Analysis

  • max time kernel
    153s
  • max time network
    162s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/03/2024, 11:32

General

  • Target

    gay.exe

  • Size

    1.1MB

  • MD5

    088ef66571d8d08e8e8f56d9464d9a2b

  • SHA1

    bb77ae41dd0cb709f3938f264463aa2aa6943071

  • SHA256

    6230ef10cc3c6ff83a0ee0c5d87273ccae68c0f61883b9a218dc4e0f2b351cd5

  • SHA512

    1cdfd8428c2fcb29205be394c9a55824e7a5407611fd694a52526196852956e824f57e76e332b0c8d984ea8577f0000dfb9d72550344a9ced8c13e8d74938ccc

  • SSDEEP

    24576:U2G/nvxW3Ww0tVOOfWa+tZDfQgZ9E9SXNmgSG:UbA30VOOfUVvJ

Malware Config

Signatures

  • DcRat 23 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Disables Task Manager via registry modification
  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\gay.exe
    "C:\Users\Admin\AppData\Local\Temp\gay.exe"
    1⤵
    • DcRat
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\WebreviewRuntime\DA0G5NQf2P.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\WebreviewRuntime\TaqdBAfZaG.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3876
        • C:\WebreviewRuntime\comweb.exe
          "C:\WebreviewRuntime\comweb.exe"
          4⤵
          • DcRat
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4232
          • C:\Windows\PolicyDefinitions\ja-JP\sysmon.exe
            "C:\Windows\PolicyDefinitions\ja-JP\sysmon.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3132
        • C:\Windows\SysWOW64\reg.exe
          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
          4⤵
          • Modifies registry key
          PID:1104
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Windows\PolicyDefinitions\ja-JP\sysmon.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:5004
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\ja-JP\sysmon.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4552
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\Windows\PolicyDefinitions\ja-JP\sysmon.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4268
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\odt\winlogon.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1780
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\odt\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3992
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\odt\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2344
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\en-US\spoolsv.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4100
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4900
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\en-US\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:5076
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 5 /tr "'C:\odt\SearchUI.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4264
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchUI" /sc ONLOGON /tr "'C:\odt\SearchUI.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3216
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 9 /tr "'C:\odt\SearchUI.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2348
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Desktop\smss.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4548
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\smss.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3880
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Desktop\smss.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4692
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\Microsoft.NET\authman\System.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3568
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\authman\System.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2904
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\Microsoft.NET\authman\System.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3348
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Default\AppData\Idle.exe'" /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:5020
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\AppData\Idle.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3260
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Idle.exe'" /rl HIGHEST /f
    1⤵
    • DcRat
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4572
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.0.990301646\1543789832" -parentBuildID 20221007134813 -prefsHandle 1684 -prefMapHandle 1676 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c26b057b-9ac5-4e5a-8124-c54109763622} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 1764 28f5f4e4858 gpu
        3⤵
          PID:1460
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.1.491683798\1595788886" -parentBuildID 20221007134813 -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42acdd65-f5eb-4640-82cf-7e47357d4853} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 2120 28f4d272258 socket
          3⤵
            PID:5052
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.2.1453540149\1523066770" -childID 1 -isForBrowser -prefsHandle 3000 -prefMapHandle 2996 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {35cc937f-5ad8-455e-ae78-f3d3970fb5ab} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 2676 28f638ab158 tab
            3⤵
              PID:4988
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.3.1116801173\1549371636" -childID 2 -isForBrowser -prefsHandle 3436 -prefMapHandle 3432 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b27bcb59-7a52-45a3-bd76-853be5202108} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 3448 28f4d262b58 tab
              3⤵
                PID:4208
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.4.664425823\2110091335" -childID 3 -isForBrowser -prefsHandle 3872 -prefMapHandle 3868 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10d580a7-dcf9-409b-9fa1-6f323618efff} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 3884 28f64e49858 tab
                3⤵
                  PID:4928
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.5.509747232\1586745712" -childID 4 -isForBrowser -prefsHandle 4876 -prefMapHandle 3200 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e74f3ab3-427d-4e36-a23e-b6479c2be876} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 4892 28f6574be58 tab
                  3⤵
                    PID:2776
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.6.1991520194\739013737" -childID 5 -isForBrowser -prefsHandle 5028 -prefMapHandle 5032 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ed9bc3c-4800-42ef-b1d9-c4536980f3d9} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 5116 28f662cbb58 tab
                    3⤵
                      PID:504
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1268.7.539380633\1621304133" -childID 6 -isForBrowser -prefsHandle 5244 -prefMapHandle 5248 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9464c113-d647-48bf-abbd-11ae87ae8b0d} 1268 "\\.\pipe\gecko-crash-server-pipe.1268" 5236 28f662cbe58 tab
                      3⤵
                        PID:516
                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                    "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                    1⤵
                    • Modifies system executable filetype association
                    • Registers COM server for autorun
                    • Checks processor information in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:1516
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:2616
                    • \??\c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k localservice -s fdPHost
                      1⤵
                        PID:696

