Resubmissions
27-09-2024 11:31
240927-nmra8asgnd 1027-09-2024 11:30
240927-nl85mszgmr 1027-09-2024 11:19
240927-ne7y1asejg 1027-09-2024 11:11
240927-nagk9azckj 10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-09-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe
Resource
win11-20240802-en
General
-
Target
4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe
-
Size
1.8MB
-
MD5
73acb4cc181aca9525ab9f599500b9ca
-
SHA1
46a29f8b0e10003f85a8eae8a46473d0344650df
-
SHA256
4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2
-
SHA512
f84e777e3591e00a8c7ac53ad47554d100aec16f19e143dd69447cd2d3872975c5c673f2ab1a8c66a164d0dec73d8876a7d9064386eb90c0474e55c2187ce5c0
-
SSDEEP
49152:yndcjiRsr7EcYYIpTdp08efz7c2QL7nqIGg0HlpI4:eZR66TdWfXc2aTDYI
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
95.179.250.45:26212
Extracted
lumma
https://reinforcenh.shop/api
https://stogeneratmns.shop/api
https://fragnantbui.shop/api
https://drawzhotdog.shop/api
https://vozmeatillu.shop/api
https://offensivedzvju.shop/api
https://ghostreedmnu.shop/api
https://gutterydhowi.shop/api
https://lootebarrkeyn.shop/api
Extracted
redline
@LOGSCLOUDYT_BOT
65.21.18.51:45580
Extracted
stealc
default2
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
default
http://91.202.233.158
-
url_path
/e96ea2db21fa9a1b.php
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
xworm
5.0
188.190.10.161:4444
TSXTkO0pNBdN2KNw
-
install_file
USB.exe
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3820-475-0x00000000003D0000-0x00000000003FE000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/4224-44-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x000100000002aa0b-135.dat family_redline behavioral1/memory/3272-141-0x0000000000400000-0x00000000004DE000-memory.dmp family_redline behavioral1/memory/3580-145-0x00000000000F0000-0x0000000000142000-memory.dmp family_redline behavioral1/memory/2416-355-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x000100000002aa49-396.dat family_redline behavioral1/memory/2832-414-0x00000000006B0000-0x0000000000702000-memory.dmp family_redline -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3820-804-0x0000000007600000-0x0000000007720000-memory.dmp family_stormkitty -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f31cf3915.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09414a3f73.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc050681f1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d4fbe54bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1064 powershell.exe 776 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09414a3f73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09414a3f73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f31cf3915.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d4fbe54bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f31cf3915.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc050681f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc050681f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d4fbe54bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Executes dropped EXE 35 IoCs
pid Process 4208 axplong.exe 5060 gold.exe 2116 12dsvc.exe 3024 Nework.exe 2756 Hkbsse.exe 3596 p1SagEjXDm.exe 3580 Q2SPkteWHK.exe 2380 stealc_default2.exe 1872 needmoney.exe 3332 stories.exe 2992 stories.tmp 548 gerdaplay3se.exe 4316 penis.exe 2660 crypted.exe 2148 svchost015.exe 2876 LummaC222222.exe 2832 newbundle2.exe 1916 rstxdhuj.exe 1936 cccc2.exe 3812 3f31cf3915.exe 3524 1d4fbe54bc.exe 928 skotes.exe 2328 neon.exe 1136 dc050681f1.exe 2760 09414a3f73.exe 1412 e461853836.exe 5376 axplong.exe 948 Hkbsse.exe 1676 skotes.exe 5464 NetSup_Buil2d.exe 5752 neon.exe 4028 neon.exe 5104 axplong.exe 5128 Hkbsse.exe 1996 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine 3f31cf3915.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine 1d4fbe54bc.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine 09414a3f73.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine dc050681f1.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine skotes.exe -
