Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe
Resource
win11-20250410-en
General
-
Target
2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe
-
Size
527KB
-
MD5
2936e22ea8907d6f85a25b2feb62650f
-
SHA1
3e367491a43877ccf90ec1b2a46af3153fedf8a7
-
SHA256
e378da59a68622d81932cacab8d8193de42ee4628756dc116c74d70efb6bbb69
-
SHA512
dee95cfc6f7e9c2060bd9f83a9466fe0f7ff543c8b9b790fee398c0133be2bf87c73a6dfdae9cca7839f1633ac104e469d3811d248f2c952ae6470a970729060
-
SSDEEP
12288:ewK1jIDqUT8uCGUCs4eNS+mrp+3OhAICBGtnA:eGDNPCms4eNiQpjG
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:82
mjahanzaib.no-ip.org:82
DC_MUTEX-3H9BAQL
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ptMnX4vVfS9k
-
install
true
-
offline_keylogger
true
-
password
0123456789
-
persistence
true
-
reg_key
Sms sender
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3328 attrib.exe 5176 attrib.exe -
Executes dropped EXE 3 IoCs
pid Process 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 6116 msdcsc.exe 5848 msdcsc.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sms sender = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sms sender = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 6012 set thread context of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 set thread context of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6116 set thread context of 3144 6116 msdcsc.exe 106 PID 6116 set thread context of 5848 6116 msdcsc.exe 116 -
resource yara_rule behavioral2/memory/2564-1-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4700-8-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4700-22-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4700-35-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4700-34-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4700-37-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4700-517-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-777-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-1009-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-998-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-737-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-738-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-1010-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-999-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-1295-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-1294-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-1686-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-1985-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-2944-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3008-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3043-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3103-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3127-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3175-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3187-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3211-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3248-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/5848-3260-0x0000000000400000-0x00000000004E8000-memory.dmp upx -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_846542503\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_846542503\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_680716011\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_680716011\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_1245622908\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_846542503\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_846542503\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_846542503\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_680716011\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_680716011\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_680716011\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_1245622908\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3648_1245622908\typosquatting_list.pb msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31174687" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "3315489117" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-649025904-2769175349-3954215257-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133894013428057771" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-649025904-2769175349-3954215257-1000\{C12C5793-3994-427E-A6C0-669AC2A5AF29} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 6116 msdcsc.exe 6116 msdcsc.exe 5224 msedge.exe 5224 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5848 msdcsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeSecurityPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeTakeOwnershipPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeLoadDriverPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeSystemProfilePrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeSystemtimePrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeProfSingleProcessPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeIncBasePriorityPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeCreatePagefilePrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeBackupPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeRestorePrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeShutdownPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeDebugPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeSystemEnvironmentPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeChangeNotifyPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeRemoteShutdownPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeUndockPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeManageVolumePrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeImpersonatePrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeCreateGlobalPrivilege 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: 33 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: 34 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: 35 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: 36 4700 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe Token: SeIncreaseQuotaPrivilege 5848 msdcsc.exe Token: SeSecurityPrivilege 5848 msdcsc.exe Token: SeTakeOwnershipPrivilege 5848 msdcsc.exe Token: SeLoadDriverPrivilege 5848 msdcsc.exe Token: SeSystemProfilePrivilege 5848 msdcsc.exe Token: SeSystemtimePrivilege 5848 msdcsc.exe Token: SeProfSingleProcessPrivilege 5848 msdcsc.exe Token: SeIncBasePriorityPrivilege 5848 msdcsc.exe Token: SeCreatePagefilePrivilege 5848 msdcsc.exe Token: SeBackupPrivilege 5848 msdcsc.exe Token: SeRestorePrivilege 5848 msdcsc.exe Token: SeShutdownPrivilege 5848 msdcsc.exe Token: SeDebugPrivilege 5848 msdcsc.exe Token: SeSystemEnvironmentPrivilege 5848 msdcsc.exe Token: SeChangeNotifyPrivilege 5848 msdcsc.exe Token: SeRemoteShutdownPrivilege 5848 msdcsc.exe Token: SeUndockPrivilege 5848 msdcsc.exe Token: SeManageVolumePrivilege 5848 msdcsc.exe Token: SeImpersonatePrivilege 5848 msdcsc.exe Token: SeCreateGlobalPrivilege 5848 msdcsc.exe Token: 33 5848 msdcsc.exe Token: 34 5848 msdcsc.exe Token: 35 5848 msdcsc.exe Token: 36 5848 msdcsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3648 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5848 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6012 wrote to memory of 2140 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 78 PID 6012 wrote to memory of 2140 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 78 PID 6012 wrote to memory of 2140 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 78 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 6012 wrote to memory of 2564 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 79 PID 2140 wrote to memory of 4624 2140 cmd.exe 81 PID 2140 wrote to memory of 4624 2140 cmd.exe 81 PID 2140 wrote to memory of 4624 2140 cmd.exe 81 PID 4624 wrote to memory of 4360 4624 net.exe 82 PID 4624 wrote to memory of 4360 4624 net.exe 82 PID 4624 wrote to memory of 4360 4624 net.exe 