Malware Analysis Report

2024-11-13 15:20

Sample ID 240730-xv4qystfrq
Target Encryption Loader.exe
SHA256 222ccb7fe1404117e972904cd3160bb9b239e01e2daf3d4bb2fdf2c9037718e7
Tags
pyinstaller pysilon evasion execution persistence upx rat stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

222ccb7fe1404117e972904cd3160bb9b239e01e2daf3d4bb2fdf2c9037718e7

Threat Level: Known bad

The file Encryption Loader.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon evasion execution persistence upx rat stealer

Pysilon family

Detect Pysilon

PySilon

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

UPX packed file

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Detects Pyinstaller

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Kills process with taskkill

Suspicious use of SetWindowsHookEx

Modifies registry class

Checks processor information in registry

Suspicious use of WriteProcessMemory

Views/modifies file attributes

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-30 19:11

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-30 19:11

Reported

2024-07-30 19:15

Platform

win11-20240730-en

Max time kernel

222s

Max time network

217s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Encryption Paid Free.exe = "C:\\Users\\Admin\\Encryption Paid Free.exe\\Encryption Paid Free.exe" C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1540 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe
PID 1540 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe
PID 880 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 880 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 880 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\system32\cmd.exe
PID 880 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\system32\cmd.exe
PID 4804 wrote to memory of 4700 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4804 wrote to memory of 4700 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4804 wrote to memory of 4988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 4804 wrote to memory of 4988 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 4804 wrote to memory of 5000 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4804 wrote to memory of 5000 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4988 wrote to memory of 1536 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 4988 wrote to memory of 1536 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 1536 wrote to memory of 2708 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1536 wrote to memory of 2708 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe

"C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe"

C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe

"C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004CC

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Encryption Paid Free.exe\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Encryption Paid Free.exe\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe

"Encryption Paid Free.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "Encryption Loader.exe"

C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe

"Encryption Paid Free.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Encryption Paid Free.exe\""

Network

Country Destination Domain Proto
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
N/A 127.0.0.1:53769 tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI15402\wheel-0.43.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI15402\ucrtbase.dll

MD5 a6b4fba258d519da313f7be057435ee4
SHA1 0bf414057d0749e9db4da7683eb6d11be174cdd5
SHA256 aa092722797b9a74e9463516e6c63d4d3c904ac263f4a4ea421b0d4d4875f606
SHA512 34f3d006a9bb7835e9d82465874e059a328c8d69abd61c79d6a85a7702df582dabc93126918a0514356fda2810c77acc1d6070ad4418921bd9e8efe34697e4a1

C:\Users\Admin\AppData\Local\Temp\_MEI15402\python312.dll

MD5 cfa2e5cdda9039831f12174573b20c7b
SHA1 c63a1ffd741a85e483fc01d6a2d0f7616b223291
SHA256 b93e682bddb5c3e2af1f0264e83fbc40481fe6abd90c3ab26e94f246c8ce8d7d
SHA512 f1ac568bd1a16d5ab2623ac42a83aed32d9867a0e016e0ac3c922f28ceb1bb7e114dab44553949008a6e2fd3bb67fc2be8fc283560d9f4b1f1552137a0c104aa

C:\Users\Admin\AppData\Local\Temp\_MEI15402\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

memory/880-1319-0x00007FFAA9B60000-0x00007FFAAA238000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15402\base_library.zip

MD5 44db87e9a433afe94098d3073d1c86d7
SHA1 24cc76d6553563f4d739c9e91a541482f4f83e05
SHA256 2b8b36bd4b1b0ee0599e5d519a91d35d70f03cc09270921630168a386b60ac71
SHA512 55bc2961c0bca42ef6fb4732ec25ef7d7d2ec47c7fb96d8819dd2daa32d990000b326808ae4a03143d6ff2144416e218395cccf8edaa774783234ec7501db611

C:\Users\Admin\AppData\Local\Temp\_MEI15402\_ctypes.pyd

MD5 c685e7b6ef76cafc4ec106b9784b6cd6
SHA1 89038e7c2ea9a07796191689ea83c530f608a437
SHA256 5dc7f9409c83d146586d27c150534db326c52abfb499d6ba09d03f98259fa0a5
SHA512 ac10ef1ec237637c5b0459aff5925348d1d04dbf717ea2c5b75992b11ecb388bcc082ef113b3899e9bda7b1132e609a5c77b77492904e66e73be40d196bc3507

C:\Users\Admin\AppData\Local\Temp\_MEI15402\python3.DLL

MD5 4038af0427bce296ca8f3e98591e0723
SHA1 b2975225721959d87996454d049e6d878994cbf2
SHA256 a5bb3eb6fdfd23e0d8b2e4bccd6016290c013389e06daae6cb83964fa69e2a4f
SHA512 db762442c6355512625b36f112eca6923875d10aaf6476d79dc6f6ffc9114e8c7757ac91dbcd1fb00014122bc7f656115160cf5d62fa7fa1ba70bc71346c1ad3

memory/880-1329-0x00007FFAC4FF0000-0x00007FFAC4FFF000-memory.dmp

memory/880-1328-0x00007FFAC5000000-0x00007FFAC5025000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15402\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

C:\Users\Admin\AppData\Local\Temp\_MEI15402\_bz2.pyd

MD5 2eace32292e07ee5c0036b7392172f61
SHA1 5ca189cf84855d9b86865ade7060193acd560a93
SHA256 8c0571c2d937f8161626bb05acf6db121db399474be107467122b27b350310d8
SHA512 1257cbf7d1fbb5932d644b855c63dc5c31391af9d838115037aa583f119f4aac2a24da71f566039b13357af92c15275a933be311c13cd91d89dcfc272af7f1f6