Loads dropped DLL 6 IoCs
pid Process 2992 stories.tmp 2992 stories.tmp 2992 stories.tmp 2380 stealc_default2.exe 2380 stealc_default2.exe 5540 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ylrdnrwcx = "C:\\Users\\Admin\\AppData\\Roaming\\Ylrdnrwcx.exe" rstxdhuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\3f31cf3915.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000354001\\3f31cf3915.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\1d4fbe54bc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000355001\\1d4fbe54bc.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc050681f1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000023001\\dc050681f1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\09414a3f73.exe = "C:\\Users\\Admin\\1000026002\\09414a3f73.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\e461853836.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000028001\\e461853836.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Microsoft\Windows\CurrentVersion\Run\neon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\neon.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000100000002aa70-694.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2440 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe 4208 axplong.exe 3812 3f31cf3915.exe 3524 1d4fbe54bc.exe 928 skotes.exe 1136 dc050681f1.exe 2760 09414a3f73.exe 5376 axplong.exe 1676 skotes.exe 5104 axplong.exe 1996 skotes.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5060 set thread context of 4224 5060 gold.exe 82 PID 2116 set thread context of 3272 2116 12dsvc.exe 88 PID 1872 set thread context of 2148 1872 needmoney.exe 103 PID 2660 set thread context of 2416 2660 crypted.exe 104 PID 1936 set thread context of 1520 1936 cccc2.exe 116 PID 2328 set thread context of 5288 2328 neon.exe 149 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File created C:\Windows\Tasks\axplong.job 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File created C:\Windows\Tasks\skotes.job 1d4fbe54bc.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4860 5540 WerFault.exe 156 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d4fbe54bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc050681f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09414a3f73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e461853836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gerdaplay3se.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q2SPkteWHK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language penis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newbundle2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NetSup_Buil2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p1SagEjXDm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC222222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rstxdhuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cccc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12dsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language needmoney.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f31cf3915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 924 cmd.exe 5248 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133719103171636495" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-661032028-162657920-1226909816-1000\{44641B8A-9DAE-491C-B2B2-06E700A30848} chrome.