82 PID 2564 wrote to memory of 3648 2564 iexplore.exe 83 PID 2564 wrote to memory of 3648 2564 iexplore.exe 83 PID 3648 wrote to memory of 3412 3648 msedge.exe 86 PID 3648 wrote to memory of 3412 3648 msedge.exe 86 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 6012 wrote to memory of 4700 6012 2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe 87 PID 3648 wrote to memory of 844 3648 msedge.exe 88 PID 3648 wrote to memory of 844 3648 msedge.exe 88 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 PID 3648 wrote to memory of 5040 3648 msedge.exe 89 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5176 attrib.exe 3328 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:6012 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" -- "http://go.microsoft.com/fwlink/p/?LinkId=255141"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f4,0x7ffae60af208,0x7ffae60af214,0x7ffae60af2204⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1784,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:114⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2620,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=2568 /prefetch:24⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2128,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=2656 /prefetch:134⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3696,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=3800 /prefetch:14⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3760,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:14⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4956,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:14⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5280,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:144⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4084,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5404 /prefetch:144⤵PID:5572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5608,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5604 /prefetch:144⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5856,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5864 /prefetch:14⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6228,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=6208 /prefetch:14⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6416,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:144⤵PID:3844
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11405⤵PID:5496
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:144⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:144⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5660,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:144⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6560,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:144⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3852,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:144⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4072,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5564 /prefetch:144⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3452,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:144⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6044,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:144⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3436,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=1964 /prefetch:104⤵
- Suspicious behavior: EnumeratesProcesses
PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6568,i,14947670125409980530,6915285279690057393,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:144⤵PID:3116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3328
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5176
-
-
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6116 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:5044 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:6064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc6⤵
