Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    192s
  • max time network
    195s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/07/2024, 13:21

General

  • Target

    popepe.zip

  • Size

    30.2MB

  • MD5

    c667e8fb82f2e7a4f0590f2448f50a5f

  • SHA1

    a8e1900cadefe6f297880ceec1a9c0caf4e5fb14

  • SHA256

    460e89b89994f0279284eb1ddb2badf66a7d05abcfe13cf1f2674deb3f08dfa6

  • SHA512

    0f272c08114cfb0fe666ada799c857bac8ddd7788207424efdc24eb00395621ebaa2d6e42f91e7ea3c5ac552d6890db9dfb87e0cf2593b1ec553f33523ca8b5c

  • SSDEEP

    786432:ATe/Wuc3sXxDLjPnF6JvZm9HQ9p2IkkTTsBAnz5uhaJP/1Jo21:pxcCDl+vZv9YBkToy1uhaF/jo21

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 22 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\popepe.zip
    1⤵
      PID:3892
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:168
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe"
          2⤵
          • Checks processor information in registry
          • Modifies registry class
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.0.398215761\1376935484" -parentBuildID 20221007134813 -prefsHandle 1700 -prefMapHandle 1692 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {665042be-e515-4a60-9400-1b9245b9c246} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 1780 26747deb558 gpu
            3⤵
              PID:4772
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.1.48871487\930793984" -parentBuildID 20221007134813 -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03f369fe-b558-443d-89cc-8d5e6273057f} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 2136 2673cd71f58 socket
              3⤵
                PID:2116
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.2.747107536\813304889" -childID 1 -isForBrowser -prefsHandle 2884 -prefMapHandle 2672 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {464212c3-de4b-4d70-8b5d-6feb874dc9c3} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 3036 2674be98758 tab
                3⤵
                  PID:1656
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.3.1897773253\822976218" -childID 2 -isForBrowser -prefsHandle 3504 -prefMapHandle 3500 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d43237b-650d-47c6-83bf-90f151ba404a} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 3516 2674ce46758 tab
                  3⤵
                    PID:2336
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.4.928858827\1044829204" -childID 3 -isForBrowser -prefsHandle 4064 -prefMapHandle 4076 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5d527a4-4626-41ee-af60-4744dc6e0c9f} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 4108 2674ddcac58 tab
                    3⤵
                      PID:4904
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.5.958978361\260570277" -childID 4 -isForBrowser -prefsHandle 4640 -prefMapHandle 4636 -prefsLen 26247 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b41fd499-c468-4725-8b25-76069bb229ef} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 2796 2674e458058 tab
                      3⤵
                        PID:368
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.6.275738258\652948856" -childID 5 -isForBrowser -prefsHandle 5004 -prefMapHandle 5008 -prefsLen 26247 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7254be9e-88fc-47cd-b776-29f156ac2e45} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 4996 2674e457d58 tab
                        3⤵
                          PID:3556
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.7.1411502121\1366223263" -childID 6 -isForBrowser -prefsHandle 5196 -prefMapHandle 5200 -prefsLen 26247 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e56a0704-7bf6-45da-a063-71e2ba9c417b} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 5188 26749697b58 tab
                          3⤵
                            PID:4876
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.8.167451771\335894138" -childID 7 -isForBrowser -prefsHandle 5548 -prefMapHandle 5684 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e352def-90ff-4fe7-bfac-1d52c727158a} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 5696 2674f5ec258 tab
                            3⤵
                              PID:2792
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5068.9.1976718312\2083416481" -childID 8 -isForBrowser -prefsHandle 2824 -prefMapHandle 2620 -prefsLen 26503 -prefMapSize 233444 -jsInitHandle 1324 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {66b452d3-438d-4ef3-b10d-e2704a3bebb5} 5068 "\\.\pipe\gecko-crash-server-pipe.5068" 1532 2673cd30858 tab
                              3⤵
                                PID:4676
                              • C:\Users\Admin\Downloads\7z2407-x64.exe
                                "C:\Users\Admin\Downloads\7z2407-x64.exe"
                                3⤵
                                • Executes dropped EXE
                                • Drops file in Program Files directory
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:2836
                          • C:\Program Files\7-Zip\7zFM.exe
                            "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\popepe.zip"
                            1⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:1988
                          • C:\Users\Admin\Desktop\niplnk\aeniks v2.exe
                            "C:\Users\Admin\Desktop\niplnk\aeniks v2.exe"
                            1⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            PID:5124
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5232
                          • C:\Users\Admin\Desktop\niplnk\aeniks.exe
                            "C:\Users\Admin\Desktop\niplnk\aeniks.exe"
                            1⤵
                            • Executes dropped EXE
                            PID:5280
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 5280 -s 992
                              2⤵
                              • Program crash
                              PID:5464
                          • C:\Users\Admin\Desktop\niplnk\aeniks v2.exe
                            "C:\Users\Admin\Desktop\niplnk\aeniks v2.exe"
                            1⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            PID:5776
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5940
                          • C:\Windows\system32\OpenWith.exe
                            C:\Windows\system32\OpenWith.exe -Embedding
                            1⤵
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:5896