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5248 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3820 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe 2440 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe 4208 axplong.exe 4208 axplong.exe 2380 stealc_default2.exe 2380 stealc_default2.exe 2992 stories.tmp 2992 stories.tmp 4316 penis.exe 3580 Q2SPkteWHK.exe 3580 Q2SPkteWHK.exe 3580 Q2SPkteWHK.exe 3580 Q2SPkteWHK.exe 3580 Q2SPkteWHK.exe 3580 Q2SPkteWHK.exe 2380 stealc_default2.exe 2380 stealc_default2.exe 2416 RegAsm.exe 2416 RegAsm.exe 2416 RegAsm.exe 2416 RegAsm.exe 2416 RegAsm.exe 3812 3f31cf3915.exe 3812 3f31cf3915.exe 1064 powershell.exe 1064 powershell.exe 1064 powershell.exe 2832 newbundle2.exe 2832 newbundle2.exe 2832 newbundle2.exe 2832 newbundle2.exe 3524 1d4fbe54bc.exe 3524 1d4fbe54bc.exe 2832 newbundle2.exe 2832 newbundle2.exe 928 skotes.exe 928 skotes.exe 776 powershell.exe 776 powershell.exe 3820 InstallUtil.exe 2328 neon.exe 2328 neon.exe 2328 neon.exe 1136 dc050681f1.exe 1136 dc050681f1.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe 3820 InstallUtil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1412 e461853836.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4316 penis.exe Token: SeBackupPrivilege 4316 penis.exe Token: SeSecurityPrivilege 4316 penis.exe Token: SeSecurityPrivilege 4316 penis.exe Token: SeSecurityPrivilege 4316 penis.exe Token: SeSecurityPrivilege 4316 penis.exe Token: SeDebugPrivilege 3580 Q2SPkteWHK.exe Token: SeDebugPrivilege 2416 RegAsm.exe Token: SeDebugPrivilege 3820 InstallUtil.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 2832 newbundle2.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 3820 InstallUtil.exe Token: SeDebugPrivilege 2328 neon.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2992 stories.tmp 1412 e461853836.exe 1412 e461853836.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1412 e461853836.exe 1412 e461853836.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe 1412 e461853836.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3820 InstallUtil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 4208 2440 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe 78 PID 2440 wrote to memory of 4208 2440 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe 78 PID 2440 wrote to memory of 4208 2440 4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe 78 PID 4208 wrote to memory of 5060 4208 axplong.exe 79 PID 4208 wrote to memory of 5060 4208 axplong.exe 79 PID 4208 wrote to memory of 5060 4208 axplong.exe 79 PID 5060 wrote to memory of 2552 5060 gold.exe 81 PID 5060 wrote to memory of 2552 5060 gold.exe 81 PID 5060 wrote to memory of 2552 5060 gold.exe 81 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 5060 wrote to memory of 4224 5060 gold.exe 82 PID 4208 wrote to memory of 2116 4208 axplong.exe 83 PID 4208 wrote to memory of 2116 4208 axplong.exe 83 PID 4208 wrote to memory of 2116 4208 axplong.exe 83 PID 4208 wrote to memory of 3024 4208 axplong.exe 86 PID 4208 wrote to memory of 3024 4208 axplong.exe 86 PID 4208 wrote to memory of 3024 4208 axplong.exe 86 PID 2116 wrote to memory of 4172 2116 12dsvc.exe 87 PID 2116 wrote to memory of 4172 2116 12dsvc.exe 87 PID 2116 wrote to memory of 4172 2116 12dsvc.exe 87 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 2116 wrote to memory of 3272 2116 12dsvc.exe 88 PID 3024 wrote to memory of 2756 3024 Nework.exe 89 PID 3024 wrote to memory of 2756 3024 Nework.exe 89 PID 3024 wrote to memory of 2756 3024 Nework.exe 89 PID 3272 wrote to memory of 3596 3272 RegAsm.exe 90 PID 3272 wrote to memory of 3596 3272 RegAsm.exe 90 PID 3272 wrote to memory of 3596 3272 RegAsm.exe 90 PID 3272 wrote to memory of 