- System Location Discovery: System Language Discovery
PID:5204
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" -- "http://go.microsoft.com/fwlink/p/?LinkId=255141"5⤵PID:5136
-
-
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\msdcsc.exe4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5848
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:3476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:1120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:2796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:2412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:4756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:5020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:1928
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:5968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:4612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:5624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:4620
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:5152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:3672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:1364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe1⤵PID:4120
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD57fb3fa445a601487229c7cdc376dfd17
SHA144cad52edf339fcaa132e8e53325402b190101d8
SHA2562f49d43250b5a1ee2e5cbbaf2ca97ae05a8dad5bd2df93495fe3f95ef0e493e9
SHA51286f0852a8ed838c227f73149c22b315cd4cc0045716ef2170a493a52c8b9ce3efb5c9ea9a1a0a83e4fe07f7b5b32d7782935722695fcb33a378f5e33a970908f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
25KB
MD5e745bc5dce91adc48e469ab86742ef42
SHA19a035d3282318392407ca1f1d178523054d6853a
SHA25620dfa623f0e24908e8e2211cc011c8d1b0272446c97d441627ef23a4307c02fc
SHA5129e87fd90116837a4797e90eb147c791709d7d7a8f0513763bbb35b8681928d3da27db9a6d522bd0170d389722c98590209573c1b1abbf93b08bdf5ae07ad8e2f
-
Filesize
88KB
MD57874755c7c06c4cac76b62251118ff40
SHA1f7eee2bea90e11445b2cc51e9e349dae7a12993e
SHA256b9976426de36f3d0084b959a75d7e968cd1260c31a0ad34b8f8550c4b37d7c99
SHA512f7c7efca1c907bd938001ddf61d3fef666453b202c9df164b1897371baabfa5bcee46a85da80f3af7d9354bb32a110da8993de3cc11251e41528c54d5af6cf82
-
Filesize
61KB
MD57b4d28f1b202885ede27b21ae1a3dc9c
SHA197cb4a269982052707bdddd20a50ddbf5a5eaab7
SHA2567ed08d51a456d6a77e89452a87231ccc957fb4bbe67bd9a39b2ba29e04325ef0
SHA512fbde0fbac4a3cd6c65d446a414b721da4f8264e89e10e60642f3b75fd6c36607560f6164bf9205a66d2021db29f26943390a3ac55b7fb297b00e7bbb94dca499
-
Filesize
288KB
MD5dead391cc08058049b419297ccd12979
SHA132073e3a87d1598abf5fe9ead4036785af509f04
SHA2562b7103ef48956d46052b5fe2305ef14fbf90af23c22379761a1f5a3a748d959f
SHA512d9a0f21e0d01058b335be375b50c4ce3dfdc1088e0483817fab5e19246bafccf8a563d4ace7a953ebe88a4ee0086149d00e43583b40eed616538e47d439f26a9
-
Filesize
19KB
MD51b260cdc6bb984c36d9aa2b0d3c3183c
SHA166d4d213df2ecff52ac99a63bc7023affa8748fb
SHA256f2416a9d280a75bc55d99fe9a66af512f3aa1ca9f3a296ab1c9466cbc3bfff13
SHA5128d855f94fb4b7691882fd4855c864cdaaf887e941a547977d51307bf2244918ba0bfdf7ad7a8ef2dae837cd84af5e57b1d807ce71f5cb73346a44a6a4313bcb6
-
Filesize
17KB
MD5f48e071e418ece734fd8aaeb66ceb328
SHA17834bfd4d4747f21f57b83f529f20688cb7b3ce3
SHA256ed170520a251a80fcde890d73d7925f3adb1d102541328ac7057e55801f1a95e
SHA512dc7a58099e6d83edf3a9779fa7ecd2da816ef5f96717b150f833645c21e008ffb038a38d94b7f58347b0d53c4d17286cba3381f1034c38dac946104e8fb5354c
-
Filesize
18KB
MD571c9d9338736dc5ec7314d6bfb670197
SHA1b0533d09cecd2185ea2c5560b1b74aaaf62cd48c
SHA25635d1a963d8f0c322de2979d34402b02d68d710ed0670ae39dc7ccd25803d2814
SHA512310d11b265a2a8f414fa171fb0005f4667de3f72351c94f9fb82d149be4011628cb28329de1b94f85ca19245ea05152257045f03498921d4470bdbbd3fac327f
-
Filesize
62KB
MD519fe34a40d877dd7bf35dba35cbfee68
SHA14d6eb1fc1290143e09441c8b906af54670730180
SHA25670834bb5565817699dde7d8064d360760b22e17c81d96b510fb9dbf5ead67d75
SHA512ab24c3ff28fa8ef77f995df7d6891cb8c67c01b55ba6935a5d6f25ccc19a994dc7c790ecb7788ec5684b94b20ccb10cf1ad84ea568a9c45c00cbca51862a48b0
-
Filesize
19KB
MD509e5ff7550d6ecd7d04cb81d1b65bab5