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

                        Filesize

                        63KB

                        MD5

                        e516a60bc980095e8d156b1a99ab5eee

                        SHA1

                        238e243ffc12d4e012fd020c9822703109b987f6

                        SHA256

                        543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                        SHA512

                        9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QO128Z61\update100[1].xml

                        Filesize

                        726B

                        MD5

                        53244e542ddf6d280a2b03e28f0646b7

                        SHA1

                        d9925f810a95880c92974549deead18d56f19c37

                        SHA256

                        36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                        SHA512

                        4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\cache2\entries\E66F5AA5E3C285C270CF84BD11111C74D38F245C

                        Filesize

                        13KB

                        MD5

                        015c1b559448fa34a463b985c4768a9a

                        SHA1

                        47af31165d0c286b5a5976b8fb3d9ca890f33ab0

                        SHA256

                        9fc38b42b87ed47bf2ebc8e18265004186e53604b5728809ec5fdb9c0ab38740

                        SHA512

                        e08ebee36dc54a8e0c2e47178708a66ab33a51ef2ef42c536c3813eed4f4ca3a1dfef9d3ccbb6a3a0c6822d2da5d125699b5d7f556a12b9871f3d3fd5f3ae274

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        442KB

                        MD5

                        85430baed3398695717b0263807cf97c

                        SHA1

                        fffbee923cea216f50fce5d54219a188a5100f41

                        SHA256

                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                        SHA512

                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        6.2MB

                        MD5

                        47b74e65c5426b5ea90b33a0a2890abb

                        SHA1

                        eaf2f06f362d4dd25557fa42e5c4cbb5388cdf25

                        SHA256

                        ce3bb91c67c06db2d89dd9970489d5dba549ada4693c99b33f34ab2a5be2dea4

                        SHA512

                        d9ad58ecca2087cad541249d63f3ef4bbe308dd8b2ce897ceb10858d4b1d5cb5a3cc1906525ef95df49a2460ec7feba169dea486be999c8532383bc4cb9c36e1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        2KB

                        MD5

                        d2f1e62629f0c7040a37563718975500

                        SHA1

                        f0c7351762772e99f742495fd5312ba6cf3b4272

                        SHA256

                        fd2ca43d1c97993fa0e25558a6a91c59b8f8a38313765d3798a2c2c59a9708bd

                        SHA512

                        80910a9a767e33cd916f50d745c958ea20bf057bd47f0324dc66197cb7c49df18cfe060a262adfee45f1817cc402601c57ecec9620f9895ae80df09be86d9064

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        2KB

                        MD5

                        35fe46f2f24c1ae63dc86590b9936644

                        SHA1

                        be97e69c1563de39b8621f9fe3360d043c1adffb

                        SHA256

                        d466b4acd1dfb9a55a01b9411acaf770b0eff564dacf6f258b57f34abd71195b

                        SHA512

                        e4caeb6a8c1d845d0ab2efbd18e09ccd1968eef8d7a39b2437307a1d5a17f8d7e35da6589b257c38f827518fdd403d78ead28d45f04125c286827af18e8d206b

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\datareporting\glean\pending_pings\97bb7d27-0351-4a47-a302-0ba27a4b76a0

                        Filesize

                        746B

                        MD5

                        97f238f79fbb4b8ea27dd0c16960a3b9

                        SHA1

                        d6e4c4f271f5bb4199456b6713164a945d30d4a3

                        SHA256

                        79344b5b004721ad2bd8c6e78e9ca6800df0b07b8fffc0e266312b63fe2837fd

                        SHA512

                        cf3e743769b31f7bf8268ca3ba812cd15f5687d815fd15b543806f74f1b6cd1e2aaaf3c39de353f98e6d9c8e1a3e84171a673c99a20c73219a051d6c21574d51

