Analysis
-
max time kernel
160s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe
Resource
win10-20240404-en
General
-
Target
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe
-
Size
1.8MB
-
MD5
6a064f5aac429225163d47454073f334
-
SHA1
35d03f5ccf0376adc6f804f4b77489811b974739
-
SHA256
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f
-
SHA512
8198d39c76eddedbc4bc3ceff7a36df35c000156e4ee1bea99844668c5ef261955a7d640af760d57d9d51ff792f7da7f92698b09553fc29d2d8537fb189b4224
-
SSDEEP
24576:EkA4GZU/RW7A17ebnjNdlgVQLF5MRZpzIyewaA26Ebp5Nfih9wAX7t9oe25AD0AI:tAJOAQ6z/GpzIXXc9/XQdA+Xx
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
136.244.88.135:17615
Extracted
redline
@OLEH_PSP
65.21.18.51:45580
Extracted
stealc
default2
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
default
http://91.202.233.158
-
url_path
/e96ea2db21fa9a1b.php
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://chaptermusu.store/api
https://possiwreeste.site/api
https://underlinemdsj.site/api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/1296-41-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1296-43-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1296-48-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1296-47-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1296-46-0x0000000000400000-0x0000000000452000-memory.dmp family_redline C:\Users\Admin\AppData\Roaming\h1MzlCqbXL.exe family_redline behavioral1/memory/2480-91-0x00000000010F0000-0x0000000001142000-memory.dmp family_redline behavioral1/memory/2776-292-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2776-291-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2776-288-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2776-286-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2776-294-0x0000000000400000-0x0000000000452000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe family_redline behavioral1/memory/696-323-0x0000000000840000-0x0000000000892000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Waters.pifdescription pid process target process PID 5080 created 1192 5080 Waters.pif Explorer.EXE PID 5080 created 1192 5080 Waters.pif Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exef13de137cc.exee5a410d79f.exeskotes.exe8d9881a82b.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f13de137cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5a410d79f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d9881a82b.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f13de137cc.exee5a410d79f.exeskotes.exe844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exe8d9881a82b.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f13de137cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5a410d79f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f13de137cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5a410d79f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d9881a82b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d9881a82b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Drops startup file 3 IoCs
Processes:
cmd.exeEwpeloxttug.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DriverUtil.vbs Ewpeloxttug.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe -
Executes dropped EXE 32 IoCs
Processes:
axplong.exegold.exe12dsvc.exe0iguQbHBLx.exeh1MzlCqbXL.exeNework.exeHkbsse.exestealc_default2.exeneedmoney.exepenis.exesvchost015.execrypted.exenewbundle2.exejavumarfirst.exerstxdhuj.exef13de137cc.exee5a410d79f.exeskotes.exelummetc.exeprocessclass.exesplwow64.exenum.exeWaters.pif8d9881a82b.exeEwpeloxttug.exeCompleteStudio.exeskotes.exe2.execontext.exeWaters.pifservice123.exeservice123.exepid process 2620 axplong.exe 2700 gold.exe 112 12dsvc.exe 2156 0iguQbHBLx.exe 2480 h1MzlCqbXL.exe 840 Nework.exe 2552 Hkbsse.exe 2168 stealc_default2.exe 2692 needmoney.exe 2484 penis.exe 1796 svchost015.exe 1788 crypted.exe 696 newbundle2.exe 2340 javumarfirst.exe 1700 rstxdhuj.exe 6368 f13de137cc.exe 6804 e5a410d79f.exe 7020 skotes.exe 3032 lummetc.exe 3144 processclass.exe 3928 splwow64.exe 4364 num.exe 5080 Waters.pif 5412 8d9881a82b.exe 5600 Ewpeloxttug.exe 1792 CompleteStudio.exe 4764 skotes.exe 992 2.exe 2364 context.exe 2816 Waters.pif 4408 service123.exe 5672 service123.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe8d9881a82b.exe844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exef13de137cc.exee5a410d79f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine 8d9881a82b.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine f13de137cc.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine e5a410d79f.exe -