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files\7-Zip\7z.dll

                            Filesize

                            1.8MB

                            MD5

                            0009bd5e13766d11a23289734b383cbe

                            SHA1

                            913784502be52ce33078d75b97a1c1396414cf44

                            SHA256

                            3691adcefc6da67eedd02a1b1fc7a21894afd83ecf1b6216d303ed55a5f8d129

                            SHA512

                            d92cd55fcef5b15975c741f645f9c3cc53ae7cd5dffd5d5745adecf098b9957e8ed379e50f3d0855d54598e950b2dbf79094da70d94dfd7fc40bda7163a09b2b

                          • C:\Program Files\7-Zip\7zFM.exe

                            Filesize

                            960KB

                            MD5

                            79e8ca28aef2f3b1f1484430702b24e1

                            SHA1

                            76087153a547ce3f03f5b9de217c9b4b11d12f22

                            SHA256

                            5bc65256b92316f7792e27b0111e208aa6c27628a79a1dec238a4ad1cc9530f7

                            SHA512

                            b8426b44260a3adcbeaa38c5647e09a891a952774ecd3e6a1b971aef0e4c00d0f2a2def9965ee75be6c6494c3b4e3a84ce28572e376d6c82db0b53ccbbdb1438

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log

                            Filesize

                            2KB

                            MD5

                            7f38048a5b4bb647a43e93df970417c3

                            SHA1

                            f7022125ba74f50d0d4515ca0b47ccc88c2f47e1

                            SHA256

                            81d8c4d06be3654f64a49a2effb3606bb48a37556f4db38a524033d9949915bc

                            SHA512

                            06adc7711a98548c94954546a4a547b2547d63d1f26351a58e17d38b73c02e54823daf99d9aae8311225c02bf9e2f40bbb903ff6707c3ddaa64b1caafbbe342f

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aeniks v2.exe.log

                            Filesize

                            42B

                            MD5

                            84cfdb4b995b1dbf543b26b86c863adc

                            SHA1

                            d2f47764908bf30036cf8248b9ff5541e2711fa2

                            SHA256

                            d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                            SHA512

                            485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                          • C:\Users\Admin\AppData\Local\Temp\7zE4C742EF9\niplnk\data\allonator\eyes\test\bg.pak.info

                            Filesize

                            554KB

                            MD5

                            8a679c02bfbb88c2760ca0d962c0b1c8

                            SHA1

                            70b1528af5c62336043b2531fa7b477f9412278d

                            SHA256

                            bda7bd9f39a00b007f21a4e9b82fcd2267f4dfbd53800379210ab4f91e982529

                            SHA512

                            df1031975a8acdcc471638dc21642c5081c9edb704382fd05c63ca638c61c637ceb97a480a18cfd3a1c784c020a2f2cf853f8c9bad5e3b3e3857c7ee25ea26a3

                          • C:\Users\Admin\AppData\Local\Temp\7zE4C742EF9\niplnk\data\allonator\ipv6\lib\browser\jsbn.js