C:\Users\Admin\AppData\Local\Temp\_MEI15402\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

memory/880-1382-0x00007FFAC0A90000-0x00007FFAC0AA4000-memory.dmp

memory/880-1383-0x00007FFAA9630000-0x00007FFAA9B52000-memory.dmp

memory/880-1385-0x00007FFAC4FE0000-0x00007FFAC4FED000-memory.dmp

memory/880-1384-0x00007FFAC09B0000-0x00007FFAC09C9000-memory.dmp

memory/880-1381-0x00007FFABF970000-0x00007FFABF99D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15402\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI15402\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI15402\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI15402\libcrypto-3.dll

MD5 f8076a47c6f0dac4754d2a0186f63884
SHA1 d228339ff131fba16f023ec8fa40c658991eb01f
SHA256 3423134795ab8fce58190ae156d4b5d70053bebe6c9a228bea3281855e5357fa
SHA512 a6d4144cbba4a26edf563806696d312d8a3486122b165aae2c1692defc2828f3ff6bd6a7f24df730ff11c12bc60ac4408f9475c19b543ed1116b0a5d3466300b

C:\Users\Admin\AppData\Local\Temp\_MEI15402\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-utility-l1-1-0.dll

MD5 dd274d651970197e27feab08ce4b028d
SHA1 6664642754c808c3f90a07bdac130667640292ff
SHA256 9613e7e0e7abbb4fef8cfb509992382de6b42bf77c13d332f0c63cf607657645
SHA512 2e44a4cc4c270879f1fe2f0196273ce8b5ec501a3be367fccf0d2e314aa92ca5b61b38394970a82f3af1c7507d988b23a4888a572fa26fd5d1a41f6b864b3987

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-time-l1-1-0.dll

MD5 7c33d39026d00829b6471b6553d58585
SHA1 d4540ce9ed17ac5d00fc88bdbfd9db024fc2aa27
SHA256 51c921caa246c20435d4ad5b0785dcb71879aa075ce7c2edf26a13f834e49f35
SHA512 76429a39f3a8e6e47a34bfe3cc1ae2e73386a81c06b851342d09de573c039ca136a78cd5575ac7ffb12ea3454bc33075fb8679e33edd9507bf6ffcefc7aa13e0

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-string-l1-1-0.dll

MD5 3635ebce411c68d4a19345c2770392a2
SHA1 916f6a4991b8478be93036e6301700685bc91234
SHA256 eb137321cbaed6ac69d598d0f7292a742b341597abf8b450ef540856916f7233
SHA512 fec461681a4e827adc2797e09d86a80711fecc95bca64f11519a9af822bd972ff8cd63aea50aa68a3aa23eab4ef5d0c8591f0e8926f802e0cd665607d0659b1e

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-stdio-l1-1-0.dll

MD5 f00c8e79700909c80a951b900cfae3b7
SHA1 9d41dadb0fba7ea16af40799991225c8f548aeea
SHA256 8a3d1982788c532604dbfa17171d71f8ad85880179e0a3e08c92dcf6536e5ed1
SHA512 033696e294e251cbbf6c8af6774141a1bf51f2056385610d310676e35f1849588f8280128ad090d94015adbc448136ab58486d554ac177e48598065cf64d6c59

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-runtime-l1-1-0.dll

MD5 5fc379b333e9d064513fd842ba6b01a4
SHA1 15196ba491dc9b0701b94323017a8ad9a466b6f4
SHA256 d16db9232ec6d06603e049ba8881cd15f1636c2a83c4e91a9f9abd8624b321e4
SHA512 70a2604cb3e9a4d9a167d0080b2ed7081cad6217fa8569223bca720624fea9cec68604712ac24ab301cddc6d71c01b5b1c581f67ac5e43a1826726471344302f

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-process-l1-1-0.dll

MD5 86b8122f87c75cc3dbb3845b16030c64
SHA1 ae65379a9a2312fc7eb58768860b75d0e83b0cc4
SHA256 c4d65f157ffd21f673ee6096952a0576b9d151b803199c3f930b82119c148f62
SHA512 e53a00b8788a865351898f316c307fe18ad2e2dca687b32d7a7f88b816918206e68fb90e4a87eb8cdab76183c975b70398eaba3bad049712eac519bcb2eb14fd

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-math-l1-1-0.dll

MD5 9c6c9fe11c6b86bf31b1828331fbc90e
SHA1 fe18fe7e593e578fadb826df7b8e66aa80848963
SHA256 3308d7121df05de062333b772d91229ae13f626c5aad4255c025cbe5694bc1d8
SHA512 3d84434ce23038b713378a6e02d5f58b5e501bf2b4c3ffdb645a1600f386795b24931ad8dc1edc7dc0b00a69fd99f30567da32cb4c396c3800e29451fda1804c

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-locale-l1-1-0.dll

MD5 1ce8dc500f8d647e45c5277186022b7a
SHA1 ab146c73f9294c7193a2973f2ed3cc9fcf641630
SHA256 396473df7b8645421a1e78358f4e5eefd90c3c64d1472b3bf90765a70847d5eb
SHA512 32b049156e820d8020325123f2e11c123b70573332e494834a2d648f89bca228d94b4ca5acf91dfdfcdd8444be37877c25881c972122dafb19fc43e5c39d1d04