Loads dropped DLL 58 IoCs
Processes:
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exe12dsvc.exeNework.exeneedmoney.exeHkbsse.exestealc_default2.exeWerFault.exee5a410d79f.exeskotes.execmd.exeWerFault.exeWerFault.execmd.exejavumarfirst.exeservice123.exeservice123.exepid process 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 112 12dsvc.exe 112 12dsvc.exe 2620 axplong.exe 840 Nework.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 2692 needmoney.exe 2620 axplong.exe 2620 axplong.exe 2552 Hkbsse.exe 2552 Hkbsse.exe 2168 stealc_default2.exe 2168 stealc_default2.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 6440 WerFault.exe 6440 WerFault.exe 6440 WerFault.exe 6440 WerFault.exe 6440 WerFault.exe 2620 axplong.exe 6804 e5a410d79f.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 2620 axplong.exe 7020 skotes.exe 7020 skotes.exe 4148 cmd.exe 7020 skotes.exe 7020 skotes.exe 2620 axplong.exe 7020 skotes.exe 2620 axplong.exe 2620 axplong.exe 4468 WerFault.exe 4468 WerFault.exe 4468 WerFault.exe 4468 WerFault.exe 4468 WerFault.exe 6492 WerFault.exe 6492 WerFault.exe 6492 WerFault.exe 6492 WerFault.exe 6492 WerFault.exe 3324 cmd.exe 2340 javumarfirst.exe 2340 javumarfirst.exe 4408 service123.exe 5672 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
rstxdhuj.exeaxplong.exeskotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ylrdnrwcx = "C:\\Users\\Admin\\AppData\\Roaming\\Ylrdnrwcx.exe" rstxdhuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\f13de137cc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000354001\\f13de137cc.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\e5a410d79f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000355001\\e5a410d79f.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\num.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000113001\\num.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\8d9881a82b.exe = "C:\\Users\\Admin\\1000115002\\8d9881a82b.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 api64.ipify.org 52 api64.ipify.org 55 ipinfo.io 56 ipinfo.io 60 api.myip.com 61 api.myip.com -
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 4548 tasklist.exe 4736 tasklist.exe 3796 tasklist.exe 6432 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exef13de137cc.exee5a410d79f.exeskotes.exe8d9881a82b.exepid process 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe 2620 axplong.exe 6368 f13de137cc.exe 6804 e5a410d79f.exe 7020 skotes.exe 5412 8d9881a82b.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
gold.exeneedmoney.execrypted.exeskotes.exe2.exeCompleteStudio.exedescription pid process target process PID 2700 set thread context of 1296 2700 gold.exe RegAsm.exe PID 2692 set thread context of 1796 2692 needmoney.exe svchost015.exe PID 1788 set thread context of 2776 1788 crypted.exe RegAsm.exe PID 7020 set thread context of 4764 7020 skotes.exe skotes.exe PID 992 set thread context of 5524 992 2.exe RegAsm.exe PID 1792 set thread context of 3836 1792 CompleteStudio.exe RegAsm.exe -
Drops file in Windows directory 11 IoCs
Processes:
context.exee5a410d79f.exesplwow64.exe844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeNework.exedescription ioc process File opened for modification C:\Windows\HardlyAircraft context.exe File opened for modification C:\Windows\ViewpictureKingdom context.exe File opened for modification C:\Windows\IpaqArthur context.exe File created C:\Windows\Tasks\skotes.job e5a410d79f.exe File opened for modification C:\Windows\HardlyAircraft splwow64.exe File opened for modification C:\Windows\ViewpictureKingdom splwow64.exe File opened for modification C:\Windows\IpaqArthur splwow64.exe File opened for modification C:\Windows\BrandonBlind context.exe File created C:\Windows\Tasks\axplong.job 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File opened for modification C:\Windows\BrandonBlind splwow64.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6440 1700 WerFault.exe rstxdhuj.exe 4468 5600 WerFault.exe Ewpeloxttug.exe 6492 1796 WerFault.exe svchost015.exe -
