Local\Temp\10534290101\fd67EIq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:13168 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "setup" /t REG_SZ /d "C:\Users\Admin\AppData\Local\setup.exe"4⤵PID:1840
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "setup" /t REG_SZ /d "C:\Users\Admin\AppData\Local\setup.exe"5⤵PID:11300
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:11484
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534300101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10534300101\qhjMWht.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7288
-
-
C:\Users\Admin\AppData\Local\Temp\10534310101\wjtk7Ga.exe"C:\Users\Admin\AppData\Local\Temp\10534310101\wjtk7Ga.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:8140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8152
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe"C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe"3⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\is-E4PDD.tmp\86f01fee5f.tmp"C:\Users\Admin\AppData\Local\Temp\is-E4PDD.tmp\86f01fee5f.tmp" /SL5="$1001DA,28467627,844800,C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe"4⤵PID:8176
-
C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"5⤵PID:7160
-
C:\Users\Admin\AppData\Local\Temp\is-VT8QT.tmp\KMSpico.tmp"C:\Users\Admin\AppData\Local\Temp\is-VT8QT.tmp\KMSpico.tmp" /SL5="$301D4,2952592,69120,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"6⤵PID:6636
-
-
-
C:\Users\Admin\AppData\Roaming\MyApp\core.exe"C:\Users\Admin\AppData\Roaming\MyApp\core.exe"5⤵PID:12164
-
-
C:\Users\Admin\AppData\Roaming\MyApp\info.exe"C:\Users\Admin\AppData\Roaming\MyApp\info.exe"5⤵PID:11916
-
-
C:\Users\Admin\AppData\Roaming\MyApp\core.exe"C:\Users\Admin\AppData\Roaming\MyApp\core.exe"5⤵PID:11944
-
-
C:\Users\Admin\AppData\Roaming\MyApp\info.exe"C:\Users\Admin\AppData\Roaming\MyApp\info.exe"5⤵PID:11952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534350101\b89387d21e.exe"C:\Users\Admin\AppData\Local\Temp\10534350101\b89387d21e.exe"3⤵PID:7716
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:7452
-
-
-
C:\Users\Admin\AppData\Local\Temp\10534360101\096e826503.exe"C:\Users\Admin\AppData\Local\Temp\10534360101\096e826503.exe"3⤵PID:11252
-
-
C:\Users\Admin\AppData\Local\Temp\10534370101\5660a968c5.exe"C:\Users\Admin\AppData\Local\Temp\10534370101\5660a968c5.exe"3⤵PID:6680
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"4⤵PID:12544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3020 -ip 30201⤵PID:4996
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1728
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{ea661f7e-8e7e-46a1-bf0f-6304a077e374}\d42ccd29-16b3-48ae-9e91-bf9b75719b0e.cmd"1⤵PID:9604
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12300
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12360
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6952
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12656
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12716
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12832
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3828
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5488