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-heap-l1-1-0.dll

MD5 fc617cea3a386409177b559099f22557
SHA1 d5291dbcb7a2458b34c8af9d539df4276a1d99ae
SHA256 9f6f171a5c1b0b7947fec31937d8b30789ae4fede08e78f6db2227f0fc22eb73
SHA512 bc3318c0382007895194397c1680cc308916d9ad1450d9e09e8e71f48772dcc890f4189da8c1ac498a75a9e6ac6a0a557f9812394aa4442e195e8039249543c8

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 712c104617ef0b2adcf6aa3a0117d7df
SHA1 14a158be1051a01637a5320b561bec004f672fe5
SHA256 8289c5306b1dd857e97275611864089986600439cac79babb2466fbc08254cb4
SHA512 62a7a0c5460859880f20ca8a80c5f0cc3f7fcbc00b51d1138e6e44dd988c4fdb5eab59eecc9bf74d1ecaccddb5dc0b35e0be709d8e2599a835aff157ef631ace

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-environment-l1-1-0.dll

MD5 eaf1266b1b58d3228d9c8c6c51e61970
SHA1 28742ae8c761883ae391b72e6f78d65ce9fda5af
SHA256 b1e76699a66f81013ca416fb4d52499b060a00c0d30ff108243a42af2c528ac1
SHA512 5c73dc91be717164f2d519286c8cc46148204b5554bbf7f61e017f95eb1281bd2e906cf00564d1ae2bf68257ef28c069a4434d65c45e0ba5dc649068bdd31cfb

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-convert-l1-1-0.dll

MD5 d8ad7429849045db1da31d30b545c6a0
SHA1 2d13798b365d06c085ea966d84cd3f127d1c7bc8
SHA256 a864aad44892a4735aef3ff76f594715291b74e8ab15fa3857f1d6168d4b7e3a
SHA512 522f7cef3b9bb32814fe35bdef8bf0a816a1db8f427d30039429ce3ba666ddfb8459a777f5dd796bfb816d8f454c5f9aff8cb015b66c87808aa5cd301fc995b0

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-conio-l1-1-0.dll

MD5 018f9ce13d833d7830ee2d02239c1161
SHA1 4a544dc22706b999ceeb9477f027068630281075
SHA256 451e761abe2b6031574d02bd7b70a609c62d12757b9c2eebbcd815e66e5f2a4f
SHA512 7574f777508761e64a68cb19a56703987891d94c30622e9599fa132c72e687d55ce7f2822d2d6722132b80dc34dbed995d085573eddca8705cbd989605caa811

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-util-l1-1-0.dll

MD5 5c938aa1d32aada7336717a3bfe2cbad
SHA1 50ab7b54cfeefa470ea8d31d14cb18673c1e97a7
SHA256 edc5f6bb8cd3e74c0b065ebef81f6ea22050c585ffabfac93fa5594b22282b26
SHA512 ec01969aa1b4d62198765b670f1bb59aa42142f9a8ace1302e0fe49a43651ce96953babe44772d49040863f96fdfcc578fff1320f797351077209b9badc100ec

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-timezone-l1-1-0.dll

MD5 dd86613bbc3da5e41d8bd30803d87c1f
SHA1 35690b9b0fe48f045568e25221694be041f56d4f
SHA256 2312923d7e07c1f58f457ac434b89c01ce675ff42d74bb279326d6c573f675ed
SHA512 6d4a29c99e819368389a9347a719e78125dfbc3166af85425db81f38833b57ba28251472dd42db974876bcf8bc73465d638678b06e3482ceb36c19b943f41ca4

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 72ddeb5483ebf2b74bdf226fd907dfa4
SHA1 dcfabbeab02e3b2a6658afb422c5526b0588dd4e
SHA256 3c86ac8dd9c84d94e205f3a3751521ec88a4653b3f42a9fd8c724adabaacb316
SHA512 507d63174a38d70aecefb8117f21823040fe363949d0f1bf1253934debe7e0e775615efc8ac149022a074bb6e01314dfb62df550e04ea7b6e6241b7891f5717a

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-synch-l1-2-0.dll

MD5 a5c5e0015b39d058dd3ba707ddb2797d
SHA1 075d66ab5660b22b48129f7bcde7eaf24e6c3e65
SHA256 7eb43d2339d07858f4c95ea648234d44722e86262f1971ef5fa4995a1ca2e642
SHA512 86c0541e82c622a7d8ab74499d1ad56e76f270dc6bcf7d94cae3a7451b94c030bab172ad04b4f7b489d7f0649def9eea2512f8361d94ac4afa0fde3527656020

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-synch-l1-1-0.dll

MD5 dccb8e4632e84e12fdced9489e8db62f
SHA1 17d50eecc039c225965bcea198f83cca408ba5e0
SHA256 7e7fe561d2733b373cf74cb017a30c753c95ed312d3881bfee33e70ebec3abc1
SHA512 3661593b912d7b9c9b7b65d8465c492091ca036d634882e4db7dd7ea5e3500edde5997c13ba9d1a6d2695b9ae89eec505f304ad9759c0f73bd717fa9969e4a11

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-string-l1-1-0.dll

MD5 5f6e50a3235783de647ccbd5d20f1ce7
SHA1 c5af12af034df61e293f3262fbc31ee24c9df02e
SHA256 e54b9dfdda851d3e1afecdf9f88fc30bffc658a533f5dff362ea915dfa193c58
SHA512 ec9dafbf04606eaf641fb376a12e9e2415c83b7a6a2d348d1f54f8968204cac4b41620da96a6161a651ba782a4204eb7ab9e9540456b45f9445f7e104efbb84c

