Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe
Resource
win10v2004-20241007-en
General
-
Target
4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe
-
Size
1.8MB
-
MD5
6e62c424734a15da271aeb9057391fa4
-
SHA1
14c50350a560be190aa3caf909dbc31e502f382b
-
SHA256
4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f
-
SHA512
09f9d9f03504fad822d6ca0affcdb21acfa4f4be1100a4e79f1f3d1b767dbc03a4cc95e677d99eaf316ec6e712f144d2d1ca46fdf1972b6c1c987869db4a5819
-
SSDEEP
24576:ffDq11zp2lwp22w+IUezEIFIrI7mWY566oY1cZgGMRPQee+6MqLmhX+ZyFZZw8DX:DMzp2qNw+Li+rMSLPGMqeSMDhVZw8Dk
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
gurcu
https://api.telegram.org/bot8009002136:AAHPJrz2-Pn7ZXvJ8icMhaRHpwMHWNcOutY/sendDocumen
Signatures
-
Amadey family
-
Gurcu family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0478d63882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0478d63882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0478d63882.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0478d63882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0478d63882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0478d63882.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1612 created 3444 1612 NK4PJqi.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e54c0ca980.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a3cd05bc71.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3cd1b439d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0478d63882.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2860 msedge.exe 1084 msedge.exe 5916 msedge.exe 5736 msedge.exe 5940 chrome.exe 5164 chrome.exe 5236 chrome.exe 4696 msedge.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3cd1b439d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3cd1b439d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0478d63882.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e54c0ca980.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a3cd05bc71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e54c0ca980.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a3cd05bc71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0478d63882.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation vvcWObH.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 15 IoCs
pid Process 4244 skotes.exe 1612 NK4PJqi.exe 2500 DU1zDwm.exe 1184 vvcWObH.exe 6080 e54c0ca980.exe 2256 skotes.exe 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 5868 a3cd05bc71.exe 3768 3cd1b439d4.exe 5732 2757ec8910.exe 5740 0478d63882.exe 3368 skotes.exe 5972 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 2372 skotes.exe 5436 MicrosoftEdgeUpdateTaskMachineCoreSC.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine e54c0ca980.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine a3cd05bc71.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3cd1b439d4.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 0478d63882.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0478d63882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0478d63882.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a3cd05bc71.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011358001\\a3cd05bc71.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3cd1b439d4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011359001\\3cd1b439d4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2757ec8910.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011360001\\2757ec8910.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0478d63882.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011361001\\0478d63882.exe" skotes.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.myip.com 19 api.myip.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cf2-3548.dat autoit_exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\machine.inf_amd64_b748590104fe1c15\machine.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\input.inf_amd64_adeb6424513f60a2\input.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF dxdiag.