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5928
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11140
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11080
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11032
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10956
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10848
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10792
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10736
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10684
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10632
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10580
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10416
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10360
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10308
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10256
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6364
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10192
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10140
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10088
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10036
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9980
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9928
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9732
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9680
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9568
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9352
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9300
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6320
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9068
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8820
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8768
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8712
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8664
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8608
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8560
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8504
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6316
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1052
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12436
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12660
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12728
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12868
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12924
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13052
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:10288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\setup.exe1⤵PID:11356
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:12596
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
1.9MB
MD509b76f9fe13fab0c3aa4cc61cc8c9946
SHA12b186dd57a68770b6ffbdc5034638f7176be66c2
SHA256eb1ac70c8524ab7b487d8dccb2faceac4f447701a17a34a164b228828fe76f98
SHA5125ce231d18dda1575826cf4499603499ab5e1fa34ac23581336eb050388b28f3bb65885efd4a75037cae5a1968d938ce7c9a3e68f4aa2be916efd709c32710f50
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
43KB
MD5e776697ebfebc164ef589a7d2e64e81b
SHA19fffd53a23922e685da50f5ce22e7cc2edb004e0
SHA2561a4f0a54f85f1cb4a9b13e91623153d1c078960884fe04076aa6df012e4599cb
SHA512877d9f98cce36137433181d56baf3da201370cfea1b81fec74cb9f545c4d764e6440de3b1144f0046149faab0b024fd46f6f1930dae8bb0ac15eae2519a02ac4
-
Filesize
33KB
MD51478de9c94a368d7ed03d50bb6005cdf
SHA1afdcefbe26aa59c0e4ae668cf422adcf589461a8
SHA25681cf44a40792ce2cc46ea896bbf06a91687ca4c25faee4e67e470a7d61a77914
SHA512dc980bc3355ddd8096f8751c9bb51f1e296322eaa5d4a9f20588690c3e799eb9aaec823fdccb098c53f4be978614e7980c419bb9ce7cf6b66c3db9515d9bf80c
-
Filesize
34KB
MD5522037f008e03c9448ae0aaaf09e93cb
SHA18a32997eab79246beed5a37db0c92fbfb006bef2
SHA256983c35607c4fb0b529ca732be42115d3fcaac947cee9c9632f7cacdbdecaf5a7
SHA512643ec613b2e7bdbb2f61e1799c189b0e3392ea5ae10845eb0b1f1542a03569e886f4b54d5b38af10e78db49c71357108c94589474b181f6a4573b86cf2d6f0d8
-
Filesize
69KB
MD5938aba7aabbec04a0180a78f3213cf7f
SHA132af549e781ce0183da02afb98e27e476e129b96
SHA256f998860d950a9aa57a97f1d57378194153712be01683ff502c44b9f516ac36bc
SHA5122d8c2ffddb0bea4396817545f08184111ce614b897e3dc18b2f0639e9a8113a5450d396213bdf70c830b7b8217af7c4c7b8143d2e4a88964533216b9eae08ced
-
Filesize
506KB
MD528ddff24e4ed12d19034048dd693e051
SHA1f53dd3dbdd4643273399051b9dd0f187992e606d
SHA256904402faa420609a73320f5b75f8f81826159f9bc20d67d56d5fad963091dd0c
SHA51278f5ce9a540e514a0618799f221de79e32aa903086f99a56e504b0a9f270e430f7a3963173181007fac718a601c6b10a70c6324132ce2b0f5552a52437ff91af
-
Filesize
17KB
MD5240c4cc15d9fd65405bb642ab81be615
SHA15a66783fe5dd932082f40811ae0769526874bfd3
SHA256030272ce6ba1beca700ec83fded9dbdc89296fbde0633a7f5943ef5831876c07
SHA512267fe31bc25944dd7b6071c2c2c271ccc188ae1f6a0d7e587dcf9198b81598da6b058d1b413f228df0cb37c8304329e808089388359651e81b5f3dec566d0ee0
-
Filesize
89KB
MD57a6ebb3193c0c23eaf22c4df76dbf3f5
SHA18c782bad9eecf80387a61bff578bf5c20e70ed80
SHA256b78264730ff0cb3d2b2eec16a9b129a9b633c704f5178613ca7271be967fcecb
SHA51217aab5b91a271555fa983312156f2e99d0bff3ae02963b2e73a57b30c4fbb5faf482acac34b77d8dfc6daa28d2c1c2282eba921f7c32fd791b0a98a9e2532083
-
Filesize
272KB
MD55f524e20ce61f542125454baf867c47b
SHA17e9834fd30dcfd27532ce79165344a438c31d78b
SHA256c688d3f2135b6b51617a306a0b1a665324402a00a6bceba475881af281503ad9
SHA512224a6e2961c75be0236140fed3606507bca49eb10cb13f7df2bcfbb3b12ebeced7107de7aa8b2b2bb3fc2aa07cd4f057739735c040ef908381be5bc86e0479b2
-
Filesize
21KB
MD5caf225f7adbe3c2452a62dd3fde23661
SHA1cbf6ac9c6cf00094fc79e189096a6baa3ff40631
SHA256026b86f6177fe1eafc143d0bb1841929df81cded8df3894dbca28b940c9153c7
SHA512455c1f42bce6849e4065c84cf6368f828e2a8cc3f853129e0f2f019d36a54c1e282823283a6cf4b29ee792d29a99648e3a97a4e9290997263048e9fdeb56a57e
-
Filesize
259KB
MD534504ed4414852e907ecc19528c2a9f0
SHA10694ca8841b146adcaf21c84dedc1b14e0a70646
SHA256c5327ac879b833d7a4b68e7c5530b2040d31e1e17c7a139a1fdd3e33f6102810
SHA512173b454754862f7750eaef45d9acf41e9da855f4584663f42b67daed6f407f07497348efdfcf14feeeda773414081248fec361ac4d4206f1dcc283e6a399be2f
-
Filesize
28KB
MD5e35d41d29bcacc8474c96fec87ab3760
SHA104c4cd7c7b0efbe9a3831b1ed2db8fe0dc468818
SHA2562f0454db4dd937f7fe4f0b0d1969f4057c631ec5e102cb3209f79b08dfad40a1