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 1645c51ed436440b51ec2ab21596a953
SHA1 001bef9899617f0b961cc645ed85c30a0606f6bf
SHA256 eb6ead70e58b3d7bd40528a3944ce6389f3140622b1e264e216ee22aefc26689
SHA512 b50a134f1cc52e6395d702ac25e87de490ac4aa07300a785afbc066dfdd1b28acb112003b1725033075fc97d9ed9878bcdb0f3348795821dca2492f625390d8d

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-profile-l1-1-0.dll

MD5 bc5385bc13db467fa89b1ac8ba7fb486
SHA1 b44bd2eaa8fb086399125c0349a3e2102fc16154
SHA256 ffd90534607f02b049244fc4acdb8537c4d8a5c87a7d4e3fa0f3b82dad10bb66
SHA512 6653c716e1abd56136bce0252ab928b29c0f316973009c357fb458b414a6e652e4c9e74b0b3ca3c4b534c0186a20f2e4f97a8b1e1bba4883b91b21127c6f1e30

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-processthreads-l1-1-1.dll

MD5 0f99a725b93375f0ba8795e67e5a4fdf
SHA1 9825f0ec9cc4ba99471f4587d4bf97f7083d5f93
SHA256 be77a15dcaf73a7c1be6c62f57e79ef7bbc305e1b7753a4345ba1d88851dba08
SHA512 f95b6472b78f2bea732c6cc4933c83da7cbbf3eec67544b9faf86c6d6183c23e47afadb23e78420ed2dcec7ddde819e0fcb14345614c5acb3d959fca7c5a7468

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-processthreads-l1-1-0.dll

MD5 9d0f94055e51b559e47bc7124e8a9b54
SHA1 47d1fa7c3de9ca19e7dad7adee04ab5fb2dcb33c
SHA256 248e4c840c00327ed84edb13a75f826d0cbd412a288dab6bfa386476589053b3
SHA512 5e53c1ff3c2dde843507e00be0b66521c3d225d3fb405e8d52928706b2711ae189cf7488eb8b9e0fcd5419f93c0710c488e78ba0680ef47268817204a824827d

memory/880-1387-0x00007FFABBAD0000-0x00007FFABBB9D000-memory.dmp

memory/880-1386-0x00007FFABF930000-0x00007FFABF963000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 2a183a87968681d137d86be383c3f68c
SHA1 6d70085fc5f07d7f13ccd6591ac3c1179d4a2617
SHA256 5f6905a9b252c955c217a9d3ccfdd390ace9a2b5d0977447efb3a1ec643684db
SHA512 b2691eb6819785c535eab0798ff1442cbd5f485a9a2182c9a97fd6675a076783fb208979b463cb106ba15cdfb60d68dc0a7889aa6eb8bf5bd746015583e68362

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 301c2db0287d25844f0ed8119748f055
SHA1 5eaeff224c0f1dd5e801ea4fe5698233010d38b9
SHA256 44aeff16fcc3fa571e490b277c98dfa6352bc633de1ced8ab454a629655a8295
SHA512 3abb2fdddde2d08f38a0e22d3d61dfbf0990d7834ce80a55fb5c6fa68ae523bafab8ee7067c087a802f52fe8f506fe04d6b5b77d3b584cd519741524453c6f81

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-memory-l1-1-0.dll

MD5 c3fbc0bd499263dbc6761e7e34ca6e3d
SHA1 c6f6fc8f3d34b73d978090973fac912f5171a8cd
SHA256 ea438ac5926d5eb96999440dc890b24974926230c2a4b788c71ac765bdabd72d
SHA512 656da6d4a9717401ca8e31f5b62352c50a03f9e149cda2268295133c631600f6418758645f0f81fa596ddb3a9927b0759291ae64c9d330026a00b4cc3f6d1ab6

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-localization-l1-2-0.dll

MD5 09fed91680050e3149c29cf068bc10e5
SHA1 e9933b81c1d7b717f230ea98bb6bafbc1761ec4a
SHA256 3c5900c9e7fbada56e86d8973a582771dde6bff79ca80ae05920a33a2cc435df
SHA512 e514590385561731f2ad18afd6bcefac012ea8061a40b6ccfda4e45ff5768617b2e1b06e849e8a640a10ca59039e89ba88cac5d3b7ff088968eb4bc78e212d3a

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 cc56472bc6e4f1326a5128879ffe13cc
SHA1 636a4b3a13f1afff9e4eda1d2e6458e2b99221a7
SHA256 b4cf594dabb6c5255755a0b26a2ff5a2ac471818580f340f0432dbb758b34185
SHA512 baa0a6d83245f438548e2c546f89d2fb367d3492bec526324a9efb96accfa67602bc401211fc4574cb71377aaebee2ee9b13b562fcd3cf56fc983ae7faa12613

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-interlocked-l1-1-0.dll

MD5 2a3d1be9d329d76a89679f8cb461429f
SHA1 37716d8bdb2cfa84bedaad804979874ef50b6330
SHA256 21c91b58166c8066d5c85c97da82b496b45fa9ed3a1d6b76db85aa695a7cd772
SHA512 46230a42e282534fa4898bfc4271e5098856e446c505475e5226a4e5d95685ddc5fc029c20ba7129cb76ac5fb05ea0a449a092a4b546a00c060db0efb737958f

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-heap-l1-1-0.dll

MD5 51de1d1929921f8465fb92e884d675e0
SHA1 977e991fcf396f606ec06260d52e2d6ab39287cc
SHA256 ad09fbff3441c744c6a3c0acec7b0269f764ea7da6aa467911e812f042c6af15
SHA512 6c2efb80d1863e6a991fcd385f3276ec4f20215a99c1ce73947adc15c073d58405faebc229f29c4befba544438b8a9f38e5e2816ab708e3cfeee0d08327237d1