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeaxplong.exesplwow64.exeWaters.pifcontext.exenum.exeNework.exef13de137cc.execmd.exeRegAsm.exefindstr.exeRegAsm.exerstxdhuj.exechoice.exe2.exenewbundle2.exe0iguQbHBLx.exeRegAsm.execrypted.exefindstr.execmd.exeWaters.piftimeout.exestealc_default2.exee5a410d79f.exetaskkill.exeneedmoney.exesvchost015.execmd.exefindstr.exeRegAsm.exetasklist.exeEwpeloxttug.exepowershell.exetasklist.exepenis.exelummetc.execmd.execmd.exeskotes.exejavumarfirst.exetasklist.exefindstr.exefindstr.execmd.exetasklist.execmd.exe12dsvc.exeskotes.execmd.exe844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exegold.exechoice.exeschtasks.execmd.exe8d9881a82b.exeh1MzlCqbXL.exeHkbsse.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Waters.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language context.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language num.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f13de137cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rstxdhuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newbundle2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0iguQbHBLx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Waters.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5a410d79f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language needmoney.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ewpeloxttug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language penis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lummetc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javumarfirst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12dsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d9881a82b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h1MzlCqbXL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
stealc_default2.exejavumarfirst.exesvchost015.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 javumarfirst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString javumarfirst.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost015.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost015.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4040 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2972 taskkill.exe -
Processes:
0iguQbHBLx.exelummetc.exeRegAsm.exeRegAsm.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0f000000010000002000000020d814fd5fc477ce74425e441d8f5b48d38db6f1dd119441bc35777689bd094c030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b0640200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e003000000000000b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f007200690074007900000020000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 0iguQbHBLx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 0iguQbHBLx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 lummetc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 0iguQbHBLx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 0iguQbHBLx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 lummetc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 lummetc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5296 schtasks.exe 4636 schtasks.exe 1128 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
context.exepid process 2364 context.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exe0iguQbHBLx.exestealc_default2.exeh1MzlCqbXL.exeRegAsm.exerstxdhuj.exeRegAsm.exef13de137cc.exee5a410d79f.exeskotes.exenewbundle2.exeWaters.pif8d9881a82b.exepowershell.exechrome.exeEwpeloxttug.exesvchost015.exeWaters.pifpid process 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe 2620 axplong.exe 2156 0iguQbHBLx.exe 2168 stealc_default2.exe 2480 h1MzlCqbXL.exe 2480 h1MzlCqbXL.exe 1296 RegAsm.exe 2480 h1MzlCqbXL.exe 1296 RegAsm.exe 1296 RegAsm.exe 2168 stealc_default2.exe 1700 rstxdhuj.exe 2776 RegAsm.exe 6368 f13de137cc.exe 6804 e5a410d79f.exe 2776 RegAsm.exe 2776 RegAsm.exe 7020 skotes.exe 696 newbundle2.exe 696 newbundle2.exe 696 newbundle2.exe 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 5412 8d9881a82b.exe 3256 powershell.exe 3256 powershell.exe 3256 powershell.exe 4692 chrome.exe 4692 chrome.exe 5600 Ewpeloxttug.exe 1796 svchost015.exe 1796 svchost015.exe 1796 svchost015.exe 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0iguQbHBLx.exeRegAsm.exepenis.exeh1MzlCqbXL.exerstxdhuj.exeRegAsm.exenewbundle2.exetasklist.exetasklist.exeEwpeloxttug.exeCompleteStudio.exepowershell.exeprocessclass.exechrome.exedescription