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 4244 skotes.exe 6080 e54c0ca980.exe 2256 skotes.exe 5868 a3cd05bc71.exe 3768 3cd1b439d4.exe 5740 0478d63882.exe 3368 skotes.exe 2372 skotes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1612 set thread context of 1792 1612 NK4PJqi.exe 86 PID 512 set thread context of 6140 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 114 PID 5972 set thread context of 4452 5972 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 198 PID 5436 set thread context of 5112 5436 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 204 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5044 5868 WerFault.exe 119 5876 5868 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2757ec8910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2757ec8910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NK4PJqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e54c0ca980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3cd05bc71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0478d63882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cd1b439d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2757ec8910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3712 PING.EXE 4536 powershell.exe 912 PING.EXE 2380 powershell.exe 1868 PING.EXE 1280 powershell.exe 5504 PING.EXE 636 powershell.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dxdiag.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 13 IoCs
pid Process 4356 taskkill.exe 1792 taskkill.exe 940 taskkill.exe 1588 taskkill.exe 964 taskkill.exe 4292 taskkill.exe 964 taskkill.exe 5412 taskkill.exe 5660 taskkill.exe 2500 taskkill.exe 5772 taskkill.exe 5856 taskkill.exe 2112 taskkill.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SYSTEM32\\dxdiagn.dll" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2437139445-1151884604-3026847218-1000\{C46E5575-F340-41DF-9D21-E0F713D750DC} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2437139445-1151884604-3026847218-1000\{FE1BD7EC-09A2-4A2C-BB2F-73BD36267A0F} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 1868 PING.EXE 5504 PING.EXE 3712 PING.EXE 912 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 4244 skotes.exe 4244 skotes.exe 1612 NK4PJqi.exe 2380 powershell.exe 2380 powershell.exe 1792 InstallUtil.exe 1792 InstallUtil.exe 1792 InstallUtil.exe 1184 vvcWObH.exe 5656 dxdiag.exe 5656 dxdiag.exe 6080 e54c0ca980.exe 6080 e54c0ca980.exe 2256 skotes.exe 2256 skotes.exe 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 1280 powershell.exe 1280 powershell.exe 6140 explorer.exe 6140 explorer.exe 1280 powershell.exe 5868 a3cd05bc71.exe 5868 a3cd05bc71.exe 5940 chrome.exe 5940 chrome.exe 6140 explorer.exe 6140 explorer.exe 6140 explorer.exe 6140 explorer.exe 6068 msedge.exe 6068 msedge.exe 4396 msedge.exe 4396 msedge.exe 5820 msedge.exe 5820 msedge.exe 1084 msedge.exe 1084 msedge.exe 4696 msedge.exe 4696 msedge.exe 2860 msedge.exe 2860 msedge.exe 5736 msedge.exe 5736 msedge.exe 3768 3cd1b439d4.exe 3768 3cd1b439d4.exe 6140 explorer.exe 6140 explorer.exe 6140 explorer.exe 6140 explorer.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 6140 explorer.exe 6140 explorer.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5740 0478d63882.exe 5740 0478d63882.exe 5740 0478d63882.exe 5740 0478d63882.exe 5740 0478d63882.exe 6140 explorer.exe 6140 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1612 NK4PJqi.exe Token: SeDebugPrivilege 1612 NK4PJqi.exe Token: SeDebugPrivilege 1792 InstallUtil.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 1184 vvcWObH.exe Token: SeIncreaseQuotaPrivilege 5444 WMIC.exe Token: SeSecurityPrivilege 5444 WMIC.exe Token: SeTakeOwnershipPrivilege 5444 WMIC.exe Token: SeLoadDriverPrivilege 5444 WMIC.exe Token: SeSystemProfilePrivilege 5444 WMIC.exe Token: SeSystemtimePrivilege 5444 WMIC.exe Token: SeProfSingleProcessPrivilege 5444 WMIC.exe Token: SeIncBasePriorityPrivilege 5444 WMIC.exe Token: SeCreatePagefilePrivilege 5444 WMIC.exe Token: SeBackupPrivilege 5444 WMIC.exe Token: SeRestorePrivilege 5444 WMIC.exe Token: SeShutdownPrivilege 5444 WMIC.exe Token: SeDebugPrivilege 5444 WMIC.exe Token: SeSystemEnvironmentPrivilege 5444 WMIC.exe Token: SeRemoteShutdownPrivilege 5444 WMIC.exe Token: SeUndockPrivilege 5444 WMIC.exe Token: SeManageVolumePrivilege 5444 WMIC.exe Token: 33 5444 WMIC.exe Token: 34 5444 WMIC.exe Token: 35 5444 WMIC.exe Token: 36 5444 WMIC.exe Token: SeIncreaseQuotaPrivilege 5444 WMIC.exe