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-handle-l1-1-0.dll

MD5 d0f562394866e238d2df761bc4cce7be
SHA1 613c83d4efbc8306d2f776535fd60660e7f3b457
SHA256 6af859139a2873c8c7b681174ef620b13f71f3e879b39edaee66b20ae018ae4f
SHA512 7a2be6fe33b1fee83ec4072fe9e8ab36545d64fe2211a957d47516d8e71f9ddc6dc13b1aa3db0a3d9cb34c0eab023149a427172999c069b91cad4753eca42085

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-file-l2-1-0.dll

MD5 e1d37d21f7875483ae0d187032d5714c
SHA1 51a945a9e6ccf994781a028cd07ab8ee820f542c
SHA256 1076a19f2a42a35c8639fb1ce1666d046e0fd259142f7e645e350211d9d6390f
SHA512 77973d6e5e6ad68b304f50184a95be9d4993338f4f69e07c11275951b2fcfdc02c061182d1a7a394dc18fe77d6d021dd9e8e17cdfbbb8d0c77752c6df1979011

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-file-l1-2-0.dll

MD5 b38d5b15f77e6cd93763c76ff1bc79ee
SHA1 cadffe8a06835a7c1aa136a5515302d80d8e7419
SHA256 aa9e41933f1cf1c3bcc3b65771297b0ef088fac153c7997c0d48e7882714d05f
SHA512 46eaeb419654efd999146b9cd55ece42939e071f089ccb4698a09f4bb6b881106a3e342901439f867f609c1147ef151832b2919d2a33726643a6e5c4086a5f3a

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-file-l1-1-0.dll

MD5 1f22501f6bd7ebed5f96cfd0a5390d7f
SHA1 092eca4840f9de5e99f01290cc167cc2c07b0fc7
SHA256 198dd97c0edc412500e890400ea8d2890a6155766b85278e6e7602366d70a479
SHA512 a7a998dc379a0505827e1362eb409f1421dae65987387a78901255f1683f69f56a2d28c077f90eded1c9ed19e4c84564ddabeca284a8cc08275619250a9d5da4

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-fibers-l1-1-0.dll

MD5 49ca161ffc4094bd643adb65a03f6108
SHA1 0bc09cde835fbcf1e1056ad2ddc284f65a3c8b57
SHA256 d04306791507e0284b46b64b69c34ca9c238e270c039caeb0e96cf13b3b2cae2
SHA512 0a94f7c308b02feb72e3323e876702587b7dc56d7f786c3bffef2a6325144c59581a2b48fabc064e73e1d058d6b1f64061bddbd55970a330c7c658a24a81863d

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 95305ac137745d11c5805d162f3da695
SHA1 b80f1683a450834d14455dceffd10048ef0606f4
SHA256 35c5aaf1092e406db5cae36cb5a571b82936bfd333d84ccf672f7d8e72a86387
SHA512 fdbaef161e7d4cf4b905bda7a11a4b9033952d5a94c6bce8322732b16d9dca11634a54f28e1591da88a643fae635fa9c41c4e94bcca83f9ba7cf23730c119c2f

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-debug-l1-1-0.dll

MD5 451e40fad4a529da75abccdc9723a9a8
SHA1 e3ef32218a63c91b27ca2a24bc6ea8410677562c
SHA256 c55da85bc6a3c1fca3eab4c0fdb918d35b466b3aa86d2c28233d117bde3d36c5
SHA512 50135031cf10ce011a9595688bbb7b193611d253cc6586e9337321b61de8fef5f9cabb3a217113c6e71013ba40b6f7854640dff8749f4f8a0068be4e85a1908e

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-datetime-l1-1-0.dll

MD5 51a1bef712620a98219f7a1308523665
SHA1 30f6834d7a30af8c13c993f7ca9eda2f9c92a535
SHA256 12ab9012176def0e9ed6c19847a0dbb446b6a2575f534b0f1d9c3e1e2a6fcf72
SHA512 bcb36b2435536a92a4e7c3bd8c929796ddb317c728ca87ae1e641b093fe2f69fd7671b33d8526c165b598c8b79f78367ed93e3f08fcd6b9f9285caf867049dcd

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-core-console-l1-1-0.dll

MD5 4db53fe4fa460e376722d1ef935c3420
SHA1 b17f050e749ca5b896a1bdafd54c6cd88d02ec5b
SHA256 041d2a89986d9ea14ce9b47083fd641e75bc34ee83b1f9b9e0070d0fa02fb4c6
SHA512 091d49696cfad5aa9e60eda148a09e4c1bfd84713eb56a06bb2c052b28e2e8cafa8d0a61a01d39a49e93444afaa85439f29360c52af7c3a0e3b53db1613c0b8d

C:\Users\Admin\AppData\Local\Temp\_MEI15402\_lzma.pyd

MD5 03c89c56f917c131e6c08a222aae07b8
SHA1 1abc34d56b4cca58bf1d93463bbd27cf42d4d062
SHA256 dacc3b750b2c9d961064e3c7c35e46399405d8a2a544a6d243eb79a2b73338f4
SHA512 4a2087c7daf28b796ad6b3341d3c51226f490a4cf53f43ff230e7eaaa9af73d9b2eb6ba21465738008e996c2de66c78eaf8e655342edd382288197489fe32280

memory/880-1332-0x00007FFAC4F20000-0x00007FFAC4F39000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15402\api-ms-win-crt-private-l1-1-0.dll