pid process Token: SeDebugPrivilege 2156 0iguQbHBLx.exe Token: SeBackupPrivilege 2156 0iguQbHBLx.exe Token: SeSecurityPrivilege 2156 0iguQbHBLx.exe Token: SeSecurityPrivilege 2156 0iguQbHBLx.exe Token: SeSecurityPrivilege 2156 0iguQbHBLx.exe Token: SeSecurityPrivilege 2156 0iguQbHBLx.exe Token: SeDebugPrivilege 1296 RegAsm.exe Token: SeDebugPrivilege 2484 penis.exe Token: SeBackupPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeDebugPrivilege 2480 h1MzlCqbXL.exe Token: SeDebugPrivilege 1700 rstxdhuj.exe Token: SeDebugPrivilege 1700 rstxdhuj.exe Token: SeDebugPrivilege 2776 RegAsm.exe Token: SeDebugPrivilege 696 newbundle2.exe Token: SeDebugPrivilege 4548 tasklist.exe Token: SeDebugPrivilege 4736 tasklist.exe Token: SeDebugPrivilege 5600 Ewpeloxttug.exe Token: SeDebugPrivilege 1792 CompleteStudio.exe Token: SeBackupPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeSecurityPrivilege 2484 penis.exe Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 3144 processclass.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeDebugPrivilege 5600 Ewpeloxttug.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeNework.exee5a410d79f.exeWaters.pifchrome.exeWaters.pifpid process 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe 840 Nework.exe 6804 e5a410d79f.exe 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Waters.pifWaters.pifpid process 5080 Waters.pif 5080 Waters.pif 5080 Waters.pif 2816 Waters.pif 2816 Waters.pif 2816 Waters.pif -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exeaxplong.exegold.exe12dsvc.exeNework.exeneedmoney.exedescription pid process target process PID 2884 wrote to memory of 2620 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe axplong.exe PID 2884 wrote to memory of 2620 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe axplong.exe PID 2884 wrote to memory of 2620 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe axplong.exe PID 2884 wrote to memory of 2620 2884 844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe axplong.exe PID 2620 wrote to memory of 2700 2620 axplong.exe gold.exe PID 2620 wrote to memory of 2700 2620 axplong.exe gold.exe PID 2620 wrote to memory of 2700 2620 axplong.exe gold.exe PID 2620 wrote to memory of 2700 2620 axplong.exe gold.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2700 wrote to memory of 1296 2700 gold.exe RegAsm.exe PID 2620 wrote to memory of 112 2620 axplong.exe 12dsvc.exe PID 2620 wrote to memory of 112 2620 axplong.exe 12dsvc.exe PID 2620 wrote to memory of 112 2620 axplong.exe 12dsvc.exe PID 2620 wrote to memory of 112 2620 axplong.exe 12dsvc.exe PID 112 wrote to memory of 2156 112 12dsvc.exe 0iguQbHBLx.exe PID 112 wrote to memory of 2156 112 12dsvc.exe 0iguQbHBLx.exe PID 112 wrote to memory of 2156 112 12dsvc.exe 0iguQbHBLx.exe PID 112 wrote to memory of 2156 112 12dsvc.exe 0iguQbHBLx.exe PID 112 wrote to memory of 2480 112 12dsvc.exe h1MzlCqbXL.exe PID 112 wrote to memory of 2480 112 12dsvc.exe h1MzlCqbXL.exe PID 112 wrote to memory of 2480 112 12dsvc.exe h1MzlCqbXL.exe PID 112 wrote to memory of 2480 112 12dsvc.exe h1MzlCqbXL.exe PID 2620 wrote to memory of 840 2620 axplong.exe Nework.exe PID 2620 wrote to memory of 840 2620 axplong.exe Nework.exe PID 2620 wrote to memory of 840 2620 axplong.exe Nework.exe PID 2620 wrote to memory of 840 2620 axplong.exe Nework.exe PID 840 wrote to memory of 2552 840 Nework.exe Hkbsse.exe PID 840 wrote to memory of 2552 840 Nework.exe Hkbsse.exe PID 840 wrote to memory of 2552 840 Nework.exe Hkbsse.exe PID 840 wrote to memory of 2552 840 Nework.exe Hkbsse.exe PID 2620 wrote to memory of 2168 2620 axplong.exe stealc_default2.exe PID 2620 wrote to memory of 2168 2620 axplong.exe stealc_default2.exe PID 2620 wrote to memory of 2168 2620 axplong.exe stealc_default2.exe PID 2620 wrote to memory of 2168 2620 axplong.exe stealc_default2.exe PID 2620 wrote to memory of 2692 2620 axplong.exe needmoney.exe PID 2620 wrote to memory of 2692 2620 axplong.exe needmoney.exe PID 2620 wrote to memory of 2692 2620 axplong.exe needmoney.exe PID 2620 wrote to memory of 2692 2620 axplong.exe needmoney.exe PID 2620 wrote to memory of 2484 2620 axplong.exe penis.exe PID 2620 wrote to memory of 2484 2620 axplong.exe penis.exe PID 2620 wrote to memory of 2484 2620 axplong.exe penis.exe PID 2620 wrote to memory of 2484 2620 axplong.exe penis.