Token: SeSecurityPrivilege 5444 WMIC.exe Token: SeTakeOwnershipPrivilege 5444 WMIC.exe Token: SeLoadDriverPrivilege 5444 WMIC.exe Token: SeSystemProfilePrivilege 5444 WMIC.exe Token: SeSystemtimePrivilege 5444 WMIC.exe Token: SeProfSingleProcessPrivilege 5444 WMIC.exe Token: SeIncBasePriorityPrivilege 5444 WMIC.exe Token: SeCreatePagefilePrivilege 5444 WMIC.exe Token: SeBackupPrivilege 5444 WMIC.exe Token: SeRestorePrivilege 5444 WMIC.exe Token: SeShutdownPrivilege 5444 WMIC.exe Token: SeDebugPrivilege 5444 WMIC.exe Token: SeSystemEnvironmentPrivilege 5444 WMIC.exe Token: SeRemoteShutdownPrivilege 5444 WMIC.exe Token: SeUndockPrivilege 5444 WMIC.exe Token: SeManageVolumePrivilege 5444 WMIC.exe Token: 33 5444 WMIC.exe Token: 34 5444 WMIC.exe Token: 35 5444 WMIC.exe Token: 36 5444 WMIC.exe Token: SeLockMemoryPrivilege 6140 explorer.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeLockMemoryPrivilege 6140 explorer.exe Token: SeDebugPrivilege 964 taskkill.exe Token: SeShutdownPrivilege 5940 chrome.exe Token: SeCreatePagefilePrivilege 5940 chrome.exe Token: SeShutdownPrivilege 5940 chrome.exe Token: SeCreatePagefilePrivilege 5940 chrome.exe Token: SeShutdownPrivilege 5940 chrome.exe Token: SeCreatePagefilePrivilege 5940 chrome.exe Token: SeShutdownPrivilege 5940 chrome.exe Token: SeCreatePagefilePrivilege 5940 chrome.exe Token: SeDebugPrivilege 5856 taskkill.exe Token: SeDebugPrivilege 5412 taskkill.exe Token: SeDebugPrivilege 4356 taskkill.exe Token: SeDebugPrivilege 1792 taskkill.exe Token: SeDebugPrivilege 940 taskkill.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 6140 explorer.exe 5940 chrome.exe 5940 chrome.exe 4696 msedge.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 1536 firefox.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe 5732 2757ec8910.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5656 dxdiag.exe 1536 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 4244 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 83 PID 2624 wrote to memory of 4244 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 83 PID 2624 wrote to memory of 4244 2624 4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe 83 PID 4244 wrote to memory of 1612 4244 skotes.exe 85 PID 4244 wrote to memory of 1612 4244 skotes.exe 85 PID 4244 wrote to memory of 1612 4244 skotes.exe 85 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 1612 wrote to memory of 1792 1612 NK4PJqi.exe 86 PID 4244 wrote to memory of 2500 4244 skotes.exe 87 PID 4244 wrote to memory of 2500 4244 skotes.exe 87 PID 2500 wrote to memory of 1040 2500 DU1zDwm.exe 88 PID 2500 wrote to memory of 1040 2500 DU1zDwm.exe 88 PID 2500 wrote to memory of 1560 2500 DU1zDwm.exe 89 PID 2500 wrote to memory of 1560 2500 DU1zDwm.exe 89 PID 2500 wrote to memory of 2800 2500 DU1zDwm.exe 90 PID 2500 wrote to memory of 2800 2500 DU1zDwm.exe 90 PID 2500 wrote to memory of 2380 2500 DU1zDwm.exe 91 PID 2500 wrote to memory of 2380 2500 DU1zDwm.exe 91 PID 2380 wrote to memory of 1868 2380 powershell.exe 98 PID 2380 wrote to memory of 1868 2380 powershell.exe 98 PID 4244 wrote to memory of 1184 4244 skotes.exe 99 PID 4244 wrote to memory of 1184 4244 skotes.exe 99 PID 1184 wrote to memory of 5308 1184 vvcWObH.exe 101 PID 1184 wrote to memory of 5308 1184 vvcWObH.exe 101 PID 5308 wrote to memory of 5444 5308 cmd.exe 103 PID 5308 wrote to memory of 5444 5308 cmd.exe 103 PID 1184 wrote to memory of 5656 1184 vvcWObH.exe 104 PID 1184 wrote to memory of 5656 1184 vvcWObH.exe 104 PID 4244 wrote to memory of 6080 4244 skotes.exe 108 PID 4244 wrote to memory of 6080 4244 skotes.exe 108 PID 4244 wrote to memory of 6080 4244 skotes.exe 108 PID 512 wrote to memory of 6140 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 114 PID 512 wrote to memory of 6140 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 114 PID 512 wrote to memory of 6140 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 114 PID 512 wrote to memory of 6140 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 114 PID 512 wrote to memory of 6140 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 114 PID 512 wrote to memory of 1280 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 115 PID 512 wrote to memory of 1280 512 