MD5 3e07d85a5ced75f3fc2ec2d48fd45563
SHA1 c2594cbbd44a3b3542cab3e94239411b0bb6c233
SHA256 42921284fcff8f84543c4da8d7883e968324364541e008b57a10ce8781a4ccec
SHA512 df20e6f1f1ae1d72741a084ff1860b5db8e2535d01e46f5f8436dd3ec20249573ae52ea5f8990e4fa3f7f6d0fcd93ccae7bfa202628bd65dec34338fdb02b601

memory/880-1388-0x00007FFABF920000-0x00007FFABF92D000-memory.dmp

memory/880-1390-0x00007FFABF6B0000-0x00007FFABF6D7000-memory.dmp

memory/880-1391-0x00007FFABB6D0000-0x00007FFABB7EB000-memory.dmp

memory/880-1389-0x00007FFABF910000-0x00007FFABF91B000-memory.dmp

memory/880-1414-0x00007FFABB9C0000-0x00007FFABB9E2000-memory.dmp

memory/880-1413-0x00007FFABB9F0000-0x00007FFABBA04000-memory.dmp

memory/880-1412-0x00007FFAA9B60000-0x00007FFAAA238000-memory.dmp

memory/880-1411-0x00007FFABBA90000-0x00007FFABBAA2000-memory.dmp

memory/880-1410-0x00007FFABBAB0000-0x00007FFABBAC6000-memory.dmp

memory/880-1409-0x00007FFABBBC0000-0x00007FFABBBCC000-memory.dmp

memory/880-1408-0x00007FFABBBD0000-0x00007FFABBBE2000-memory.dmp

memory/880-1407-0x00007FFABBDF0000-0x00007FFABBDFD000-memory.dmp

memory/880-1406-0x00007FFABBE00000-0x00007FFABBE0C000-memory.dmp

memory/880-1405-0x00007FFABEED0000-0x00007FFABEEDC000-memory.dmp

memory/880-1404-0x00007FFABEEE0000-0x00007FFABEEEB000-memory.dmp

memory/880-1403-0x00007FFABF1D0000-0x00007FFABF1DB000-memory.dmp

memory/880-1402-0x00007FFABF1E0000-0x00007FFABF1EC000-memory.dmp

memory/880-1401-0x00007FFABF1F0000-0x00007FFABF1FE000-memory.dmp

memory/880-1400-0x00007FFABF200000-0x00007FFABF20C000-memory.dmp

memory/880-1399-0x00007FFABF480000-0x00007FFABF48C000-memory.dmp

memory/880-1398-0x00007FFABF640000-0x00007FFABF64B000-memory.dmp

memory/880-1397-0x00007FFABF650000-0x00007FFABF65C000-memory.dmp

memory/880-1396-0x00007FFABF660000-0x00007FFABF66B000-memory.dmp

memory/880-1395-0x00007FFABF670000-0x00007FFABF67C000-memory.dmp

memory/880-1394-0x00007FFABF680000-0x00007FFABF68B000-memory.dmp

memory/880-1393-0x00007FFABF690000-0x00007FFABF69B000-memory.dmp

memory/880-1392-0x00007FFABF6A0000-0x00007FFABF6AD000-memory.dmp

memory/880-1422-0x00007FFABB600000-0x00007FFABB61E000-memory.dmp

memory/880-1421-0x00007FFAA9630000-0x00007FFAA9B52000-memory.dmp

memory/880-1420-0x00007FFAC4F20000-0x00007FFAC4F39000-memory.dmp

memory/880-1419-0x00007FFABB620000-0x00007FFABB631000-memory.dmp

memory/880-1418-0x00007FFABB640000-0x00007FFABB68C000-memory.dmp

memory/880-1417-0x00007FFABB690000-0x00007FFABB6A9000-memory.dmp

memory/880-1416-0x00007FFABB6B0000-0x00007FFABB6C7000-memory.dmp

memory/880-1415-0x00007FFAC5000000-0x00007FFAC5025000-memory.dmp

memory/880-1425-0x00007FFABB2F0000-0x00007FFABB329000-memory.dmp

memory/880-1426-0x00007FFABAE20000-0x00007FFABAE49000-memory.dmp

memory/880-1427-0x00007FFABADF0000-0x00007FFABAE1E000-memory.dmp

memory/880-1424-0x00007FFABB330000-0x00007FFABB38D000-memory.dmp

memory/880-1423-0x00007FFAC0A90000-0x00007FFAC0AA4000-memory.dmp

memory/880-1428-0x00007FFABADC0000-0x00007FFABADE4000-memory.dmp

memory/880-1430-0x00007FFAA94B0000-0x00007FFAA9626000-memory.dmp