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2692 wrote to memory of 1796 2692 needmoney.exe svchost015.exe PID 2620 wrote to memory of 1788 2620 axplong.exe crypted.exe PID 2620 wrote to memory of 1788 2620 axplong.exe crypted.exe PID 2620 wrote to memory of 1788 2620 axplong.exe crypted.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe"C:\Users\Admin\AppData\Local\Temp\844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Roaming\0iguQbHBLx.exe"C:\Users\Admin\AppData\Roaming\0iguQbHBLx.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Users\Admin\AppData\Roaming\h1MzlCqbXL.exe"C:\Users\Admin\AppData\Roaming\h1MzlCqbXL.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\1000072001\javumarfirst.exe"C:\Users\Admin\AppData\Local\Temp\1000072001\javumarfirst.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 5166⤵
- Loads dropped DLL
- Program crash
PID:6492 -
C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 7885⤵
- Loads dropped DLL
- Program crash
PID:6440 -
C:\Users\Admin\AppData\Local\Temp\1000354001\f13de137cc.exe"C:\Users\Admin\AppData\Local\Temp\1000354001\f13de137cc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6368 -
C:\Users\Admin\AppData\Local\Temp\1000355001\e5a410d79f.exe"C:\Users\Admin\AppData\Local\Temp\1000355001\e5a410d79f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6804 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7020 -
C:\Users\Admin\AppData\Local\Temp\1000113001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000113001\num.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Users\Admin\1000115002\8d9881a82b.exe"C:\Users\Admin\1000115002\8d9881a82b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000128041\ko.ps1"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --kiosk --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data7⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\User\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef25f9758,0x7fef25f9768,0x7fef25f97788⤵PID:2856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:28⤵PID:3236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1492 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:3596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=1556 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:3804
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1924 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:4640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2096 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:4672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2136 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:4704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2584 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:2932
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2600 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:2504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1348 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:28⤵PID:5872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=3524 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:4648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3772 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:5660
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings8⤵PID:6628
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f757688,0x13f757698,0x13f7576a89⤵PID:6660
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=09⤵PID:6736
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f757688,0x13f757698,0x13f7576a810⤵PID:6748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4516 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:6980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2576 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2788 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:2516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=4412 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:2908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --mojo-platform-channel-handle=2632 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:88⤵PID:4172