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 115 PID 1280 wrote to memory of 5504 1280 powershell.exe 117 PID 1280 wrote to memory of 5504 1280 powershell.exe 117 PID 4244 wrote to memory of 5868 4244 skotes.exe 119 PID 4244 wrote to memory of 5868 4244 skotes.exe 119 PID 4244 wrote to memory of 5868 4244 skotes.exe 119 PID 1184 wrote to memory of 964 1184 vvcWObH.exe 121 PID 1184 wrote to memory of 964 1184 vvcWObH.exe 121 PID 1184 wrote to memory of 5940 1184 vvcWObH.exe 123 PID 1184 wrote to memory of 5940 1184 vvcWObH.exe 123 PID 5940 wrote to memory of 3960 5940 chrome.exe 124 PID 5940 wrote to memory of 3960 5940 chrome.exe 124 PID 5940 wrote to memory of 2068 5940 chrome.exe 125 PID 5940 wrote to memory of 2068 5940 chrome.exe 125 PID 5940 wrote to memory of 5004 5940 chrome.exe 126 PID 5940 wrote to memory of 5004 5940 chrome.exe 126 PID 5940 wrote to memory of 1828 5940 chrome.exe 127 PID 5940 wrote to memory of 1828 5940 chrome.exe 127 PID 5940 wrote to memory of 5236 5940 chrome.exe 128 PID 5940 wrote to memory of 5236 5940 chrome.exe 128 PID 5940 wrote to memory of 5164 5940 chrome.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1560 attrib.exe 1040 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe"C:\Users\Admin\AppData\Local\Temp\4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe"C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe5⤵
- Views/modifies file attributes
PID:1040
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe5⤵
- Views/modifies file attributes
PID:1560
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE5⤵
- Scheduled Task/Job: Scheduled Task
PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del DU1zDwm.exe5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c wmic path win32_videocontroller get caption5⤵
- Suspicious use of WriteProcessMemory
PID:5308 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_videocontroller get caption6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
-
C:\Windows\SYSTEM32\dxdiag.exe"dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt5⤵
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5656
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM chrome.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=16490 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5bbccc40,0x7fff5bbccc4c,0x7fff5bbccc586⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1760,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2044 /prefetch:26⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1880,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1756 /prefetch:36⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2092,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:86⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16490 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2880,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2896 /prefetch:16⤵
- Uses browser remote debugging
PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16490 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2900,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2932 /prefetch:16⤵
- Uses browser remote debugging
PID:5164
-
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM msedge.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=13329 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff574e46f8,0x7fff574e4708,0x7fff574e47186⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2040 /prefetch:26⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2140 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2464 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:16⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:16⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:16⤵
- Uses browser remote debugging
PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:16⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:5736
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM firefox.exe5⤵PID:5000
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5412
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM Firefox.exe5⤵PID:1220
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Firefox.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM Firefox.exe5⤵PID:1560