memory/880-1429-0x00007FFABBAD0000-0x00007FFABBB9D000-memory.dmp

memory/880-1431-0x00007FFABADA0000-0x00007FFABADB8000-memory.dmp

memory/880-1441-0x00007FFABACA0000-0x00007FFABACAB000-memory.dmp

memory/880-1449-0x00007FFAAFEC0000-0x00007FFAAFED2000-memory.dmp

memory/880-1448-0x00007FFABACB0000-0x00007FFABACBC000-memory.dmp

memory/880-1447-0x00007FFABAD10000-0x00007FFABAD1B000-memory.dmp

memory/880-1446-0x00007FFABAB40000-0x00007FFABAB4C000-memory.dmp

memory/880-1445-0x00007FFABAB50000-0x00007FFABAB5D000-memory.dmp

memory/880-1444-0x00007FFABAB60000-0x00007FFABAB6C000-memory.dmp

memory/880-1443-0x00007FFABAB70000-0x00007FFABAB7C000-memory.dmp

memory/880-1442-0x00007FFABAB80000-0x00007FFABAB8B000-memory.dmp

memory/880-1440-0x00007FFABACC0000-0x00007FFABACCE000-memory.dmp

memory/880-1439-0x00007FFABACD0000-0x00007FFABACDC000-memory.dmp

memory/880-1438-0x00007FFABACE0000-0x00007FFABACEC000-memory.dmp

memory/880-1437-0x00007FFABACF0000-0x00007FFABACFB000-memory.dmp

memory/880-1436-0x00007FFABAD00000-0x00007FFABAD0C000-memory.dmp

memory/880-1435-0x00007FFABAD20000-0x00007FFABAD2C000-memory.dmp

memory/880-1434-0x00007FFABAD30000-0x00007FFABAD3B000-memory.dmp

memory/880-1433-0x00007FFABAD40000-0x00007FFABAD4B000-memory.dmp

memory/880-1432-0x00007FFABF6A0000-0x00007FFABF6AD000-memory.dmp

memory/880-1451-0x00007FFAAFE80000-0x00007FFAAFEB5000-memory.dmp

memory/880-1450-0x00007FFABB9C0000-0x00007FFABB9E2000-memory.dmp

memory/880-1452-0x00007FFAA91D0000-0x00007FFAA94B0000-memory.dmp

memory/880-1453-0x00007FFAA70D0000-0x00007FFAA91C3000-memory.dmp

memory/880-1455-0x00007FFAAFE60000-0x00007FFAAFE77000-memory.dmp

memory/880-1457-0x00007FFAAFD70000-0x00007FFAAFD92000-memory.dmp

memory/880-1460-0x00007FFAAA4C0000-0x00007FFAAA4F0000-memory.dmp

memory/880-1459-0x00007FFABADF0000-0x00007FFABAE1E000-memory.dmp

memory/880-1458-0x00007FFAA7030000-0x00007FFAA70C9000-memory.dmp

memory/880-1456-0x00007FFAAFE30000-0x00007FFAAFE51000-memory.dmp

memory/880-1464-0x00007FFAA6EC0000-0x00007FFAA6F72000-memory.dmp

memory/880-1468-0x00007FFAAFDC0000-0x00007FFAAFDDA000-memory.dmp

memory/880-1467-0x00007FFAA6FE0000-0x00007FFAA7021000-memory.dmp

memory/880-1469-0x00007FFAA6C70000-0x00007FFAA6EB9000-memory.dmp

memory/880-1466-0x00007FFABADC0000-0x00007FFABADE4000-memory.dmp

memory/880-1465-0x00007FFAAA310000-0x00007FFAAA341000-memory.dmp

memory/880-1463-0x00007FFAA6F80000-0x00007FFAA6F94000-memory.dmp

memory/880-1462-0x00007FFAA6FA0000-0x00007FFAA6FBC000-memory.dmp

memory/880-1461-0x00007FFAA6FC0000-0x00007FFAA6FD9000-memory.dmp

memory/880-1454-0x00007FFABAE20000-0x00007FFABAE49000-memory.dmp

memory/880-1470-0x00007FFAA94B0000-0x00007FFAA9626000-memory.dmp

memory/880-1471-0x00007FFAA64C0000-0x00007FFAA6C61000-memory.dmp

memory/880-1472-0x00007FFAA70D0000-0x00007FFAA91C3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nv25dd5g.ru3.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/880-1509-0x00007FFABF670000-0x00007FFABF67C000-memory.dmp