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User" --extension-process --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2640 --field-trial-handle=1336,i,10813742617942194877,9849065835041849844,131072 /prefetch:18⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe"C:\Users\Admin\AppData\Local\Temp\1000365001\lummetc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe"C:\Users\Admin\AppData\Local\Temp\1000367001\processclass.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3144 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start context.exe5⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\context.execontext.exe6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:6432 -
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:6416 -
C:\Windows\SysWOW64\cmd.execmd /c md 6076988⤵
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q8⤵
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\607698\Waters.pifWaters.pif Q8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2816 -
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:6880 -
C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000368001\splwow64.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"6⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\cmd.execmd /c md 6076986⤵
- System Location Discovery: System Language Discovery
PID:5004 -
C:\Windows\SysWOW64\findstr.exefindstr /V "MaskBathroomCompositionInjection" Participants6⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q6⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\607698\Waters.pifWaters.pif Q6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Waters.pif" && timeout 1 && del Waters.pif && Exit"7⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "Waters.pif"8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2972 -
C:\Windows\SysWOW64\timeout.exetimeout 18⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4040 -
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\1000376001\Ewpeloxttug.exe"C:\Users\Admin\AppData\Local\Temp\1000376001\Ewpeloxttug.exe"4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 6165⤵
- Loads dropped DLL
- Program crash
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\1000377001\CompleteStudio.exe"C:\Users\Admin\AppData\Local\Temp\1000377001\CompleteStudio.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\1000378001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000378001\2.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5524 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:5176 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5296 -
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5236 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F2⤵PID:3496
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1128
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4740
-
C:\Windows\system32\taskeng.exetaskeng.exe {8AD6A930-0289-47E9-B876-F0101EB7602D} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5672 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:2056
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js"2⤵PID:2672
-
C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr"C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr" "C:\Users\Admin\AppData\Local\QuantumDynamics Lab\W"3⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f56b39c0fc3de1555a62f28bde748e68
SHA10a99a75c6f6b20b545ce2c93798ac7347194798a
SHA256d548484cd26c66475c9ad3660eab9e74970be4a4eae74552ee8edf15b951fb36
SHA512a4fbe29528858c339c5d712868e69fcde7e7c05d2771341619d03c941728b87de87a2cecf72698442e0324fb112c558641b1e20ce9df732b9c4d15786092a6b6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Network\23b4f303-4fce-4fe1-b085-2046db70f7ca.tmp
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2KB
MD580092ce74b8e812999317425b8a5a519
SHA1fe8bcc52f31564dc69c81808d108fb881f50e659
SHA25633fdc44edbedb677d8dddc8f9b9b79541949c20cca1022d9c2eda0b0a4bd7cad
SHA5123d2bafe62a17b18a62a994df0a08dfa802575a867bf84686a6aac7360d43ace1872f79c143f9211a12d3af1389205b442f221626b5f173ba13c7453a81ddacd8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User\Default\Network\Network Persistent State~RFf7a6078.TMP
Filesize3KB
MD5605771d0671572e396fcf3b5055b54d7
SHA177666d7fb7cdfab80da5c1c8a3c3599684736fc9
SHA2560c93140425a5e1b432aed6dc6098d48c897851fcccf6296d86565ab54427a399
SHA512673857ef388c5dd0ac9247d9f1d159df1f42d25dc8827259cf8f9775f7102945e25769c8949a6f99deaf15a1a8d2a3e4fa0ee81b2f4ffcd4e8426ffc7f2547fd
-
Filesize
5KB
MD52275839095047dc492c511a70e7854f6
SHA15184f51b0dc5d6eaa23539b7866a6cc68983fc6c
SHA256817d7ef7a0b16e0c2b94d56331c0dc3bbde6ba444cb47e5602679d9fa90855bf