SHA51212e19dba0a58f9e7a50f5bc55ebebf58fa9bddf8ea2f25e1c14ad15bc1ef65f4b087846ad8172d714dbc76995c9188abfad08bfaa650be08a5e8ca0de51ed619
-
Filesize
31KB
MD510a3bf6e6cac566e16d57d26835df69b
SHA1f12d0b459f4f1f5af1e227a074218bb6012eb0bc
SHA2561e7e4d23dc95b01cfc94093235553b37e9ffef82ed1f89f555541883a98c7f03
SHA51205e2769b63b6e48684edfeda80115c683de4647537abb4b76fa87799a914e2ae5825e6fb220ac8471db3d071d74c1ecbcdbef783abe2bb732530407a92b9c65c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD574bd5fc691613471415cf5aa9f6464a9
SHA1cc5a146ad961d9cf58a491e23f4903f0cde4c753
SHA2565954606af3f9c5e0e2c744515218073be688deb8a40d57f25ddbe71098a79611
SHA512e750baed13de9c95c8131a6638401b7c52f9d1d160a75d04e2f759c49b06d6ba7be4181d002ce8d34e761347bf7a563d3fc1769b7bebf56a3645ad3cac4d3ced
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58c781.TMP
Filesize3KB
MD5f63c46d5a60e4ecb968342d380016bad
SHA19d8d0313746ba491e97ac453d731a68b47aa5ce4
SHA2566aae19bbbb8bac04af7d5ae90a556304ab110d1157a7f77a404c0045e092aa73
SHA5128a21b52d0bcb9e58253a9b6fdde41b9eaf4382d399635fbf6922d82f66c223dc0deb97b724cc8fe979c74c49522e73df0bed4f0161878c5aea97e1bd78fa5de9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD519e0c1a559c97bd2cae3684044c01256
SHA1b38cbdcd3ac866a8be4bbc1649a9cf097ab4a822
SHA2564157cb210029379df1804c25b65eb5dade76453965d956f3c16dcce538bc7523
SHA512aad3918b4fff9c9ed523ae287ee46813a3717b917c0e43e3100608ca0bd5f5d18534211daf360ddd84966e466541d35a39cd21eede6b92587244d4d98e60d100
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5ae8ab9b1151ec0c80c1cec262fb5d1fb
SHA1f58aa923452c70098abecb205caf0d627ace79f1
SHA256cd47f2b862175218ade9bec1bbb571307ba5fe2320f986221a1eb9c697e74e77
SHA5127172298397d455fd012b2f7a21c2d5192939f0f2f858f8fe9294de39b64a0f088f8fce21d243cc7da5dca9703b7dc4bc655315f36d756e33d7c0d335860b5c31
-
Filesize
36KB
MD57d73c048264bc0c23b3c06abf4a9e575
SHA1fb7b354305ebf1abdd3a7f0474fdb953e05d688d
SHA256ca52b5b840c873992a1b56510dc48008b9d00449aeb9098b9aa32cf1bd1ec348
SHA512f9c646db6195420ef7f5cbc50dba00ffe3ec6a7b0286091d7ff2cb1eca995ece3b52fa6a60f96741fcd404750dddcbb5ddd2b0de802e6f9c318c0bcb9f4ef78b
-
Filesize
23KB
MD5bbf5d91ef45d4fb97918612ca336b07f
SHA1ab3cc11e6e3621fc355c78729997d74543097167
SHA256ecad8b8fe2989b53ed6feb039f0ef61a4cf71f0282eb29c60f278d68ea1b6734
SHA5128c75cd1ba1dd130eb084e13fc770fb9b5e8f445113df325e3edda10d323057e6b15518e47c7d89faa9e8b4e1a0de44d80cff3fcca47ccbaf20c5f42e1933470d
-
Filesize
467B
MD52d168a1afee516885b1bdd74a310e45f
SHA14f219627de2464d3e191b25da28715329d860b6c
SHA2568728f06630517fee0820d4ce700e4e741511778285d0d7e3666d57f98b7f2a93
SHA512d151a503df61894f17031569726cdb896e885dd6a6f0941f14905130db15409032d65db9bf344a75ac4719eed4f3e7bc900354d1544d5024ac868fa8b6bae042
-
Filesize
23KB
MD56666266e400f312d42ec8282e395e0ea
SHA18790041bdc905c616ab51534c2ef29d6df05fb6f
SHA256aba806fc6933cb8fbe2be58b87a0ce6f53786230d4f3775ebcf409f25b82446a
SHA5120fe2a5f403850a3d6388c0563a43780ac4669e262e92c5727f6d3b8f2cf4a336966844def0d97120a7dac363ae32787a8963191827f95af31e658dbb7b723602
-
Filesize
902B
MD5c9824f66a38876270edb8e4476f9a931
SHA1df6f6f29ff762bdba03cf9c6cefa1e179efa1414
SHA256d9952e7c6e58406d3d2de081340b2b08880e2bffa09bbf3531b917754dbb9a1e