3580 3272 RegAsm.exe 91 PID 3272 wrote to memory of 3580 3272 RegAsm.exe 91 PID 3272 wrote to memory of 3580 3272 RegAsm.exe 91 PID 4208 wrote to memory of 2380 4208 axplong.exe 92 PID 4208 wrote to memory of 2380 4208 axplong.exe 92 PID 4208 wrote to memory of 2380 4208 axplong.exe 92 PID 4208 wrote to memory of 1872 4208 axplong.exe 94 PID 4208 wrote to memory of 1872 4208 axplong.exe 94 PID 4208 wrote to memory of 1872 4208 axplong.exe 94 PID 2756 wrote to memory of 3332 2756 Hkbsse.exe 95 PID 2756 wrote to memory of 3332 2756 Hkbsse.exe 95 PID 2756 wrote to memory of 3332 2756 Hkbsse.exe 95 PID 3332 wrote to memory of 2992 3332 stories.exe 96 PID 3332 wrote to memory of 2992 3332 stories.exe 96 PID 3332 wrote to memory of 2992 3332 stories.exe 96 PID 2992 wrote to memory of 548 2992 stories.tmp 97 PID 2992 wrote to memory of 548 2992 stories.tmp 97 PID 2992 wrote to memory of 548 2992 stories.tmp 97 PID 4208 wrote to memory of 4316 4208 axplong.exe 98 PID 4208 wrote to memory of 4316 4208 axplong.exe 98 PID 4208 wrote to memory of 4316 4208 axplong.exe 98 PID 4208 wrote to memory of 2660 4208 axplong.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe"C:\Users\Admin\AppData\Local\Temp\4bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Roaming\p1SagEjXDm.exe"C:\Users\Admin\AppData\Roaming\p1SagEjXDm.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Users\Admin\AppData\Roaming\Q2SPkteWHK.exe"C:\Users\Admin\AppData\Roaming\Q2SPkteWHK.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe"C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\is-KN2I9.tmp\stories.tmp"C:\Users\Admin\AppData\Local\Temp\is-KN2I9.tmp\stories.tmp" /SL5="$60108,3777639,56832,C:\Users\Admin\AppData\Local\Temp\1000065001\stories.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe"C:\Users\Admin\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -i7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe"C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\file1.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:5500 -
C:\Windows\SysWOW64\rundll32.exerundll32 file1.dll,x6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 5207⤵
- Program crash
PID:4860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\1000349001\cccc2.exe"C:\Users\Admin\AppData\Local\Temp\1000349001\cccc2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:412
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000354001\3f31cf3915.exe"C:\Users\Admin\AppData\Local\Temp\1000354001\3f31cf3915.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\1000355001\1d4fbe54bc.exe"C:\Users\Admin\AppData\Local\Temp\1000355001\1d4fbe54bc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Users\Admin\AppData\Local\Temp\1000023001\dc050681f1.exe"C:\Users\Admin\AppData\Local\Temp\1000023001\dc050681f1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Users\Admin\1000026002\09414a3f73.exe"C:\Users\Admin\1000026002\09414a3f73.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\1000028001\e461853836.exe"C:\Users\Admin\AppData\Local\Temp\1000028001\e461853836.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd66b8cc40,0x7ffd66b8cc4c,0x7ffd66b8cc587⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3200,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:27⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3428 /prefetch:37⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1884,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3568 /prefetch:87⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2656,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3708 /prefetch:17⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2664,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3788 /prefetch:17⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4088,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4328 /prefetch:87⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4544,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4548 /prefetch:87⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4828,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4556 /prefetch:17⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3944,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3772 /prefetch:17⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4884,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4948 /prefetch:87⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,13362065341432982655,3240791826971425331,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5032 /prefetch:87⤵
- Modifies registry class
PID:1120
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:924 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 105⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5248
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"5⤵
- Adds Run key to start application
PID:5872
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5752 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'InstallUtil.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5580
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:5972
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:6008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5376
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵
- Executes dropped EXE
PID:948
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 5540 -ip 55401⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5104
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵
- Executes dropped EXE
PID:5128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1996
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3.1MB
MD564aae911240760abac72df65ba0e5716
SHA117ba9eb66d8e2f17a33f2cad0635296699280a4f
SHA256fa489e32634a897ca51c5ec9048e470a1e2e87fb192756f0b0d0728599a0c3b3
SHA512465d920bfa4a410e1f666829ea440164fd584fca338ec25ba9d4bf0f4d95fa573f79dbc7408b446b5890783f0527956375044a2bddd50806bac5925a48672c1a
-
Filesize
649B
MD50107d0fb107bc66f089e775a68b0a753
SHA15791ec8eea2f2d4cd587050830bd6380f43c715d
SHA256fd96127148baa6857fee00a0a47042d4072520315f28b52184be1f801c71b320
SHA512f25fb9035098e81a30255640bf9eafa637def0335a41fd36a4bffbc4213a3d94846836eb1a8574f5b9db33671b03a58be24d39a840925ba2331a8c5b86aa6471
-
Filesize
288B
MD55bebd4001273a1b092f9ec9aab4d1bf2
SHA1df77830bf0e9a91b589b629116951249227f21d0
SHA256e45598f068471bb71b3641dc9142fb39c41e53297b9503ca6f6c76cf34856347
SHA512afb8dea1843e4226f8273279e69ce04b8084ec63471d69dda1f0dabf0643a574c7172630577a630f1a6a0f4fccd6bf3e5c36c25a4aeb49a0db225ef7a50c17a4
-
Filesize
576B
MD5acb8b120e4a90e22fa41defa1c68a214
SHA1a3588587136e3189c5547f0e44e1dfd1fc296ef5
SHA256e3847af41cd7654fa112f73aec3155ebd3c1c8aa996003e0e0cce7add76bcfa3
SHA5128c71f4d001099e63c14e44da46eac57f66add1380e3a6a379d12065b53bfbc6715fc89d787632ceed17baea656205091e8b76e1461d15398b53c42f3f097a791
-
Filesize
4KB
MD5ee1ff604d3ce209e480f2ee8118e13be
SHA1fb8bce1e13eeaf652f456425f52d99cfe65e0c1d
SHA2568a277f32a3c314e273b0461e1b93c8381396ea46402e0f747ba2d67e9987c89a
SHA51293bab6d08a0cd716833b969b2a3fd52a01710e97f7eb45c104a8a937630b948a3d4b2d1bb68ef65b17a03cb55d827839d5d8de70b0b5f3ab36d3ee7bbf4c475c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
680B
MD53ebbb20864fc9424c6fdb828a2270660
SHA15427130cf89c1eecb534292aa489775936639ad5
SHA25639ae91a18237ad7dd1a5dc58a5dfeb16dbb586141da29f96399e690638bbf708
SHA512fec807859f603291d58b709a2396d8cf6395ed19aee9d50d28deb9aaeafc8d763b6766c908ce212a0e055f8623a6a220fdb57d0322fd0dd6f3aba49a71578c39
-
Filesize