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Firefox.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM firefox.exe5⤵PID:3464
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM Firefox.exe5⤵PID:880
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Firefox.exe6⤵
- Kills process with taskkill
PID:1588
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM Firefox.exe5⤵PID:3508
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Firefox.exe6⤵
- Kills process with taskkill
PID:964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"5⤵PID:5040
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 16⤵PID:6036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011357001\e54c0ca980.exe"C:\Users\Admin\AppData\Local\Temp\1011357001\e54c0ca980.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6080
-
-
C:\Users\Admin\AppData\Local\Temp\1011358001\a3cd05bc71.exe"C:\Users\Admin\AppData\Local\Temp\1011358001\a3cd05bc71.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 15685⤵
- Program crash
PID:5876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 15405⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011359001\3cd1b439d4.exe"C:\Users\Admin\AppData\Local\Temp\1011359001\3cd1b439d4.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\1011360001\2757ec8910.exe"C:\Users\Admin\AppData\Local\Temp\1011360001\2757ec8910.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:848
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ac6743c-5659-434e-ba2e-d0e1d98e2b0d} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" gpu7⤵PID:4552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c49ba048-add9-499f-ada4-d339ee05efa7} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" socket7⤵PID:732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2980 -childID 1 -isForBrowser -prefsHandle 1572 -prefMapHandle 3016 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9319cecc-f992-411c-9c68-6a863c719267} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab7⤵PID:4276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -childID 2 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd60ea84-e35b-4e55-b990-83737e23767d} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab7⤵PID:5544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4820 -prefMapHandle 4816 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4573d436-ba58-4030-b5eb-7d17ca0ad62f} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" utility7⤵
- Checks processor information in registry
PID:5368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 3 -isForBrowser -prefsHandle 5500 -prefMapHandle 5520 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {167b7fe7-70f0-4f85-91b2-d6e655e393da} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab7⤵PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 4 -isForBrowser -prefsHandle 5184 -prefMapHandle 5496 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55cac189-46dd-4ce7-b757-ad8b48fa9900} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab7⤵PID:892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5708 -childID 5 -isForBrowser -prefsHandle 5868 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13cb0d2d-9fd1-4680-947c-2dc041bf99a0} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab7⤵PID:1144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011361001\0478d63882.exe"C:\Users\Admin\AppData\Local\Temp\1011361001\0478d63882.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5740
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5504
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5868 -ip 58681⤵PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5868 -ip 58681⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3368
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5972 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:4452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:636 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2372
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5436 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:5112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4536 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:912
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
5KB
MD53db79a11964191aa88b88cc82175e4e7