SHA13dc0c5572687427bb2c48b2be17789288bbefe74
SHA256ca9dac86d2d13ae8f435a2500634718b4b9ba473e13491f2475a408fe59266eb
SHA512d1df1e151c16668473be482592d3e96c84230440e21b88954f80950af879b2a20523c7f94b5bc43e7c8bf32e0e6af0bd3d2f2d0376b87e8a7c0f1b24853b9573
-
Filesize
22KB
MD57b0bac8cbaeb41af8a4836a58a217c46
SHA1772e89019b1f49301c787b3cb0641ce2744f36f9
SHA256543d4d38b98106972c3ecfeb5586139dbcb8273da4793f3a0cb4a08e8e5bc422
SHA5120fff6daebdc6d2939136e779ea6254f4aa6ce22c21019558daaa842e04452fc58968f5fbca2664619af164090e4ca7c8d4d48d101cb5c72bd6f07d47b55b76a4
-
Filesize
19KB
MD5afd4ab6755363d8bdf994ad082c84427
SHA18019d935bcf86814e18ac2423dfc4926e55f54dc
SHA256a5b03f2f35b1e5a7a6b4ea7b959eb691548dbcd5ee7a75f5a3db67aa2f171531
SHA5129943b07d4e86fc9bfc9ceed0936e4b57ca2534dca1eee71a230bde86baec088db5c9beef5df057d76fdc623f549010423dbf9d149e0ac6e02b1dda63bbf16daa
-
Filesize
70KB
MD57375234398d3875dc919172060fa27a2
SHA1c35683ad83c94b125cb10ed3cb2f8a751fd1e74c
SHA2563a9418c7b1bbd5d76db2c1850c000b41a1b0470cc96d29357ae9a51e42f8be36
SHA5127da71b593fb9f9966d227e1b1c7f783c7c6b76615b7cf38bffe532506540367d4a14212f1879d23b7d813691f64d4e5d6ef996b5bcf205472d63dc6f4f080f49
-
Filesize
35KB
MD5ae46a1eb14eb39c8fee96900030bcc52
SHA1ebf0a1f2981e4d6407a92ba3566928f26a6c7a80
SHA2565ae8e541b016e63c4657db841b5fb92a135d3d1f4367cbdfae5d550671c69b12
SHA5125c2857467e1fdd2a93b0b676e8b13609d6160938260f913e96406a6aab2abfe0b345080afffaf6c6630fa4d82e853ac4d05fef27365c8b4da07b0a4326dd43d3
-
Filesize
122KB
MD5418dd3aab96c92875a25a609cec9e9cc
SHA19762c0775e82a88312c8b322bd22fe561fd75479
SHA2568e6b44dc12cf147b6dfe4f77f756c6a34e6b8ae9795c06f379e01b61cd023aa5
SHA5127ba2f5af1a4c3c23a88ea06a9ac0c8460803ff641747846c15cabdd81b01a7c483e3fb66f622390ae0a8f51667f35690da0127b19e6b13ef62ff7dc4f8a7ae3a
-
Filesize
19KB
MD5c15ba9b4cf9f3aebc3547980ebc3f06f
SHA1151f994eb32e0aa7aba74b664853ea24cb032b5e
SHA256491c1066b4a68921622e0e90e1d2a510e3e76a736590e174b1946f5416f1e2cf
SHA512425c303f00f96a2aadbb9031b4a2204543afda2e5726a21d396010988e06228d6cebabb43bf4c26a07dd2f1500ebf8b48fcb892010f7d2651746fa5a9659022d
-
Filesize
30KB
MD5cba9f99c30b9fc5e31955fa4097a46d6
SHA1eba62321273e5b639f0ad6a5f29384b6cb899639
SHA256fe51fc4ae3054b816f7b4fecef61abd75c263232b95c269399b26c40ecbed398
SHA512f3c145ad749e2436557468d5613af7fa7dee2242253b4d0f4c2da975c5842542a6ec87a75ee3d188895320f5c8f577d72f4e459153d8add3a4eed3fcdc247b6f
-
Filesize
34KB
MD55e9bb86c75b5054f227fb086d3fba5af
SHA1b6d1c871c23cf2121999e18a78feb1b3b1c3adfb
SHA2564cb83c99952dfc45f0171c9bd568a301901f6c6f063fd75f3700b44cc57af4f6
SHA5121e38d329cf6bca6b2e6cffd7afd59dd3cad52a8b3a8aab2a12f3a4ed77f176ffdc0aa76f800f4c5ebf58abd75526fee90927a2bbba3fcf3657b4b9561c2debfe
-
Filesize
18KB
MD504faba7013dd8b536d4b5391b3064c87
SHA1c6fb9c52f8f85c2c98bf9637dd9ba0cd32896696
SHA2564ece0bf3dd095a4cfc3e3bbe532c7876379bc7f56c09d484e63640c0c61f4023
SHA512063271fd7f1ad4a91c21750542d1d59fc4a8ab51bbd34a5a1f146c588a20251ace58a02800c5db77194dcf44de929ef275e6c98588587b74066300f3ea2930c3
-
Filesize
16KB
MD5b481f7d06660fbb5cb532f35f009a457
SHA19ea55a00b53d57f04ac841330ce869b1ed5ca4e7
SHA256528344fde940658e528ea4a9b7a78606980907d22f34b36564ae5dd0535c57fe
SHA51285369eadc1585c846180ed7b1733cb3d0dfea270af31c10130754a06a14489bdc8b654db4fd823c81d981d2f44a886db391cc65daac6354d8fe839847136ba5a
-
Filesize
19KB
MD537e9477d9a7fb60f1c4539c2db552415
SHA174b99b0cf62d578e0a0c4746adf2a079eaef2ebf
SHA2561ad38f8a13b799097795c83b92b745a2b970d043fb41ad026a9539fcad53c25d
SHA512e7d7c7e7896b2800606c20f5c9e1497b2ff8d3ab8c27c3bd0aa00c1533e91d8a725c3aed1fb90604f2f3b127c444ce87039fe301f368832996f0d9db57a077af
-
Filesize
23KB
MD5a43ea047b24800189bca103c174b3b7f
SHA12aecd90ff1fda9a713dd5c6b877a170c63fb082d
SHA256c7f1a9c1a7210d42ea1994a0020338757aeede5d3ed21d9d4f6806c3c1aa29bc
SHA51248e2dc93d6b057214a15aa0c3028abd34662be7ab4bf41005c806b700cf47035d64a98007f455166f05d4884ca2cef5717f06ad9d166f1fb740c4418b48bf36f
-
Filesize
25KB
MD5f2d26279a6ce3bfcfe96e4fb9a128a60
SHA113c504b3b14cbbb51c9e43a91c9513d51998d8f7
SHA256d7fc3d49f0c8a218361d14aff5b626cffbc61dbc5c4241b46b588de3da43de15