680B
MD5fd5548efe345e14eb1c966b3d6d75cba
SHA1c591f9aa32ac5586f10114ad230e8c020d99d01f
SHA256f8c58c93f5b25427aba1b9134f07bf1d899bfe8ec7f1db27aa15c33131563163
SHA512e49c4bcd115f616e3fa6673796c8612baeb5eeee803e381273ce6b6a4935c77b74bad0882144e3a49f6125a128d00a982d4f2130ec4c1730c5adb6cafdc7579c
-
Filesize
684B
MD54fd3acc1f1f70fa1450ec1eec3dc8c6a
SHA1f6494206ac2643510a5d437440424654c54e3b68
SHA25690f124957b2a7fdd35c8b59df0fe84f15aeb506378292cfcc4a87b207ce0e07e
SHA51207ddb2cb121a175d119e3281c1e2ca9ff01a94451ef193fd9fc940dc0feb6b321a98f60d34e2bfb69e6543e032109dc2fe17b97c76315ee2271827bb85911f2b
-
Filesize
520B
MD53d22e6e30256a8b7f553a71f1a58bda4
SHA146ae77e91cc478fa410063eeda3e2bb15fc30acb
SHA256fe70ad0b4a3b7cfd985ea894fea6d3eeece71d11a4bead247173afcbd079789c
SHA51276adc9842d319256a77ecb21dbeb8805aa4944492095b5a5950b1229853923492d7345f5fcf29baf901da472f340aee3cd3bc6bb5bf47d19b885cf4ff2e3e2c0
-
Filesize
9KB
MD5225fcfea549ed2781702721773d0b198
SHA107df003eaf1b238fc272d06298835dd9eedcb0ba
SHA2560d8eda5bf7a9999046cb3aed49eeafe7b578494c7a2c1ddf1a8639d76d3287e6
SHA5129a5227526350c3f758b0987d993e1b42535e859e405ce9a8b1bb18703bdcc90b8e0c350e91f3e0f7298ada153643fdde22a33605a9bf71c30a600edde561acb5
-
Filesize
9KB
MD52658cda9abaf27eaa80ea58f57118ecf
SHA15d03173c20b48f08976a184531d97635bd1569b6
SHA256a9f753a8fbe350cf0bb80aaac03a473d79d4e0986ceb403467b6811f93952a55
SHA51273da976d3cbb7f0c927cb7bced5208dc126edbaac4e9e1e79b5b53db7b62a8840980d6b7cb376bf37f8d910dc0622e6d14e333249d409528e37e6986679951bb
-
Filesize
10KB
MD53cbd5aba01f0f11676bdd147ec49159f
SHA1abcb3ccae35aadf94a79489c09dbfab028702fd6
SHA256399abca12e4068d68a9607e8558c81c4ccdc87244c271ecb760b1015514ce86c
SHA512e776b1248a55aabafb0122f21afff544c144cc175e73ccc77db25ba31ecbde58a92f092d4e47de42b1bcc0b0804c908376e92cbd5c08276e71eb338332da7886
-
Filesize
10KB
MD5d70c2bd65d0f462b26df87d825a4afa6
SHA1cedfabe867cdf210c1aa283d65409fb553ebe16d
SHA2563758f9367f78bcf495c4e0dcdc6fa03adc54708822befd349be55a81352844e5
SHA512caf1a1ca30cc5b1312dd1494653d06ba90a2f3d7edcb25c0c428447e98adbae34b4d97a96747287c94b9fe784c25f4807565798028411398af3855b3ac2cef22
-
Filesize
10KB
MD5bf06b000f7e217b8e4543004a2062019
SHA1d5056cfd767bc5cceebd9abc65e55fc5e7c66769
SHA2561e58f489a59390f150e7ac28270a921da80b45bfeced3436eafd4ad07b1d3ffe
SHA512d948e87ac0e1b6a1b798805262a7c77c51b60670a3537583425f0c91f7dcb96628db933d1ee05801f2714e7ab6e2c011f036aeccd475de1b767668233b556235
-
Filesize
10KB
MD5e101430cb7c32870a8c757306c38a95b
SHA186ea85ec67b9dc8d9e32ca38a6a979ee03248c82
SHA2561279fb82e25938bb15ccc85ff4e96d685dda39101636579fcee5044ee7ab82b9
SHA512fee8aa5db71f5db7e9dfa97f9a39ea8fbed01bd750be83ae5a19acfe2656639badaa5223b44254819153264803575d9496db2b17f2fce9e3014c5944f8640ca3
-
Filesize
10KB
MD5468892abf32b127ede8cf272188fe4d5
SHA1d60d0e158da01c018b7af46cd2bf0f48681a686d
SHA2567338ac99252663d1ae7132726ab1643a7309b2ec7d5b823f07f460a0cb975cb0
SHA51292db241afd826e9e5373c825b0f29ee00efb173cf506ab5bdb2614862949c192d32b57223f1da6e304d75d7a472ccc295e70ef1e98e5449a70f30a027b8bf16c
-
Filesize
13KB
MD533b4ab5707aa74903250b1386716c0cd
SHA1978a5a8b7cf66fb4d30be2af88bab017042f0b67
SHA256af9ce55e71466a1e95b3599cc2efc499112517c36062aae649153c73fd99c1d1
SHA51224636913ce037116b16f5c235fdc5c215f9b596d15bbcc189cd8bba1d0bd38ff1c1f132158a362607ed404c159cd6965cccad65e92a12522f5896f6a011ea6c3
-
Filesize
212KB
MD515acc4b66b264291f7c5687255f3776c
SHA1d9f63cc9a1988c4bc8af83c7e1e5fa12ed7f49db
SHA25612c2fc97fc1c14584d498bc467bd794bd14b38f9ea4778c9c24bb2bb46d59afd
SHA512b9a5a1eea104f5cd8a86ca88e4f64cccdb87696058c2d774dea20604122cc928ae7e4466d3ba6b7ec5a6cca25b43c2e9df0a91b8d064aa7fb346db584bb558fa
-
Filesize
212KB
MD5b9ed12ca3aaa0309af981fef0b156925
SHA1412c5b6ad4aca3cc2fc33570ed6a7af13460190f