                            Filesize

                            14KB

                            MD5

                            2a4325e2473367762683c8cfaa431e5e

                            SHA1

                            cd9abab16600becbbd25dbd460de044f8ec6835d

                            SHA256

                            61de67d61cf9977a30ebbd11f82570d4472620e3e15af06e4c6564d96faa091a

                            SHA512

                            4c0132997381bbf074232857874ef0bf052f42be78abe23ea9c30c10735292f1580710df63c8eb78ae70979db301d43fb53ca3ceadc4bda4dcd7fabe13fac8db

                          • C:\Users\Admin\AppData\Local\Temp\7zE4C742EF9\niplnk\data\teans\locale\sl\LC_MESSAGES\vlc.mo

                            Filesize

                            587KB

                            MD5

                            57df9e2d44f84a5e7e87c90f68315065

                            SHA1

                            9970f89466e835133c9c32359d5ae50335b44bb2

                            SHA256

                            5d0aac392bbefee9db6dfcadef1d10c58e047cad3b49a45eb2dd1b2e99fe8efc

                            SHA512

                            68e80de2f7cd5b65ace061aecf897cdd1106afb52b6aa6a4736f26392bdfec2cb1b055820659c1c6922368c13ffdd86dd807731110916c82ae8ca167601beb1b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            2KB

                            MD5

                            a5c8d08bf65e43ac2128a2e84656d629

                            SHA1

                            349f9feea34d0db5a98b108428a75d0b7b3fda26

                            SHA256

                            560e444472749fcb8dab13669a82d8a18095919f07c068ae0eb85305fd61ea8c

                            SHA512

                            bc523321627a53e60c691d2becb469409e8c634532c13a87de42adc95818f694e48176b377b8425ef9fc6a3a3d37828faa0314232f07b4a7a02d5526dbf15820

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\3221a72d-5aeb-4b46-999c-78e749437464

                            Filesize

                            746B

                            MD5

                            7feed74edc985b11aaac538c35d02cd7

                            SHA1

                            4285f58943f79735f68e6c9415f635b4f03e8a53

                            SHA256

                            456b67c2455dfc6a76ebff94e51d2f129a26dc563399820941bf7f1b05f54b92

                            SHA512

                            05dcd41e8465d74218054a28781df8a678658f4d83714b8d07d22c10d7a2f214c121fd7e7be6b5b292f43ca813b0cc5e6fde777215609c2f3217441b19726a73

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\43c1bcd1-3e17-4783-9603-863d4f9aef62

                            Filesize

                            11KB

                            MD5

                            ca3cd377aad5aee7667ce0600166bbc4

                            SHA1

                            67b6f61b52631fe9bba7e0dc79a6180c84b4c9a8

                            SHA256

                            a35724479c52b8a2dd46c244d703488c2f657cc25b6649a7d05a9d3dae593f19

                            SHA512

                            da4aa64000a51b7cb7a2ba9df17f44f8309d760276458839fedb1ea2bf8baaeba80582e2ac599b6666a415867b46f89221b7bf84e2cdfd2e5ae7c7fb087227dc

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                            Filesize

                            6KB

                            MD5

                            bae965cb3d5b0e9169d30ac0de3584e5

                            SHA1

                            125a08c31ef5e85a97aedbb9146e3414cc6c5428

                            SHA256

                            033830cd555460b966c28e6d94c9f8552c5c0b98948d3459b3572b20f94098ef

                            SHA512

                            61b5dbbc34a800ac296b07ca6aa0b6c8b8acc07af54716f5e34ce8fef6f31c5ef88ba4873e7124a758b784474a8bc9ec5cdaec70fe0a8499da6804a67837c87b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                            Filesize

                            6KB

                            MD5

                            44c2518618d3461182c2236c8ba30228

                            SHA1

                            4021a61c5f1450c46eca43aed305da055cc45f17

                            SHA256

                            1449fced21fe412cbda96040cf985fed2f4ffe8811bd678d9e42a7826a6f7b52

                            SHA512

                            1bd5b6c054e9d66a21ef84e4bcd1ca8946ce3b18e0da643b3b05285d1e446ffe11b4fabfef4a4bbeb7a791b3e37d9dea63f1d49d43f1721592463cee91807aa7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                            Filesize