SHA146ad99139602e83840bf1e1f29274a0f52772ffa
SHA25656e91a9a90780652e4ab7171c1d3bfbe0fa419caca43a563ed09c827ad20a2a6
SHA512070339a0a372502e727c7b832c914482cfc4739b8e9674dcb2c432f63ffbb7f46e9c040ff1f3940c337d39e1bac655b0bb0a3c9599ca329d668a2e1e9f62575a
-
Filesize
1KB
MD588be3bc8a7f90e3953298c0fdbec4d72
SHA1f4969784ad421cc80ef45608727aacd0f6bf2e4b
SHA256533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a
SHA5124fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c
-
Filesize
1KB
MD57dcba3af848bba2d3e10b43e176546c5
SHA100bbf6d95f1fd4a59cb92b06ba9650709255425e
SHA2561e302e5ee0b204058b401366b3130444ea08034e429010cb8a915159d0d606ec
SHA512a274902b0b0392bfc29e98505d0e512defef9193b6ce26f543cb69ce77522f76af6fc62ec21ff6d857bcb5c9972797874318368d4cb09f2023821e8039f7ca1b
-
Filesize
1KB
MD5d61ae193cb25e288c7d74abfffcca905
SHA18eb32a9857f49547ea7f091c4d438cbbdf357e0a
SHA256ab09778715b7d7d304c1efac67a8056c42f2b16a15cbd3e0a72b2226139fb1ab
SHA5121f2dcab80cefaf28d543a4280a111ba5ed87fb94a307f72ba8547346d119f6f9f277055a469ef11e013b0fc50de70d2fc985b6bf8d8ad5a15c6c08adc47dcfec
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5e29c168914b612cb557483b1e9548d04
SHA1d3c57b0da3a720f49bcece2fc55eb54b59db2fbf
SHA25644d08e319d0c4150ef1d20f63e432a42bc618a65d2af1ba502aabc7cbdad5d41
SHA5121de7b4ed730a81dfde4c8a4353f5b88750d942309be0c8bcbfc874299409c8435aa4c488bd5aa595e042a72d65aca40a6615986fd5c50082ef54d7954debe3f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD560df7fd05dc0c9f393f221c44bda4d0e
SHA1c4dbac67a5535a5460cc8ba06153dc3d4b34245e
SHA25619a985df54ef3657338fc960a52f5c7e80f72e99b23034567352bd915289f177
SHA5121eba8dcecc79524f597e678894632939fc7b04a4e59655cc10b0db0557fa80e94a2445f294ca5f841fd436a2e8038373303f787c72ac29e43d5e8920063e0e52
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD517d71502bf84ec09dd4ccd4e449029f4
SHA1d73a6426b778ed33f6aa3d2f224dc53e6f9eed3e
SHA25622e9a0b09574f35fbed140b3737e1b3c0580cf3a0d5b85a079397e949e962ef7
SHA51286a51fabad86bcbd600dca83ad191c01f243fe14bd687188c5d77a276b8c0e5c638bf522af247c43bdb9af298d18f7767c2f317867b66e3004b6f999daf1cdaf
-
Filesize
1.5MB
MD503933b44701e2688a19b6fe5980526b7
SHA1456f586dffa20cc847b3a1f86c2fc958e9cea325
SHA25604510f9d11f433e48517273b05f3f800d73c16bca0b2b4a9afdaf3612550239e
SHA512bb1e6d2e1ffc8ab728295ac07512db3f6a08e0c7f9ec70e65ec75591bb9f697781d0df2096d7f9fc9a4b60b62d427acef46bd9105d713a84f91d33db3bec5d96
-
Filesize
2.2MB
MD54c64aec6c5d6a5c50d80decb119b3c78
SHA1bc97a13e661537be68863667480829e12187a1d7
SHA25675c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253
SHA5129054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76
-
Filesize
560KB
MD5197feb829312be2d9505c1492b6ddd16
SHA14e521c36e4fd6c7755d93f8281cc028a980b0979
SHA2562a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12
SHA512fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9
-
Filesize
1.9MB
MD5972aeaccbec56da479e178a53d3b24ff
SHA1af7d676bf5c59c2ac6cfaaaaad067ed34090e675
SHA256c4a071a267dabdb052c37972911874070424f210cd7f3aa6e33cf4e08efbd87d
SHA51253599df300461312f499a4c8ef303724d74417b5d26a9cf189a35dcf6a76d0aa686c8341af6e50c35182d769c2223407cf9076878fbaf52e0f6c2933dff319e1
-
Filesize
1.8MB
MD5b3e050ed821da21358b0ede9caaa0072
SHA10cf01c23e9cbbe1439e9ed775e84ff8dfe801c80
SHA2560312a298b39354700296f5ab5647989d876219e199092fa78229c1280a06cee0
SHA5123c09a26a84d2b5fec4c0e9bfc65bae503888a4cfa10017a2539970dcdcac05536717cbb65942746dd0eb84d26743f7ad470261d52accc2900ee9f4f7602f20ba
-
Filesize
1.7MB
MD59387e037e8c807c8447c95073b13b0a6
SHA15e954c6df3299b5857f00ce05c710aa35aa185b4
SHA256db04aa6bb0f101f37ab6a726f553ebc59f5b45a44f8e60c78f09c678fa47ad9e
SHA512ec11b76ef4604833b4aaf696d666f674445dcf6cae86ff903c780e6f4ebb5c7703388d032618bff69abe502459ef99f696ba2759f346ba79cb85cff2ad70dd54
-
Filesize
947KB
MD541389a16e01cec68238b31986d5a0c14
SHA132047c6fde259dcb4ad6a0d89de7341ff32084b8
SHA2565963ea20d6c1b8712092547a62280ffe4e83f0768841f8d18bdaaa097250ed94
SHA512ea2eaccfc7d907c7741b3e0efab559a77e42ed04446f0f05fa457902d5fbd35b531f3f08db1c4e831c48bbc9baa6a900a0d211c6d8fd84420ec1a9f5a84a77be
-
Filesize
2.6MB
MD523d8fedbfa886da9a9da6074862df31e
SHA1605e9b0ed6a4706a8e6b0af909dfd0caefee23eb
SHA25683e05c86c86df81686dea5838d918c70a12026639b80dda9c93f6492442dd408