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\datareporting\glean\pending_pings\f69d34d7-ce82-4a1a-b749-43b292667d6e

                        Filesize

                        10KB

                        MD5

                        471aa5ee96688cb7d6a8baa071b6a9aa

                        SHA1

                        3a535dcb2ba2a301a36b4a28cfe13fb0a7195c5f

                        SHA256

                        e854e2c9412d9c7c5efd0c59b4891e060177770171a39cf7b8e6871b8438a992

                        SHA512

                        62238ee1c1ffa72d7c55e195de80b883e00cc48cf5bb7897b06b2f9aacb94fd260119d562f37697ae97fb59451410dd4aecd984a402d9c7619c2a6127092b6bf

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                        Filesize

                        997KB

                        MD5

                        fe3355639648c417e8307c6d051e3e37

                        SHA1

                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                        SHA256

                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                        SHA512

                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        3d33cdc0b3d281e67dd52e14435dd04f

                        SHA1

                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                        SHA256

                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                        SHA512

                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                        Filesize

                        479B

                        MD5

                        49ddb419d96dceb9069018535fb2e2fc

                        SHA1

                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                        SHA256

                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                        SHA512

                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                        Filesize

                        372B

                        MD5

                        8be33af717bb1b67fbd61c3f4b807e9e

                        SHA1

                        7cf17656d174d951957ff36810e874a134dd49e0

                        SHA256

                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                        SHA512

                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                        Filesize

                        4.6MB

                        MD5

                        25043767dbaa0eab20a4075620c7933d

                        SHA1

                        a88c398c6fee23cb721b18a78ec6206500f78312

                        SHA256

                        3eb0ed4bdd88f41967edf09dc6289e01854ef0370ae718eb3c79ad024c82f508

                        SHA512

                        463150b3ad11853e8e97257a8e8a5c4e0e37fcb54b1a86e8b258741fc094959ba68d7e96dc6c24cfb922d5258ee31d9edf2949ac222071581f78489dca36ea55

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                        Filesize

                        1KB

                        MD5

                        688bed3676d2104e7f17ae1cd2c59404

                        SHA1

                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                        SHA256

                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                        SHA512

                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                        Filesize

                        1KB

                        MD5

                        937326fead5fd401f6cca9118bd9ade9

                        SHA1

                        4526a57d4ae14ed29b37632c72aef3c408189d91

                        SHA256

                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                        SHA512

                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\prefs-1.js

                        Filesize

                        9KB

                        MD5

                        0858b3ec9754afb13021b0b7bb145c54

                        SHA1

                        8b3b7a753f1479d0db2978428de135a796996c6e

                        SHA256

                        6785c3a49291876a0722cb2aa74c1921c06cbff70d22a6f075b25199a07ffd59

                        SHA512

                        924fe386879c1f921ba8592dcc52518fac4d0dcf80cfb02703ba2a6c180295bf1f30409812c69daa6515d33f4f1a00eb1057cbb46b1cda8c3ef3d71146d6710d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        41487ed7b1625fe9e14ecb9078c3bb66

                        SHA1

                        74ecd1f34bad20468db9cf1733687cc84a5c142e

                        SHA256

                        00c498e88a3f9b5350ee849c9f699ce8262ad4feb57c9c051896b8b9afaf3a38

                        SHA512

                        cbc0c4754b65bf87e3677e1fe5adc7c2b5fa6b0d59f0928dc92d328b2632c3d9928061d6566aed69561ac85ad337155c6d0f260732bf11bd1c129fd700c8bc77

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        1KB

                        MD5

                        9d7f1a4e66e8d130792c8dfc1994dcc0

                        SHA1

                        3f10a117851b33ba4b6cd6d11f9ac418e78a1ae6

                        SHA256

                        64e70e12f9d7522342c106bd81223ee5e8a4f32400285b60a3d158e3308d7f0a

                        SHA512

                        0bfb04afb88404de7aff202f45681eb3bccc0edebd00baf2b3de18c6b74fdf946524fbe2eaa2d708dd4e3870b295e64774a8d78665d5db87fb92ebc853feda62