                            6KB

                            MD5

                            d177ff7e6ab2e1f885e327b9ecc8c9e2

                            SHA1

                            b8f4ee8cacf2b902ea2adef7622bf356df2d776b

                            SHA256

                            67d190f777bdc56aa4e69aa64458faae32b4c70860bc665306bb090bf092b53e

                            SHA512

                            5ef5dcb193ef2111839bec58c225eb94eff95cab8e9acba64a45c5168987ecc112d5ef35fde9bc0ba0c9d5983f506dab65a5152c07e936088af1cfe8bd88f52c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            f03eb6aecd5793eba6e7726f8c78d295

                            SHA1

                            4b95dbb565049c142e4b3fe54db28438531d1ce0

                            SHA256

                            d09786a2057673d4ea87141ef0d2ccc01db99fabfcf2cb61c88fe448b13b7f79

                            SHA512

                            772fb3f93b1aa00e35d964c81b8f861e1199f30335b42fc791824363c95f38922c5f87c88b18e7f9ae912f76bd19379d6dfbf82b7c19997201df95406c3c57a6

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            3KB

                            MD5

                            7f54c2f7d12e7455d52771200e2777a9

                            SHA1

                            f542e67f0aa73a72b2e31f27ca6fa89c6a0de51a

                            SHA256

                            36ff26f63f21786f29b63e4629907aa367a061fa9ee9fbb3e51538982c1e9d62

                            SHA512

                            5262a4561889084fd5a6db3114b6f8a750f851fdaf1818a4554f1b8562cf32ad1944a7839f8201ae81893683813ad7b1bcf15dc67976ce7a5f5b4acc0e7ac70e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            2KB

                            MD5

                            d76af305db62af1ffdd6427def419545

                            SHA1

                            386b6652a4c85ca41d847f41fdfcc7ab482eb3ae

                            SHA256

                            475e025e99f2ce512c4b94f245f15168bc078a9eee9c218c6d92077a2a209063

                            SHA512

                            7306f71c0513d16706b8bad1d1dceda31e6c1fc07362e7e3e0255d60ed743a7192e63cd56daaa00bcbac3cf526b03615fb735f02cdb8989eb5e484f8b2b32f8a

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            2KB

                            MD5

                            c376ef789cd2f2baeb1e9dc869bd6bc1

                            SHA1

                            8a23f31769b5cb225a2ea2ed93fefe69a1b31c33

                            SHA256

                            7f5afe0810be1126721953250472e02205007d66bcb9f0648a4497f84ead784d

                            SHA512

                            9b4b5f9e9cc62adcc1fed2ff4fe023fe2c7e4b961280fa8175f6cc7804300053d2ac77bc8929e8cbfaca294f3ad1a84c2c115bd41162d9db166eca3dc56fab45

                          • C:\Users\Admin\Desktop\niplnk\aeniks v2.exe

                            Filesize

                            407KB

                            MD5

                            155d8b3ca4845f74a9ffcf18d402fb50

                            SHA1

                            896fa15dcc5f7a3585b1e91e42866059fa3346fc

                            SHA256

                            57ab7f36936d31e2975e26c454d0d85c3b2ab56f3c7f34afa2378b1b2090ed45

                            SHA512

                            2fb221fb6dcad9793d7783ead27e77b98d39681bdf758a6dd2840445e7c050ffcb3392649d61ff2ed22899c4b07b4e2084cec04a6ecb8031cfd5a7b552fb2e5e

                          • C:\Users\Admin\Desktop\niplnk\aeniks.exe

                            Filesize

                            357KB

                            MD5

                            b5b50daadf3cce6a6f597a1af09850ff

                            SHA1

                            2b2caa80be066f47d4b9398af2e645d51cd3bd9e

                            SHA256

                            35a457b3beb4e959df2add3d0bb9733b1ef85bf231377ea9e7768a3fd2afbe84

                            SHA512

                            247a218a2b5a2203d244f4ce057b3d854201fc1aaaf921179eff127b2a0614ef031b692722cfaab263662f89286af0ec81b35c9d80bef16bda955cf9132d6852