SHA5122c95054ecac94b7c09bbfeb6a922f53aad41e3cbe97a2e46aef79a9e325778f0c629bac86fe4e9697eb52f8516f47ebf6bfcd2e2e969108c7adde60faa4f98ac
-
Filesize
26KB
MD56d10660b727dc708a34e5fb81bb2dbd8
SHA190970fd26d2b71ee40db7f2bc8d87b22da802217
SHA2566acf9b50cde024a11122d77b149381e2bd3598454e1b933e1e5de6ec2bf56adc
SHA51280633592994d3e916f6cee23a3c83c96afa3a93c0e2e6b319d2b2996d38cfb5e06a974986a30915736635ba12de7e2f614d4380be1e31866fc266eca3d08495c
-
Filesize
35KB
MD5ac0264c49d92339c3a3e181e10dfea45
SHA1923d192588fc0b27ae5398e40fe4008aa268a17a
SHA256e9bd23fd95d0f4cc7d7edb921bb99e77dda62e5b65a073237009e3aeffdf0e68
SHA5127dc55e79667396c6333910f3f65ceb44399fd27f6248dff1e1f170a5919338e13350009e0abfff9d98642a1d4e777ce3ffe5f6c9bc2aa06c93514341b82bde1a
-
Filesize
74KB
MD587cb684bf9c7d2fce716f239451b58a8
SHA1454e99158c9bb48ddd712b48273bbd96fc3dba90
SHA2568d345abafbfdf9218bfffe9ae7175a1db701d55849ad174466491d93e8b5041a
SHA5123ec04c7cfd1921b10a14d20ac0930489cba7b3454268d82715b46962277a84e0e6de14d4fc31cef993129920f99aec972f36f7a32e11b3fe9ca69b3579794548
-
Filesize
22KB
MD5733eb9e4a0cf30e5a06182a664c7ae03
SHA1444994be52b66bfc6b4d8c76f04c8538a231b9a5
SHA2563e2136bd63275265fec86de2adc257f5289d24921f011dd574e05d43ca0772b6
SHA512a1c41fd3cd4bd528e294ed7f51d85351d42cc43dede5b6c66cefe22cd11e95fde31341775438ca9f59eea6a31fc954373b529d4b51ca30edb88e7d03e33fc13f
-
Filesize
42KB
MD5f711af49a99302808e312bff543cdb44
SHA1b2bef68d48f98e478079f9532a373b728bcec073
SHA256ebd449766f56948dbc4e9275023cd18c83c4189dc29651a4cfee3487e92c4944
SHA512f33500ba541004e2ba4070fa96e54c44018017ee5b736380ebf2f8c8c1f735b5935af772b3f3d82279d7f47db88fc0aca626ed8b9631bee77256d8f23e032cf4
-
Filesize
44KB
MD564693d0572d830199ac9128fca491ba9
SHA1f3e6eb01ec7787b7d5617c1d7b345243ff2e96d2
SHA256949fa85ff997991d43f95de17210af1817915cde322e1dbb8715e91cbcc90113
SHA5124d42457cc17ccee840f92ccfaddc3f8456d2e8dcb5c725e1ee04db8289d8afc628d7b338ef3b2adb4f462a2a2df758b5586f8d89c6c5aae6d0a40bc0cc78227f
-
Filesize
16KB
MD5f237beb2cd11733186240256aae0fa20
SHA1f8b24c4e6f966d987f7cddc7b435ee917964d3c2
SHA256ab665231c9a1b9af32bb4046d83122b24d14e744166c4ce896a560f37b8f46db
SHA5122391ae955e8a9e61833c16e8e80c89652a2633ec42cc53508af4b7689ef0aee08b6072dc2f9a08ab0e4d5886509475065762facd528cb528d2097b88750ddfc5
-
Filesize
134KB
MD55cc77c86b0fa89388d64561a708ad742
SHA13200ac054c0af3c031fca8311af4cec33a8c2ddb
SHA2566b0bb144460683b5780821f6825c9ee20b4dae8aa24c63fb3a0dca8734227799
SHA512cb03a5c93d8b0dda2cbf137d2e2f10beee50e80d9afa6c52f84a9ebe5e4869d9d7b52952d573c6143632f998fc6112688c7335328ff525a24ba6ff93fe5a936d
-
Filesize
26KB
MD597f3ad4071cb7c5298b609e38991ea4f
SHA1df311b21eae5c91e65404f709993593742a001e2
SHA2561dff81ebdc5fb4102abd47366fdaf8e6445fa89a0df1bae935d38d04679b69ec
SHA512e1f1413f152d555cf4106b97a1c1e5ff871a3839454ed25ad85401b6df04d2b3785b0bf19bb4a755f44404b78f9ca0cf6c740da1b037f6406521c8752d332d96
-
Filesize
48KB
MD5ecdc7a13b33e816d632ad176fb6c5eb6
SHA141f821c98d111922426b7f76d420249b6466b046
SHA2567c316a23d39a0e94654b635e4e918daeab57b126a19e8e853b8847b31f8b2d84
SHA512fcffeca45d6773a0b8654af6d7670428112b265406178ab1f3e3eb6ff300e206a3e7a01a7c860107a576a7c8477a7925f49a77389d3d535412dbf3824f234b46
-
Filesize
27KB
MD5bb46b77a6fd55425d817fe96a01b87b7
SHA1287aa6b764fb0eb4367309e15c321b40c06722e4
SHA2562e7dadaa3f5e8cd8f709a2255b14fd6756e18e21b059388d0dcd0a5931adf103
SHA51288641d0475744e6adf7b602fc92391372b32431a256e8040d354b29d511f76c64d9c1fc809b86201a7c6801b8f5839c931dbceb684869da272fced86174b68aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD5807d1588f0579ceed34d502023076f8c
SHA1be0bd21920da835c8d43385258c181ee4137ff0e
SHA25616605239745fa893d9335d25a965700a291961b5fa400ec4ee33a3f358b20ff7
SHA512d86fbdae15db8a81fcba7b3bdeedd2b9bea54e95ae44077e4656b147a3136fe779fa013e16dd330e4b8273067efd2128a7d4e01de8b6e7b141cd5d168d4b3814
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD5be999ea1aac5bb4b4053a1ecc4af2fc6
SHA15c98f2ee5d85b49f40470d4f56a21211baf641b9
SHA2562e772d6f847f1ccded825f981713a06e16eb3e347c28a12e27a6281b31d5fdd4