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        1KB

                        MD5

                        7369c52a36200f88dd487f7f17ece7d8

                        SHA1

                        ca35e19cb752eb265be085bbd8e6bcb80ba0b528

                        SHA256

                        4c3e9ab5ed445299020d3f5a1a6903a4557bdc779b8f0fd20171ef684c4a97f2

                        SHA512

                        a7655529d8bde32bd8ecff76788c408f9184ac4c576f2814c49654dc6868cec161575e1f29dd5a1142e752b0aa1d58e405d9b3e89c4064c13ac85f395178dc79

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t2z6vy7e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        1.4MB

                        MD5

                        a4c069af6385b9a7c90647d944c6359a

                        SHA1

                        04f0dbc4ce2f8bb9603312279d259fa306bf69cf

                        SHA256

                        7e9313b7478b27a16a3a0cab0c0403bf1317903db072255207bdfba46dec347d

                        SHA512

                        c1380e785b11cf9ae72976f6150e8495aff1c86f33c7e9b846db31595cf6f42a77f01d4e19773c3011f78e2d3a1e05c48f40d2fc2faab805277a78c626cf4b68

                      • C:\WebreviewRuntime\DA0G5NQf2P.vbe

                        Filesize

                        203B

                        MD5

                        7fa3bfacfe0cacddb6346eeb7778b9e0

                        SHA1

                        78401945f41a85308674f3bde838b26a510e4233

                        SHA256

                        3d3d160d1d8264ac4aa1893fe67933ed5beb63aeaac1def84303abf3ca339f5d

                        SHA512

                        593ad78bad06523899c96afaf02f50cf8cda5ffffb01b402db63d8640beb55cc777dea84d568bc094d6320263d749a45a3d588562af1d2f4a9238595354fe701

                      • C:\WebreviewRuntime\TaqdBAfZaG.bat

                        Filesize

                        144B

                        MD5

                        f58eadc9badc34d4296980bcd9a7d257

                        SHA1

                        cee017450cadfdc68e6ba8c9d26f76cff1586cba

                        SHA256

                        a4768266d92d5695d29070cfdb3538a5fd8557ca3674dc810921a0d9f6212219

                        SHA512

                        320299b8a6186b3af170d6997818ff75f7c34205da139aa0031afaae8e101ab7f2c30479fe5cc40614daf244e0b4d17a7190e0d7123bfcb7325b75122edc7677

                      • C:\WebreviewRuntime\comweb.exe

                        Filesize

                        576KB

                        MD5

                        1de24f5bef4634d54c4bfbf9a6f4cb6d

                        SHA1

                        259126c8195063a6ab7b7af2956a6d6a497aca87

                        SHA256

                        9de95c071de199cf41d87f57608b727247f2b6c444d0beb0693d832fcf37468c

                        SHA512

                        f335441f1abbeff3eea24ec1d75639ef939cf155b94dc88cb130199b677053723b1e54058a7eb64be5acd99908066c91ddf91b4287d0b48c43fb30a40ebc7b7d

                      • C:\WebreviewRuntime\comweb.exe

                        Filesize

                        863KB

                        MD5

                        30f1d9098a779211064a5a0e258e74f0

                        SHA1

                        23109fab7d75cd1cde1d4bd94a1313f432497314

                        SHA256

                        6829753d21c982cf0ea6700ebbc9f78c411047406052507f00dd0169f9db7b95

                        SHA512

                        f69f49a166e88db2331a1e3826554d5fea983becce45260518e65d09b069babcfe3e478c612ad856b7eac79d66e395d3596b69b9caa1444cbf71b56714394c33

                      • memory/3132-38-0x00007FFF6F840000-0x00007FFF7022C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3132-43-0x00007FFF6F840000-0x00007FFF7022C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3132-39-0x000000001BD80000-0x000000001BD90000-memory.dmp

                        Filesize

                        64KB

                      • memory/3132-40-0x00007FFF6F840000-0x00007FFF7022C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/3132-41-0x000000001BD80000-0x000000001BD90000-memory.dmp

                        Filesize

                        64KB

                      • memory/4232-37-0x00007FFF6F840000-0x00007FFF7022C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/4232-17-0x0000000001830000-0x000000000183A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4232-16-0x000000001BCA0000-0x000000001BCB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4232-15-0x00007FFF6F840000-0x00007FFF7022C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/4232-14-0x0000000000F90000-0x0000000001070000-memory.dmp

                        Filesize

                        896KB