SHA5127faa12be9958c268eeee410f1f57868fe5983b05be983c29139e6e24b7dfd034514a0385679e92c9d784e95f50201de27b7b95429a04a55f770c6c8e2af52d13
-
Filesize
6KB
MD5a761456b33150305a9cd9cab5bfa80b5
SHA1025d3804c88ccb7ca7fc695c3f36fbb6abe3cee4
SHA256efc7026a4d82fa12e453efd6ac9d3636ffda900b4a8a9ca19acc88968b6a20e3
SHA512fa3a57776343a586c2922cb81b81eed5a4f29a7c94741fabb50bb72db0075562cd745cf419d02bbba4a491a490e300122757684cb8215ff80e5320f25d13f4fe
-
Filesize
10KB
MD56e1fd42ade91a058a8b71535d65f1e30
SHA1bd5b6eb2b1c6a2a6ed94e7cb256825e6a793931b
SHA256d7c5404256a73e6835081021af3510d718c341235acf47720d23a2f1d0066ae0
SHA512855743b5c81a0418122b11702d6120db697f89ce8328764955e6bb89e438d20f5daae1b0813d4bef4963ccfb935f803924184c241bab04bb6cfe48723219b75c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2KB
MD5bd01259504d71e80c36666d44158f92c
SHA187046f93e76ed11e18415c78778dee99ec3979dd
SHA2566b81a070b2efbca4fb4a2203665d1526163dc39555b04d5b9ef70c0da8469563
SHA51256e1cf283a4c5c23f3fdf976821c3bac3f82a4a9ac9870703dc1a061f0b7dc94ad68e9591688175e1c587c2692408bbe5be9be956ef2b7de40a8ebd3bfb087b8
-
Filesize
175KB
MD554632d905812788fa01c2a3d4173e83d
SHA157ce93e22b554c7e50edcaf8401abfc8a81e928f
SHA2565fd35682bab58692ef75840bdde5125a2a81479c9fe332d0ee1331b19702505e
SHA5126262a37119de442cf1840916674dd1d1b7dde508956e5b1f74488043ea449e17f18636c2027a69e92db1942e774f6e9fcb16e3e28bc4481459645914dc016263
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
314KB
MD5f2d385ddbb2edafacd070f103f7f1576
SHA15ee6cb80bc943476067c148e5c16738b7b062029
SHA256d56a1a5602b5e72b8b9b2d6f2e0c5bc689682d0983f30b8c66dad9af093679b3
SHA512e6ee00d15483ef29fb7e48ed28833ce5059f7bfada96b92c350246f6032f85d318571950bf6d2ee557e417e87d24d90965aa1523782416792fa7eb7354266df5
-
Filesize
1006KB
MD5c005d4ffa3e28c22b41a9d222598260a
SHA157cc3a6540bc38c649ddfdd54fa4f3c8a2423677
SHA256799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb
SHA512ce39903c46160deeee1c7b362000361a3f5a9243b2e180bbaafa5b8ab09cc09ca413ce32f4deb2074fa928110d25b3dae7465c849fc388a58ddf649a9caa3a68
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
187KB
MD57a02aa17200aeac25a375f290a4b4c95
SHA17cc94ca64268a9a9451fb6b682be42374afc22fd
SHA256836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e
SHA512f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6
-
Filesize
9.5MB
MD50603207308448ad82dc3d1fc17923ddb
SHA19c4f8f3e35d6404e22b50b7f1a0641a1b4195d94
SHA2560fb82d8a8edd32ba4f80b129b228c9e74871f55f970b44c75af5aa4572b1b582
SHA51250595287ba90421dbb6fc612b69d2a2bffdad54ff79b04c50a05ea414af4e7deeb7101fb1b0638257cb28d3627ef8258e7cb039178b6d504d922774e91f95ba5
-
Filesize
307KB
MD5791fcee57312d4a20cc86ae1cea8dfc4
SHA104a88c60ae1539a63411fe4765e9b931e8d2d992
SHA25627e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d
SHA5122771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c
-
Filesize
1KB
MD535292f05c28986bd94cc363c44485653
SHA181047ee0529810fe35619fe2cff6b5c1ae9b7fb4
SHA25603d8c848bd6d6d25cba8c809cba33b541ed43a95c09bcb669741cc9d6a91f80e
SHA51289feff3083bb66f51fec71b952465db62ff61e60dbd25c3f5986d00747f0ef68cece359aa8d992b2c6667d1a29f93a5e91c57fe22c54eda25344597a809a5edd
-
Filesize
4.1MB
MD57fa5c660d124162c405984d14042506f
SHA169f0dff06ff1911b97a2a0aa4ca9046b722c6b2f
SHA256fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2
SHA512d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c
-
Filesize
409KB
MD5a21700718c70ec5e787ad373cb72a757
SHA1027554ab5ff3245e7617f3b83d6548bf7919f92e
SHA25687e639ecc7704cb5e29f1ebb1d8ade3ae863aaa2505a37b28f2d45121da500c6
SHA512ea292a5442d9fe536e650a2bc5142dd3aef79c66930243897e0e87c57915f0a54e45e03e58daffb473f85fe10b963d4670050bff5ab3f91121d21d463e25659b
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
963KB
MD51ef39c8bc5799aa381fe093a1f2d532a
SHA157eabb02a7c43c9682988227dd470734cc75edb2
SHA2560cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4
SHA51213a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682
-
Filesize
1.8MB
MD5beb729f85b42e8201b31a5b96c898f5f
SHA1b29a39f73636dea3780c5167bb87809ef8a82d6c
SHA256d71873f393259dc6b0998b4be7be61adbc24e0652716c2aaab2bbcb3d6cafabe
SHA512e85ed0f17a02b3bacac12430bbc1ada55ac782f2bcd9c541b3daf3a5ad221439be02931135dfbacf226037b34cd8891fd65890aac2ff8b6d17c22518dd635e1d
-
Filesize
1.8MB
MD5ed23c3616cae82f6fe5e3df97ee3efbe
SHA19e2671c2827cf009ebb92bf09fa1ac1c9134b938
SHA2565b7c78f3bc09b7882a600bd5561623c7c357ec89ac2c9b3419c889f8ee015ae7