SHA512b1b5d5cc05f7a08d9fb9293eb5885cfed349d590184ad38b415e05f5cff874c3591365a9c21405ff0941fe41c9c1dc580b89dece15f3174d7e99d72514151c0c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD56e62c424734a15da271aeb9057391fa4
SHA114c50350a560be190aa3caf909dbc31e502f382b
SHA2564c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f
SHA51209f9d9f03504fad822d6ca0affcdb21acfa4f4be1100a4e79f1f3d1b767dbc03a4cc95e677d99eaf316ec6e712f144d2d1ca46fdf1972b6c1c987869db4a5819
-
Filesize
86KB
MD5ef55e75c40b2f4e0575009c97addd196
SHA1f60817822d4d08864053b70f9f867de3905767fe
SHA256c5d6ab9f23433e3fb01d21d52391020189fd4ea788286700aedd94099d67d7d9
SHA51241cfc15386d27f038c884d8b730271a3e45cfe8fcad15f58c120f48db814af62826d89efa3d2ea330aad8adf34221929d53ed2cff9aa54b9e45f6d9b10a0b1e4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize6KB
MD5cb731f11071ae01c55840a229b104742
SHA1033e8cd6a384f91b55d8791d8d81b6319d02ea63
SHA2568aad0a8ab1836c576ce5e2de9898bca0d2a3c43954529bf830907ee1a8dba631
SHA5127daa563276eba4e134033a572bcef9df599b910e0ac7eda0cb2161bb5bb8a9fb52bd65164479073b9c646a0cea3efd9fe4ad0a79cbf36194682b1c4465057a97
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD5a128ee5a2d5f5cca9c278a6883ba3246
SHA1a35e3ba3466c0235e011de97913a735ff4e8fae5
SHA2568407ee4dec9047daaf8cda2ce03f63fd08cfafffc7efd912f3c6acc22e7d50cc
SHA512f1a64d2a2a3360a7dc57d7e5fda09bbf1ef505fb50a299be4fb8da1d7239c9cac4bf711307dc8189c8969954d5085120fd094fd084c14677521e1a347b6d3aa5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f8408ba42a81cc0750557bd2a3bae499
SHA1fbe979dc0054e507156cdc581b33bcd6164d7e7b
SHA256c3528757fbc3a6f767bff3eca39c452a698eb7c9f5d3773009e284e47d88a18a
SHA5123059d7b4aaddf521df48c749a209433b546711816bd80d25e56a9cb2e114d133c56c7cc6a784083fbb2757338f7e3fac523f60d19e0fb65a54b4475216bb4a37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ca7bff6e6c55a80b637b624686e7927b
SHA1ebf6fa985138deb7f78371b96e71546dd04e6dda
SHA256d8ff36d9295c8d6660f68880f8e23af3c74a2988fd7309fc89fc642e27aafa6d
SHA51285b7426e89a77ccb085433e64e3f561f9735b95369ab19d698859498ed195a33d93d6f38e734e6ddd3308fd011186504ba41df23721eddae5a89aae428d70ca4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53d3f60a5145be17f956ba770fd9f93e2
SHA1200514bf7c58ae59bc26f79ec1fa18feed5e2f7d
SHA256b57a92c884178da369ca0d69b9b379690fdd76584ef4d30ec5480c0ffdc7c680
SHA5125b7036a30134983b557c370a0d4406b4ecdf7cb7c4e5f4e5e844ab9ebf118ccebded6f40e9d4f9400ae1b5f69d47b685d96ee3f975b66eb20bfb0239288fe6da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\356eba49-2a40-4f9b-a562-903982f3bd5d
Filesize671B
MD541db001aa4ab66a3de88c30da33759f7
SHA1056bf1d09bb59c1b71f7a8d2bedecdef1eb034a2
SHA25613cb65472655b396f0dea5b64d4333bc275f31043724f1e06bd13f9e7a8c11c6
SHA5120edd74ce359fbcb406fcfd485bf0c6a6213a534b5d7a64940137de0d4304ea9e4a05e4e01a501345eadab3319722af5c3a7cdb85e18f4bf1f76ab6805cb488fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\4e6a94a5-a8a3-482e-aafe-b03a31bd4fcc
Filesize23KB
MD533f310d9b2f0dbce00245a6f5e566df8
SHA1978e8d41355c82b39211f65d57926e711cf84884
SHA25676b19040d8c580077328ce0da1a39a9b8ad23a5302d855575a4fa001cca57db1
SHA512e715d7dc5c411864f4ad5f6770ac5fe3aefdf9edf79f678a6168104a35f81ccf29de84c7b277315ad4b6c769ce456616861085f05a7e26f84d74900a56a1466e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\93210437-7ba9-482a-a7fb-2eb6fa088b65
Filesize982B
MD5ee4c42a47af3fed81c7ff49c59851dc7
SHA1b41de3ce2f017cf9e09b89e71ddc68b9ff02cb7c
SHA256e3b93c7c1df791038770ee3a07bde915aa377fdcd34b6b8b90f56f7179f7b913
SHA51241ffa2575fd87b2587fa7510fe0de908f2cfbe2d17dd137ad8a797afdb86680b5e5aea2295df2d663aa7150052517b82c6cd2558c05e2c3d33a91d6616779c27
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a65047cfd7c30089e8bb1b70c5011f07
SHA1a6e3052faaaf49217cfb31d784abc516d4239657
SHA256bf167587b3253ecc6a7147af121d083d41477c227ed2c2563ce0adfaf33d6c42
SHA5122a285104a4f5ec7be351856bfcc53227d36917e3e4ff72719371e432ba2299abf0b859c35619cbb7374978ea43339119e24ec5913e5dc09c33eccc3da5f89592
-
Filesize
15KB
MD5f67b205513b8ba745b854e2a4ed17f69
SHA11a36afdf6eabdc7b3e441feec499336a26d4d78d
SHA2562ae884871bc9f3025f052225bc25823fc1c75ae6d68c7ce7766846a75699e77e
SHA5124414e058c425c23b7bd5b51def370a3ff7d8c2b33d74d92e0c986441286fbea82614f0804e693b261a8dc33b90191cc526ce2116013f6b84acd07d1c253e1177