SHA512d72b751e1e6a49011cc1ad875289a58962c0169dbb89f0c0eedffc821ddf758831ecb536eaf5845a250e534e0d8d1fba4c52c57a3ffbeabd7322516b438146b8
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD5332d35447e940d0687b30daa23535ad4
SHA18bdbe8e5ed2cd93229d4323c8f3d03de82dfd466
SHA256038e3bfea58b0c02d1923606c6a7de2de05345f818307212b4ec3f10ba3efefd
SHA512382327481916d019a3c0b82485756def169e7d3645f1ac01eb96f0495b28e959f987d52e037f3a1125c29be57d0204df34bb8f62cd82010b28c55c47fe4f92d5
-
Filesize
40KB
MD53b0f53a156cfb4020553a9f1da7ce64d
SHA1575bdab25e99c898a5b64bbb4b5957e6428cfdc6
SHA2562cffadc803ed6913cf7bd78ef829544baf4f85886da87b22d9c5b19b8acc9161
SHA5128d78bd40ed0a1cc5e2abadc0856c7cd4e1bf901219c456e77ee3282f48d6eb2f77dfcda4d383363a7a11afd52ed3f4e6a4d20fa5179190cac3ef6e422cd238ab
-
Filesize
41KB
MD5082e8f869fdb126315d72eadb7eccdaf
SHA19514c6ed0907dac7a472ca3f7b0fb38b68115ebd
SHA2565ecd4cd8d077eee3da14c4be02a3e13dfb5185c91578c78082f4806937a6c86d
SHA51257f890598c33f0009cc384a53e55fbad593af6c6304df8e880ab8e45c45fb703819e07a28fb3f01e33485bc8208054bcf5cd17d163c20a86c2d3c105eef109e6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5ebed7f4c3f3094469703a1d262892b65
SHA1a9e96ca078c3174f557f7bc6b63ec5acfa355d6a
SHA25612cc0ba1bea6bce9e25a7bd768625cda8b728a916b1f4b64ab5eae36b5133634
SHA51248358b1f1b000130241d59de3c795cc2416e46f1cbbafcd797cc587417e424f72e4c718816cb1430f453682f8714841b0c497ba5756e79f247f44d07554f919b
-
Filesize
2.1MB
MD517c9f37fe8c2b01370cb2a9464697351
SHA103d217ee6aa6383a8b61f550f945c69687e03192
SHA256a4507a54200b84987456f9b2ea1f7a4ae9f1aedddc3beff51ac2127e025eb03b
SHA51212c950b89813f17bf4db1e46d7445a7663a57ee50f4e52377f40c0d1e661ab3fcae909dc969cbab6c3135f414c26b7a2f749ae3697df9c5c4e4ffa25107bcc24
-
Filesize
7.0MB
MD5e130f55133c41e91984ba551d9316d28
SHA1b3dc5d47c1f2dee238bd6b020cad759411ab5fdb
SHA256b3cead0b7588d6fb88833bc5ae6d74338ab3727c5fec307d4332b36df8a50604
SHA51290cde01dee2191a011811c80c6b6d978d4001a097493f72aceb84094dbfd59343beaa3a3d398f0c53bef0e9a1585f6b794dc5bb98e73ea58df2375310884f219
-
Filesize
1.2MB
MD5a14da6f0e2c99c95fb0a9d8119ead545
SHA176b0e5532cff13732244078ceb2172fd5c59359d
SHA256713fea7f14920d085472ba42d1f0f1e53c9a7e97a17dcdd3f050322c26536901
SHA5127009e4ec7ca828ff006885f8e475d3d3df364f5c3fef4023226f8feb0dea83aedfc52b45cb2151f914ae36ffb4428b83c3697d6ef7aadb9810551a3b9e406e8d
-
Filesize
969KB
MD50202dd8e050fb3a710058c27979616ce
SHA17d6483b579e0a967c9be38255daf8a1259f6a726
SHA256d82a8853d27dcbff8ab358516c4719c77ae7e788dbdc28543ace7894ec1d37ae
SHA5128c7d15c206247aceb43063257e0eab8dd71c0c446037d1240c43cbc07adeb08982016975edfad6b7728462ef190f7396cb73d477d51cf25f4cf343ccc1058411
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
1.2MB
MD56ac21d5d2a54b525ecf721d6f80805ad
SHA1cd2b809f222906c533ab712139101c6188a08552
SHA256e4094a03164aecf804eef2b9690796761b195786062273eaeb8bf7be0c18045d
SHA512cc6e30e7a62ee5c55b338b38467a9032129ae2ef0b6f7b1e0ff8b679936772c5e6f0d8b7341f06fb69fea310680c1b79f4a8282d8a1ebfe1f9cc4cc6605b2968
-
Filesize
8.8MB
MD585dc6d6dcfa018c2f451cc0ca8c77458
SHA1f7519fa0df4f69cbda5f3a7dfb4e457381f8e5c8
SHA256acf4882beae2b481c9bbbe10900688099a1018de9a95217dd31243072ab8f93e
SHA51293f7d1de428f45e3038960a83e1752863d69b21e4286eb25a2b02777e4161def6fb3275d219ed9cf044b73c4ba34c33f81fe52358c10d93a9000950dc7c0da79