SHA51290a18ea03d73b36a17c5318b434415bac14d7c37f4b4885c636d859e881e71869ee2577cde0ddcee89db3a583bd50514523ea813a15d7f1f65d6d4336edaae2f
-
Filesize
352KB
MD52fe92adf3fe6c95c045d07f3d2ecd2ed
SHA142d1d4b670b60ff3f27c3cc5b8134b67e9c4a138
SHA25613167320a0e8266a56694be70a9560c83e2c645d6eeaa147b9ae585c2960ebb2
SHA5120af7b4a3ce3981707ca450b90829a4a8e933ea3cd3affbce738265a1a0647e96323117db325d0e5e3884f67f36b21b8c955b6c3c6dda21d9b01212e28ef88d65
-
Filesize
6KB
MD5c042782226565f89ce3954489075e516
SHA1256dd5ba42837a33c7aa6cb71cef33d5617117ee
SHA256a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6
SHA5129f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd
-
Filesize
1.3MB
MD52b01c9b0c69f13da5ee7889a4b17c45e
SHA127f0c1ae0ddeddc9efac38bc473476b103fef043
SHA256d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29
SHA51223d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455
-
Filesize
2.2MB
MD523c8cb1226c61a164d7518218c837b81
SHA145ea74832e487bacb788189c04661b29a71e86b5
SHA25621aaa5319a6729df0581203a0782ead837b848387e44cd1844ca8e19882a50af
SHA5128e219108c05966ec8ee6bc2ce2fb40c4aedce6614e65970c356e4f840e88720188c762aaa4451c2f5f1fa1bbc14136ecbcd1f4c9f3b1a5fccc0ab053a37bcc21
-
Filesize
479KB
MD5ee4d5bd9f92faca11d441676ceddcec9
SHA164626881b63abc37cd77fca95f524830849dd135
SHA256d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4
SHA5120daac4bdfc51994877c27f87377d210674c78eb4587a9baef6fbe46f5a1aa8e9ed700d4881356adc66c713562995a5fa5f56ecacc2a84ee2f695f2816fe63752
-
Filesize
1.9MB
MD5ae85198b4e96994847b851ba2360a2e5
SHA17b0217e10e74c3d20d46b776c64f49e81dc8d8f2
SHA2567451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713
SHA512ce58b0f4faaa79266679c767b5e03f1990f822bfc81286e99bd8a0890bc1b07c9740ce65cb08ca6380e6ba285dffe97f00748d46ddfee1e1fb00bf135fc1071d
-
Filesize
794KB
MD57b5632dcd418bcbae2a9009dbaf85f37
SHA132aaf06166854718f0bcbb2f7173c2732cfb4d33
SHA256361e9c3b62719b79bc280420b5f710e160fd55f2250bf605911ded7162483db4
SHA512c834e90ccf2d35529c294319b8e9a49db7a7d67d0567e0739131d5af51170db32076d68147dc101f8047a75cb5b2275b25a9c8346a99a146a6798b9764316838
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
490KB
MD5b473c40205c61dc4750bc49f779908dd
SHA188a0fc0962099f0ac2d827d2c4d691ed9cade251
SHA2568707c03158ba6395a11bdfd8c1b11eeedc2e052d3b55d73d0a5c64417e5fbd3b
SHA5128fbaaa5bde30fe7c6e31a349c14e3bd710e92c4dbcca8cbdbaf34583887bc31e07e10a0223fc6c6c0d091787c296eba139ec91af44ec4ee6abbfb611493951d1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1506706701-1246725540-2219210854-1000\76b53b3ec448f7ccdda2063b15d2bfc3_62dc4f69-4699-4b35-9f5c-cc69254f52a3
Filesize2KB
MD5244f897c6d3789d55c5332ce5c2589f9
SHA13289b0130aa15324ee3ee291048524aa712f00bd
SHA256b14fb727e84991a8c8628fe2dc48b703fccfd79c43d8217cc78746401a6ea5d1
SHA51229cd43f9ffa7e19a3c6bdff72111eaade2e5dacc6fffab4e92c5802bf69f652eef1b7c8f784023869924146ea4e59e667405ca2456c4e68949b38ece9ad89eb4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1506706701-1246725540-2219210854-1000\76b53b3ec448f7ccdda2063b15d2bfc3_62dc4f69-4699-4b35-9f5c-cc69254f52a3
Filesize2KB
MD59f932ba465a8fe6f04cb856b2a58acac
SHA1b28601e5c210fba1837dc064aa78662b992e7f5a
SHA2565af4bccaee44faedb22c448a93598f5b168519e11980cf14b2629d8918b9cb93
SHA512848a1aa42b871d615fcd200b2a896260f0f1cfeb40c006f25fb6087f7d0c3ceb6195b19657a2f717a55bc283544240b96cf613cfa1fd95df02019bba2a0afbbd
-
Filesize
304KB
MD565c058e4a90d2ec70b03211d768b6ecc
SHA1bf5af6f650759e5e612d42d72145660056737164
SHA2565a00e3718afb5bfb18a6b1c824b680015733f0403af0d5663289a17ba8206cc3
SHA5123d9114409f8096ce8a1d134a48235fbbad0c6c53f820707a951bac42c4f7ba6a38e98a50c9d929f049042263a7c0e24da8368d3aa4e934f5da79e9bda4a930aa
-
Filesize
2KB
MD539fb20ef7c3bc1023428dec5650bc879
SHA11db41cefdf921b424e3b108edb25c35007c666c5
SHA256bb157fd2a365dd7f24bac59796458be72603e0b6ebce4f8dbff090696fb04ee0
SHA51252551ac48f3b69a05a63e45d91f7eb84729f0ddabe33d2adc9193f6cd02329e1e8e8dc08059c0288a42527de6278e19d7336b6da1f04a1ef2ab5d513a001876c
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.8MB
MD56a064f5aac429225163d47454073f334
SHA135d03f5ccf0376adc6f804f4b77489811b974739
SHA256844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f
SHA5128198d39c76eddedbc4bc3ceff7a36df35c000156e4ee1bea99844668c5ef261955a7d640af760d57d9d51ff792f7da7f92698b09553fc29d2d8537fb189b4224
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17