SHA256137fc184202331f9b3e17308889b692ca60655e3974280990a8d54c33030d67b
SHA512cb5e3023f54d5fdbdc4c4bf30ee73486d6e85b63842cf036a46894fa43af27f38b7f44d5dd3727cd79998d5ecb9e136e6b15425bd39d11f916cd9df3836a5159
-
Filesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
Filesize
18KB
MD5b9478b6f34e95520fe2b86e2357919e0
SHA13f944087a6cbf1bc3b71328fae90798dd4b85763
SHA25669f713adc6baabc88ab22ffcede583ddc81d8b5ebbc6b056fcc97c1e0644aa6d
SHA512e9db6532bf6b1cf089ebac594e292e78ccca28e7e78f8072cdc42d94d0952530a80f8b337e2bb73b6f4855baf5248c089cda9994c407820854475bdb735fdd1f
-
Filesize
312KB
MD5389881b424cf4d7ec66de13f01c7232a
SHA1d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78
SHA2569d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746
SHA5122b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96
-
Filesize
882KB
MD584263ab03b0a0f2b51cc11b93ec49c9f
SHA1e6457eb0e0131bec70a2fd4d4a943314f0bd28d4
SHA2567d6e4e01c452dd502361640ee095e2bee35e3f55fd11edc9e94c3580d2c132b5
SHA512db35a02345b5166077e300524675c523a8b4082fa62fc151c0797141348cae5e173eeaec5ad1e95556e048ea6ed34a78b90b1184420557c53cd91f351417ebb2
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
1.1MB
MD555ad212ef14e1d3a99251ba84d4c3497
SHA15f7127f6f859cae4b9d19f700196cb207a6ddd87
SHA256c4ef6abb3459faf2b1c99b9ebdb68e27bda102f71df30c1e773bf737cc2d9f33
SHA5128199e1b9e83ea7f028c6f851b886d3cac829c533489c5e3292bc74b94df2900c7e4168dadec1f4ac0e12bff8a08679433586f79b719a240bb94cb816df5b5c76
-
Filesize
3.9MB
MD528235267b2a3dd75e1e773ada90e0dac
SHA1166000e3901999dfc8709cb8628014acb7992256
SHA2569c265bab6183255bc0e0700ec74fbd30cbbf7b6a4f3196ef4a82a517b2d41ce5
SHA5121f4a35448e9498cd30585bacbbdde37f4f43e596c9356f224bd4aa10083ae4aa48933ccbd555f228732284a713f7afa2bc356ecc6e9c783bd24cfda4d077da64
-
Filesize
187KB
MD57a02aa17200aeac25a375f290a4b4c95
SHA17cc94ca64268a9a9451fb6b682be42374afc22fd
SHA256836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e
SHA512f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6
-
Filesize
4.1MB
MD57fa5c660d124162c405984d14042506f
SHA169f0dff06ff1911b97a2a0aa4ca9046b722c6b2f
SHA256fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2
SHA512d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c
-
Filesize
409KB
MD5a21700718c70ec5e787ad373cb72a757
SHA1027554ab5ff3245e7617f3b83d6548bf7919f92e
SHA25687e639ecc7704cb5e29f1ebb1d8ade3ae863aaa2505a37b28f2d45121da500c6
SHA512ea292a5442d9fe536e650a2bc5142dd3aef79c66930243897e0e87c57915f0a54e45e03e58daffb473f85fe10b963d4670050bff5ab3f91121d21d463e25659b
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
352KB
MD52f1d09f64218fffe7243a8b44345b27e
SHA172553e1b3a759c17f54e7b568f39b3f8f1b1cdbe
SHA2564a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2
SHA5125871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
963KB
MD51ef39c8bc5799aa381fe093a1f2d532a
SHA157eabb02a7c43c9682988227dd470734cc75edb2
SHA2560cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4
SHA51213a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682
-
Filesize
359KB
MD56b470f7251aa9c14d7daea8f6446e217
SHA1a256c54d4dd7e0a7a1582d8fdfef5807bc3c4af4
SHA2568b9097b795d42c49c3b2c560714226361671a3f1d711faa9aeaee20e22e7095f
SHA512fdc553c9d2ff19343dd99b0b34c875752df4fa0cbd494096aeb51d859bd102448f1a5043a53a808045ae52077f180546a134b1aa69db4dc04aff2610fadeaca4
-
Filesize
1.8MB
MD5fb6e05d5c008f119efcdeefe60d6e924
SHA176fca4e5da3cff2eee99634b2f442850000ce47f
SHA256b01a2006b9ca98754e6c54ea5940b99dba53720fd9f0b83a4024a7061723f90d
SHA512dfbf12f37b792017329c03fbaec55d4a2cd3c4735defe551d25b91468ed20a2413efcd5c762b2ea68b64028ae895e547141140589500f7156468652696bb342a
-
Filesize
1.8MB
MD5712d279ab30924feb8050a1aeae79f66
SHA1efeb59fe2bdd1122fbc1abdbbf4da237fc9d9622
SHA25687f7fedd903ebbb8621dc7d357add628a5b58bf3a47e32b2d45da49ad54684aa