-
Filesize
1.8MB
MD5155b5a37e0139ae41470d962cb52d724
SHA18205240e38cd52ceacf9ea8c3341df000e9d3d1e
SHA2567d97bf7503ab66494f677393827135a6bab046e140994562b851af8e8e5e9d72
SHA51291daf5395c85dad4894b350544e26767856b3af2e3e34f2eebe71410b9f9ceb7a88c518beda22ed280ca1efc90e045acd68ad37ae4ae01529e33433905632fc7
-
Filesize
28.1MB
MD58bb05367683f7234d44082d6d218eb93
SHA1642be518acd284344d6b3a688508ad011fba5601
SHA25664c648cb4e1778ea36c85eeeef3744ee724e1852b2cf0c02c30202db4c4a949c
SHA51236de01e264cd36aa2a27d1d7f737d34838d38f7513df339cbef53e943d9cbf886ad054e74c73ef6013e0faff37031e0acbec90e18087a348bb3446b5f55864a3
-
Filesize
1.2MB
MD510df43a9bcda80911d9e23b6cdb590cc
SHA1e750427f684fe5539465ca69d7ec870a64b04d2e
SHA256e0a860108cfd2512018cf3d093810822ccad69b6bd25f8f0fc6080f882e36d2c
SHA5126875986d8d7ec4721fcf3f06295d8cd5d2e48f6f2825fcc64bee4d13cd2d3444cd2bf4a6d52e366ce65fae8a386b77727182cf6b175187f214b1033d694d322e
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
65KB
MD5484fe39d0c4f0b8c54882f1fe70fb9bc
SHA114ebaf80bf82a604bd3767c328c9b7682d1f357d
SHA256d5529e3bd947d15d61d78b51ac6f5fc0aa32c941651b4367883d1c985f92009d
SHA512c06dcf3e018e5afa63adbe5c0e28a2ba84fb05f21f189b5fb9c0248367254f120c91a19d7b3da5f03c0a92c5ad47d76b4ffb033f294b5e7076bf55092f38cdea
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
65KB
MD56736db005a2172c0cf40d43964e43a56
SHA1cc593515abafd0c6b4c149ecb55daf338fe3121d
SHA25629970f9dbe42bf24a1462124b917062697b07f8aff4945544e848b38c52ec2b4
SHA512d420479c3c0b744a8f7cfb8181a7f888a629f4c05069599e808b759ce43925f896f0d14e9de264ffeda103a2431fa3902d0f1a121ca2670a3455a72351cc481b
-
Filesize
2.0MB
MD5ef087515e2c4d82f09072c006b871fd9
SHA1b99b91e36f39ce797b38bf7111a3a20293d6c98d
SHA256c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02
SHA512cf3d24be2a44073da9965095a5ca322350d77887ce919b31959080874c67d87c295545259b5afa93fb77d77c856aff18ac67d264b4e658e296d387b6190680ca
-
Filesize
2KB
MD51c674015081a6cfa094c7f1542642f23
SHA1275375e6bf11f171eb15d784d4abbe1c989cb3ab
SHA256093f571e71ef6ca820818b3555543b9db3b0688eef73f3e4fbe54dc01a682445
SHA5125875c45c16e35499a348cb78d01345ea9279dc7ab0f295a40f0c470eea323910cfcbaaaccd069029741bde91fbee5bc22dd6e4dfded3529776b6953d1f691b1b
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
48KB
MD56de7c98cf204da766f6bb98dc48efb38
SHA1744e3523a7383f9d234b789a220d530819669641
SHA2564f69c8e36d6588d0c31a11105db4c314c413d897af7536152bd1119c8639d170
SHA5122cf41c3c120706d1da2c2a2304208ffa38118a0b25faf992eab065d30bd6968cdd54c0659cfe8b6cc249fe0e6fddf153349a1ad7351bf7017f3aac8fc83e937c
-
Filesize
21KB
MD579c1700cae60b5751d1c17515fc36132
SHA136306e0bc12065025dfa653d89829f337bf9b284
SHA25607f6365d517b5bf8d303a9bea882f5043ad480b5be68fac5cd94f106836480ab
SHA512936c9d61c4575eeaac953e0a4fcf40a6237ea77c7884aecf19aa51c801c41eb8f004b65c4313f1adf61d68b9d3e2b1815edc602222125340f3217735912ba010
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84
-
Filesize
409KB
MD5f56387639f201429fb31796b03251a92
SHA123df943598a5e92615c42fc82e66387a73b960ff
SHA256e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c
SHA5127bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968