                          • C:\Users\Admin\Downloads\7z2407-x64.37ihS15g.exe.part

                            Filesize

                            15KB

                            MD5

                            1863a933f19192af21b62bc67d741121

                            SHA1

                            07c998e9d972b41ad5af8d4457f65677d2d84a70

                            SHA256

                            f45dcb9cd8e4f02c0cf3a406075ce8d743dce293d7d85fa1d73e8b683c75bfdc

                            SHA512

                            fbfef4c62f8cfb7d3d2fd76c2ba920e625365e5d05666ae553f5eaec6c623b89f3de963e1227559473b3a89b960292740754b403aca29245768f892e9c7c9086

                          • C:\Users\Admin\Downloads\7z2407-x64.exe

                            Filesize

                            1.5MB

                            MD5

                            f1320bd826092e99fcec85cc96a29791

                            SHA1

                            c0fa3b83cf9f9ec5e584fbca4a0afa9a9faa13ed

                            SHA256

                            ad12cec3a3957ff73a689e0d65a05b6328c80fd76336a1b1a6285335f8dab1ba

                            SHA512

                            c6ba7770de0302dd90b04393a47dd7d80a0de26fab0bc11e147bf356e3e54ec69ba78e3df05f4f8718ba08ccaefbd6ea0409857973af3b6b57d271762685823a

                          • \Users\Admin\AppData\Roaming\d3d9.dll

                            Filesize

                            459KB

                            MD5

                            d3174cb9af9b1856d403323eed5a390f

                            SHA1

                            6a5c3d15e43040194f4d3b429bf51e719ed2df32

                            SHA256

                            c7abbb14ef21abb5307ae660edce7cd00833048056288eba00097d610c7b8729

                            SHA512

                            2ddab8137fccac26648e3058ad04664e23bfd17b57c37ebe89006c80cb6f72aeeee71fbc66cf8140d57d34cccd696cae8a963002de1fdfaef6317efbc1ae4b4d

                          • memory/5124-2489-0x0000000000C90000-0x0000000000C96000-memory.dmp

                            Filesize

                            24KB

                          • memory/5124-2488-0x00000000005C0000-0x0000000000630000-memory.dmp

                            Filesize

                            448KB

                          • memory/5232-2518-0x0000000008F10000-0x0000000008F86000-memory.dmp

                            Filesize

                            472KB

                          • memory/5232-2517-0x0000000008C20000-0x0000000008C86000-memory.dmp

                            Filesize

                            408KB

                          • memory/5232-2499-0x0000000005210000-0x00000000052A2000-memory.dmp

                            Filesize

                            584KB

                          • memory/5232-2500-0x00000000053A0000-0x00000000053AA000-memory.dmp

                            Filesize

                            40KB

                          • memory/5232-2506-0x00000000083A0000-0x00000000089A6000-memory.dmp

                            Filesize

                            6.0MB

                          • memory/5232-2507-0x0000000007F20000-0x000000000802A000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/5232-2508-0x0000000007E60000-0x0000000007E72000-memory.dmp

                            Filesize

                            72KB

                          • memory/5232-2509-0x0000000007EC0000-0x0000000007EFE000-memory.dmp

                            Filesize

                            248KB

                          • memory/5232-2510-0x0000000008030000-0x000000000807B000-memory.dmp

                            Filesize

                            300KB

                          • memory/5232-2496-0x0000000000400000-0x000000000045A000-memory.dmp

                            Filesize

                            360KB

                          • memory/5232-2498-0x0000000005660000-0x0000000005B5E000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/5232-2519-0x0000000008EC0000-0x0000000008EDE000-memory.dmp

                            Filesize

                            120KB

                          • memory/5232-2520-0x0000000009970000-0x0000000009B32000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/5232-2521-0x000000000A070000-0x000000000A59C000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/5280-2504-0x0000000003150000-0x0000000003156000-memory.dmp

                            Filesize

                            24KB

                          • memory/5280-2503-0x0000000000F40000-0x0000000000FA4000-memory.dmp

                            Filesize

                            400KB

                          • memory/5940-2532-0x0000000007D40000-0x0000000007D8B000-memory.dmp

                            Filesize

                            300KB