SHA512bee1eed163a80e3ce1ee7cea57e09498eccd520c3bc63954fcfb05aa43c908d4b562f5d31d7f101bbba02a8a548eaace662dd527ab6286b5c07a88a960c6cbcc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5842e0.TMP
Filesize4KB
MD5b5c8ceb64558b795429882a0685268ec
SHA19eca0bd1e4c1235373160119f8f5f82f9ec17dda
SHA25675b46454f54dc536b0d730ff425acbd645e6c1940b4450b4ce29e6d49cef992e
SHA512d5eca093042b65343cd5ffceb3aa853727a8fd1375fad2c27235030ae02cc92d94481a22fdff405c196c4623e45943591e1f013cae2441e1d73ece17e4529c4e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
5KB
MD5cfaf0fac2e24abab07fb7f60061fbc37
SHA15670f521a7324ea09e3d86c85ba49bc2a21fba57
SHA256f5898a67150ac6eeabde95728dd4d167a882f4d986ba742bc9aaf453d72a812e
SHA5122f13461eab523d8014c3f6287c526f52577754f14483189898ce556c0c329b2ff8969682f9cb3033cdf619936517f67e62d8517a3babb250c0950d4812394437
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5e08e2ab55e9d902ecd30d0db1a2b7b6f
SHA1036bfdf08b3a65f89012dcc6db228b8668f97569
SHA25647bd79f2c489e65ea09d3dbe8ace1b88683937d5dadfa60c88ac62d03db964da
SHA512b5669ffd8464c57ae3f6b49533000f4d60773cff25c962717d909573bf7fd7195b462a33ffe7efe19f19a595c47c3a7660bf76e68c0fa56111d2b75a74578f12
-
Filesize
17KB
MD56078d4b83fea94cd88ef1bcbf4b6c496
SHA1227c62cb75f99f1f9b7422c6efaf017abb472a82
SHA256c61e34d1c8b54645d9555dd47ac2e63586745d2aac616df5604ce1c02f835b78
SHA512cce2e3002c088635ee7f07d22d0a79ef9e2ca350a04e0fb9cce760b1bdf5c04cf7c6b19a5129b13fd8fd483a975ba6eb57f99234e6a914e2e8ebf67756242db5
-
Filesize
17KB
MD5f34cd44811be4271296dff85d4ecf8f2
SHA10a08fa0cb87039e4e6948991f990b65645f4f956
SHA25613bf0f17f901642025966af3bfcdfc73b3a98c16a9eb888ad989785de28dde4f
SHA512acf12b8020b8c46a239c469202f7f28dbe49a6950fa0923df62fdf1ee7f3a661e7e7fd495453ac0cb6db4e1a6b04a47a7fc5fa3b6159a4a6a191bdd07319fa33
-
Filesize
37KB
MD554526d1d12ebf4dd28b6bd1d00cef476
SHA16577b12688c35d694a6503a4172ef47dd1f861c8
SHA25603ca91a52275e5e53877534f93c57039a5db14357cd4c3157a5318503eabbc7b
SHA5121d3d29bb013fc05919c3102ea0ce3bf1820354a86be92437a3ae0b6149c3dda457def8cc110070496a3ec4e3c6d3142c370500dd47a54e4db97904e2ec70a5f1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\bf8763d9-5c76-4a13-8f92-8da9416407e1\index-dir\the-real-index
Filesize9KB
MD5714162247f8325d6e73ec070e1b13a9f
SHA1ed31b920e507b85e6b72941b8034fa3ab3ec9c4f
SHA256fc1f88f5c8ad06f69d1c51ed4882df157d67a2e8168e5f0a396e3347ed9c8c54
SHA512fd7f7fdc08e887eb33d1b89d65ef6cc8fb52b9d2a210607989fc2d6915bf0651c1429a5176a5589090a94d4f9de0544c6a25403ab6ef5fc9727d104b9bb45c03
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\bf8763d9-5c76-4a13-8f92-8da9416407e1\index-dir\the-real-index~RFe589cd7.TMP
Filesize48B
MD5ebccadd5b592d1b036beaf387482f7dd
SHA162d23a272c91b14c8ad759d37ad1d70f518df7b4
SHA2565ea3622939aee781acf0cb33a7f385c24b1a4ef34328f6c321a2e04a49d02ce3
SHA5126a4baf35b748aa743f50e4c00cb1e28dee8ad4717ea2591cf6fc72e197aa3783c79f00481758811ce5767c030bb3b638ee1f97638e0b8a36a0bec8d694c061f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\index.txt
Filesize115B
MD5f623afcc2e5fc5cf427999c5f1f4efe2
SHA179292ba38d96d0fcefe277445119e7296ef903ca
SHA256e30300e189d26fdfcf7ef753da97bbb4a2436c2b32d2f9a6332ca724073d5b7a
SHA51220049c3335f5f3cf78d23fc82c0633fc5993e97897d533c1cbbc988c07c19af6cd63e4e7e2219d29fb85d1a7d72afe39787045238295e6839893e39e39cc655c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\c1eb0cde2406b6af565f825dcd492589d40ab644\index.txt~RFe589d16.TMP
Filesize119B
MD5f2252b14869bb24ea44567a9d6045845
SHA15b395ecde916a0b16d2427bb9b6e5abb6d31d6f8
SHA25640da4cafd82c3e542336aa3a7cf0f0e4cda5af466adbef9afd70439ca0e51376
SHA512ddb9ec4407d3e7f0d85919a8824cd9cd359caef4e6315aedc23f99f0dccaa5b180df3149c44a111aba9c1af1d062fb3c9fcfd44d9daeaadf523488f61951e893
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD524373e7bdbc0abc15feb5d934033deca
SHA1363c711b6fb6a00a95975d5e52a4310ec571cf24
SHA256ae801b487e6253876d387b50ef5524d278fa1d786f803c8886e662ed31e40d1d