SHA512e0470d2e8f0050796c6044fb15a24b2dd64af1e03f0ae748d7a1cd8901ba9635e39275fb4cff88f717659f2125e1fffdf308f39bc71ed8c0a9ac21773fd2241d
-
Filesize
3.5MB
MD5b3fd0e1003b1cd38402b6d32829f6135
SHA1c9cedd6322fb83457f56b64b4624b07e2786f702
SHA256e4a36be98f730d706d2ca97a5d687329a1cc7d4848daf698b7e21b6b9b577f31
SHA51204692e0f80a75f78b533677cefe3db6607108abf19963d88e231925cfa13f1ec054811aebe53c82d238e732a999cd8d176107d50cf2ea5694d4177cbfd3b30f1
-
Filesize
1.8MB
MD573acb4cc181aca9525ab9f599500b9ca
SHA146a29f8b0e10003f85a8eae8a46473d0344650df
SHA2564bc8ab389044aabd25719e924300530feddae8efa8a485cbfd67de8f347132f2
SHA512f84e777e3591e00a8c7ac53ad47554d100aec16f19e143dd69447cd2d3872975c5c673f2ab1a8c66a164d0dec73d8876a7d9064386eb90c0474e55c2187ce5c0
-
Filesize
2.6MB
MD548d3871fe96d9589ea77e2be0adfa4c5
SHA19c4ac1f16f9d6ef6ed4fe15a9a34a8666bc5a34b
SHA2561744714e3873dedbd522830d98b9ce8a38c378338ef081b58d6199ec190e5528
SHA5129a6809453490ad9818491658472c10a879ce543c7cdb3c62f60ea04031cd1f11562ce5f509bdc78894e3ac4c05728b9261904385ff00f28a5d887c9b223d70ce
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
692KB
MD502bf852d3e218f0bebd47cd9fb88f71c
SHA18462e25c948c18846056b6107773f5706c03bdd9
SHA256849c2ae0fa48cf208f44452ec7b0c0d1ba4092432163cac491ba0281d63e7e69
SHA512266d7e444145bbd3530bf6f2371955c96b07d9c9a3f5647624f63b983145b1828923f7bff70af3aa0046fba8bb9cf67ae207f5ca04c30740b4c138549aaceea6
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
114KB
MD57db6cef80eafac6e18a510ab209edfe2
SHA13ee98c48386788861bf1d99043e6836df4763308
SHA2564db72158cdd9735367a53c79b929d7e93d2778c970e883faa1b37f741ae01bed
SHA51278e958b8a7b712349471879d6449f6e9c165511942f71093259cd139f6709f08498bb664562552ba2aa3e218bc3f396f43f26360ca646f1999573772a5b63c2d
-
Filesize
5.0MB
MD53334a482f7268e33522e6ff471b72588
SHA1f448a4226641d39aa179786e664f318bbfb78e10
SHA256bfe468f6627db30eb3cc0ddcd48ed57f8ce2c64ce38f799117c4394503016210
SHA512a61f757df7c6b627153bea2ac6a5eddd4ba10bb35f3f57a97b3c877bfb9e48e98099f53736a8c1105f79d421fbba0e0dc7b585463de97b11bca8cab62d4191f3
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-661032028-162657920-1226909816-1000\76b53b3ec448f7ccdda2063b15d2bfc3_397a1569-0be2-47f2-b50f-ef09823a05f8
Filesize2KB
MD575ad04dce14ebf4fed86b491777ce6f2
SHA1bf1e260b0b0c66398921d8209373e99cde2eae91
SHA2563a3c5c4dc739b1b7698fb0af0ad96f6aaeeff93305aaf7278ab3d7050e153392
SHA51279ab36d4b78def6a4483f2b4b806b2fbe3429f964c317bc3d8e2c89fc7e782e67440e57427fbbf97c4a9c742901e978fedaf73c54395f0c110d1109bc39e5ed6
-
Filesize
304KB
MD54e60f3fd76d9eab244f9dc00f7765b0b
SHA11a154d6e837e7105c551793131cde89f157c4330
SHA256d6945846cc23c01b9c9ad2b97d35b5a14c01f1a4cc2ec651a596f06777ba4fec
SHA51244727e25781f448579ac35aab94aff550ed9fe5ac58d95bd394569c62892dc78216ac687baa43cef66187ebe629f5dd9cd63ea274222d11dbef3440ec4d7f77a
-
Filesize
356KB
MD5a3ef9920a91b891837705e46bb26de17
SHA19cfbcd0f46ec86fb57d3d6d74a064f9098adf117
SHA256171cef885f6c285e995ce3ec5960c5ea4e4ed049cec362745058fee39e4136cc
SHA512c65e91091b95c3aba0af7df4ed6543d26bcb5b54d6fab82f9d2ac1ba156f475f98124a1a0e8851d69be23b1dc945c76c075cd32515203273260802e1224dbd6e
-
Filesize
2KB
MD5609751755cb117a58527f3aac011f23e
SHA18dd2355cc745fd211ff6fa4d9a41526a98dc3095
SHA256c67cece5b6c3e35d57d91bd7d22c749c3aba0078964c237e734ac50b34453d22
SHA5123125254980504edb06b9bc515f5dcb6fa34876ab4007eefa0d794776859ccde52ffdba8a12542872a0605d55790122142c445c89d02650ba9a0dbd9eb2485b78
-
Filesize
2KB
MD53f48117780d6190feb7383cea1399ae3
SHA1a3ba0fa5df3b7ec81bc31678f90af81f45421de9
SHA25682e3e688774a4dc914ee9af67a8ce4924553769b221dca16ed06d78b4cf3c84c
SHA512df5d6bc4502bf168d5e0fad49942a4e5854c61633a736eb1467ddb4183388e5c151dacd6f6981ace33b5ce207372595c97fde50f8b14349d07348388b23f8bbe