SHA5127cc24867050fdff6c4d95fcbd73f5ce03364913b6fec8ac96f72205815fd2d69203acb720dff739bea55496423da98dc151e8b3255092de4db1c81b6710c6e87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f77f.TMP
Filesize48B
MD503a0a234482eb4e8ae047500c5c5ef6b
SHA15b6a5550e2fcdc08875c6ebeb0237b47e5dbd8dd
SHA2563e5fd6c528de0e5485baa2e97d0cb1dab72dd825a7cb0619c1c81aeee7e53fca
SHA512954255bf8fd3a80b89758f58732e0d32618fd89b7a73b8c21cf183d64bce46092100361fc989d2aea2d46b6cc03895dc7b0840708c68b3737db4f4fced7f40eb
-
Filesize
22KB
MD5d208d8b162d9488932e066d2dbb2083d
SHA1df6b7011b67d6a7a9dc5e02a8349e881b18c565e
SHA2565631e509e28837f8e041c3c8f550a89968ee593e65517fac58ab2e044843427e
SHA512fc2bdc4ba0a8a6debaca6dcc60526c363c9d0231bb1d045dd9f3d37c94cb9c0fdff280bbee0d5d38c7b5bfd0989f2c562b58841a84e4b92b9250b1e74beb306a
-
Filesize
467B
MD5cb0420ed7436c47c80c2d6ce56792e29
SHA1c9bdf6a007bf7da9d005b2f4a12c38ae9d2c70fa
SHA256778580a4bcff7746f936073211297b0d096facc289d57eacc79248040f2bf4bb
SHA512c16d1b9224d517a5328b5628f19e54096be9070ab8dbf064f5582a0a1bb3d5c60b385156f1addd0cf4410abc9ef0b5a701250fbfb804d8c38bc16d153f75608d
-
Filesize
20KB
MD53c15564535c69c21036d1ef774911f30
SHA1714b8be435a8237b32fbe921f56d30649bb4b275
SHA2564af450fe7569bec65100e7d33fbe6298e35c2b54dfb601ef937995920bdd1bc3
SHA512bbdbb8949c4a179a2f4dd4eafbec116c11cef75fdfb91f96d9876f633e831e0322ec31f98f80856bd7460fabfaede1eee2bb49b77e7f649f65c38cf5a0e92e62
-
Filesize
900B
MD53cf3200112ad30faa69bab2e4bb2f491
SHA1f6f02b43aa60bf5e161fc200337ce86a3de78f1e
SHA25625cb6ebfc9ba54cca18ec8717bede872fdb98a6c213c12f5c25f380237e42ea8
SHA512e9a3ed034acb073d50bb48a0a38f80f7fdf7cac1e5cb3fd5643e23288ec0d99ed0fbacd67593dd9fa3936d5893917e0c77eba03b17715a31da6b937542cbdd45
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
41KB
MD5f657f8db2441aac4b9c54ddf2ed923b1
SHA151da443640c8a7ad5d20b0d1c9e842064c08a3fd
SHA2564fba1a599324633b9a848d73c412e381309fa33fe4738d1f03203420e96971f4
SHA512a3ec41a7c32a2eabd28beee0e70333439460d83d86e7ec4dbfbad0d38dc9294c78e942a016692c848a1dea1cb17aabd87236349217f1f907b5b9462ae83e2ead
-
Filesize
41KB
MD523b21a75e317bc9f17be5c4d9ed55c50
SHA11e008e42e09c19783feb399f527037ce3f802a87
SHA2562e469ef9250e424103ea61f31a8f6e3d7a6dde09ce9f40f33aef0984356e967e
SHA5128ee864cb7393e83f25befa7abc3ed9ed15b9c03e720503b181427e7398128c9e8a1458c0a7c2e8bd2fe0cd13a9990c96212fec923f6e67dc1a970f0cc60775e0
-
Filesize
40KB
MD54123f24b145cedf0ba011e773939561a
SHA1807b0ccec2885c2a8a4a91fd8ab4ba315c276848
SHA2562982d49e2473d9b10714aa134e4a46265d18057f815bd61298a32d907f3c8559
SHA5120659b861fa52b405c9c62817e7c9b6b26d5dadcabf85ed980be19ac38e00d8f63900c3bcbe1cf531fdd34949341d72e09555bc920d7851c2552e3799617fec1d
-
Filesize
50KB
MD5eef13d9619a265ab439568ed3ccf7fce
SHA16e29c8eb8541808631e9340cd6e3a0f9e9f3efbc
SHA2569b05059f5e8b908596d17e82126852a6a19aced0a0c6d0a3912c2310d1139d17
SHA5129ba6b5131de1ef244aa69634dfa91237551020422b7b628325c0c3ef4d41918a54900211ea675bf58ef9279564228885dd62853ea2f60f966c1dc8f822d3d368
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.17.1\typosquatting_list.pb
Filesize623KB
MD55ab9b7f0cc325613a81d9ebcd04aaf2f
SHA1c7599611befa76f7897067fe24dabb823762d1e8
SHA256578117941516ab6624486eec10922aa8fa56526e45fab4422c722784654eb8d0
SHA512fd20a7a9a4f83211edba010a3dd4c372b0d74e5e9a7c62978fa471e3dfa671beab8c379b6f74a13c2d38b40b4ac95c68544e4128f6b2a50bd383c1a5f1d97ebd
-
C:\Users\Admin\AppData\Local\Temp\2025-04-17_2936e22ea8907d6f85a25b2feb62650f_amadey_elex_rhadamanthys_smoke-loader.exe
Filesize527KB
MD52936e22ea8907d6f85a25b2feb62650f
SHA13e367491a43877ccf90ec1b2a46af3153fedf8a7
SHA256e378da59a68622d81932cacab8d8193de42ee4628756dc116c74d70efb6bbb69
SHA512dee95cfc6f7e9c2060bd9f83a9466fe0f7ff543c8b9b790fee398c0133be2bf87c73a6dfdae9cca7839f1633ac104e469d3811d248f2c952ae6470a970729060
-
Filesize
118B
MD5b6c3a53fb568b72d31dec81b067c9ff0
SHA177728097bac348a4717aa95d4e8009d225482293
SHA256602e1e0e0c8d630ec9f04f3f70b54ab0281942f4107e77047774fbdfa2d1acab
SHA512b4d2204d7d30f7e09dd41bfcfe1ed4bfbee28357b49caf26d2a58f3c8346196f153616758eb86b1f03eabf02180506cbc36b23156fc47ce1c0b6922a7a4f718a
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1