memory/880-1501-0x00007FFABBAD0000-0x00007FFABBB9D000-memory.dmp

memory/880-1500-0x00007FFABF930000-0x00007FFABF963000-memory.dmp

memory/880-1499-0x00007FFAC4FE0000-0x00007FFAC4FED000-memory.dmp

memory/880-1498-0x00007FFAC09B0000-0x00007FFAC09C9000-memory.dmp

memory/880-1494-0x00007FFAC4F20000-0x00007FFAC4F39000-memory.dmp

memory/880-1493-0x00007FFAC4FF0000-0x00007FFAC4FFF000-memory.dmp

memory/880-1492-0x00007FFAC5000000-0x00007FFAC5025000-memory.dmp

memory/880-1531-0x00007FFABB620000-0x00007FFABB631000-memory.dmp

memory/880-1530-0x00007FFABB640000-0x00007FFABB68C000-memory.dmp

memory/880-1529-0x00007FFABB690000-0x00007FFABB6A9000-memory.dmp

memory/880-1528-0x00007FFABB6B0000-0x00007FFABB6C7000-memory.dmp

memory/880-1527-0x00007FFABB9C0000-0x00007FFABB9E2000-memory.dmp

memory/880-1526-0x00007FFABB9F0000-0x00007FFABBA04000-memory.dmp

memory/880-1525-0x00007FFABBA90000-0x00007FFABBAA2000-memory.dmp

memory/880-1524-0x00007FFABBAB0000-0x00007FFABBAC6000-memory.dmp

memory/880-1523-0x00007FFABBBC0000-0x00007FFABBBCC000-memory.dmp

memory/880-1522-0x00007FFABBBD0000-0x00007FFABBBE2000-memory.dmp

memory/880-1521-0x00007FFABBDF0000-0x00007FFABBDFD000-memory.dmp

memory/880-1520-0x00007FFABBE00000-0x00007FFABBE0C000-memory.dmp

memory/880-1519-0x00007FFABEED0000-0x00007FFABEEDC000-memory.dmp

memory/880-1518-0x00007FFABEEE0000-0x00007FFABEEEB000-memory.dmp

memory/880-1517-0x00007FFABF1D0000-0x00007FFABF1DB000-memory.dmp

memory/880-1516-0x00007FFABF1E0000-0x00007FFABF1EC000-memory.dmp

memory/880-1515-0x00007FFABF1F0000-0x00007FFABF1FE000-memory.dmp

memory/880-1514-0x00007FFABF200000-0x00007FFABF20C000-memory.dmp

memory/880-1513-0x00007FFABF480000-0x00007FFABF48C000-memory.dmp

memory/880-1512-0x00007FFABF640000-0x00007FFABF64B000-memory.dmp

memory/880-1511-0x00007FFABF650000-0x00007FFABF65C000-memory.dmp

memory/880-1510-0x00007FFABF660000-0x00007FFABF66B000-memory.dmp

memory/880-1508-0x00007FFABF680000-0x00007FFABF68B000-memory.dmp

memory/880-1507-0x00007FFABF690000-0x00007FFABF69B000-memory.dmp

memory/880-1506-0x00007FFABF6A0000-0x00007FFABF6AD000-memory.dmp

memory/880-1505-0x00007FFABB6D0000-0x00007FFABB7EB000-memory.dmp

memory/880-1504-0x00007FFABF6B0000-0x00007FFABF6D7000-memory.dmp

memory/880-1503-0x00007FFABF910000-0x00007FFABF91B000-memory.dmp

memory/880-1502-0x00007FFABF920000-0x00007FFABF92D000-memory.dmp

memory/880-1497-0x00007FFAA9630000-0x00007FFAA9B52000-memory.dmp

memory/880-1496-0x00007FFAC0A90000-0x00007FFAC0AA4000-memory.dmp

memory/880-1495-0x00007FFABF970000-0x00007FFABF99D000-memory.dmp

memory/880-1491-0x00007FFAA9B60000-0x00007FFAAA238000-memory.dmp

memory/1536-3992-0x00007FFAC4FF0000-0x00007FFAC4FFF000-memory.dmp

memory/1536-4013-0x00007FFABF200000-0x00007FFABF20C000-memory.dmp

memory/1536-4012-0x00007FFABF480000-0x00007FFABF48C000-memory.dmp

memory/1536-4011-0x00007FFABF640000-0x00007FFABF64B000-memory.dmp

memory/1536-4010-0x00007FFABF650000-0x00007FFABF65C000-memory.dmp

memory/1536-4009-0x00007FFABF660000-0x00007FFABF66B000-memory.dmp

memory/1536-4008-0x00007FFABF670000-0x00007FFABF67C000-memory.dmp

memory/1536-4007-0x00007FFABF680000-0x00007FFABF68B000-memory.dmp

memory/1536-4006-0x00007FFABF690000-0x00007FFABF69B000-memory.dmp

memory/1536-4005-0x00007FFABF6A0000-0x00007FFABF6AD000-memory.dmp

memory/1536-4004-0x00007FFABB6D0000-0x00007FFABB7EB000-memory.dmp

memory/1536-4003-0x00007FFABF6B0000-0x00007FFABF6D7000-memory.dmp

memory/1536-4002-0x00007FFABF910000-0x00007FFABF91B000-memory.dmp

memory/1536-4001-0x00007FFABF920000-0x00007FFABF92D000-memory.dmp

memory/1536-4000-0x00007FFABBAD0000-0x00007FFABBB9D000-memory.dmp

memory/1536-3999-0x00007FFABF930000-0x00007FFABF963000-memory.dmp

memory/1536-3998-0x00007FFAC4FE0000-0x00007FFAC4FED000-memory.dmp

memory/1536-3997-0x00007FFAC09B0000-0x00007FFAC09C9000-memory.dmp

memory/1536-3995-0x00007FFAC0A90000-0x00007FFAC0AA4000-memory.dmp

memory/1536-3994-0x00007FFABF970000-0x00007FFABF99D000-memory.dmp

memory/1536-3993-0x00007FFAC4F20000-0x00007FFAC4F39000-memory.dmp

memory/1536-3990-0x00007FFAA9B60000-0x00007FFAAA238000-memory.dmp

memory/1536-3991-0x00007FFAC5000000-0x00007FFAC5025000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-30 19:11

Reported

2024-07-30 19:14

Platform

win11-20240709-en

Max time kernel

92s

Max time network

95s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1210443139-7911939-2760828654-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1210443139-7911939-2760828654-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-07-30 19:11

Reported

2024-07-30 19:13

Platform

win11-20240729-en

Max time kernel

71s

Max time network

74s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-07-30 19:11

Reported

2024-07-30 19:13

Platform

win11-20240730-en

Max time kernel

91s

Max time network

94s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2803179037-308240136-4183858629-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2803179037-308240136-4183858629-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-07-30 19:11

Reported

2024-07-30 19:16

Platform

win11-20240730-en

Max time kernel

92s

Max time network

207s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-07-30 19:11

Reported

2024-07-30 19:16

Platform

win11-20240730-en

Max time kernel

91s

Max time network

207s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

PySilon

stealer rat pysilon

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\pyc_auto_file\shell\open C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\pyc_auto_file\shell C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\pyc_auto_file\shell\open\command C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\Local Settings C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\.pyc C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\pyc_auto_file C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\.pyc\ = "pyc_auto_file" C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1872973762-1326452598-87257502-1000_Classes\pyc_auto_file\shell\open\command\ = "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -osint -url \"%1\"" C:\Windows\system32\OpenWith.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3760 wrote to memory of 4552 N/A C:\Windows\system32\OpenWith.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3760 wrote to memory of 4552 N/A C:\Windows\system32\OpenWith.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4552 wrote to memory of 5092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 3896 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 4916 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 4916 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 4916 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 4916 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 4916 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 5092 wrote to memory of 4916 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1868 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea62c035-9b8c-4254-b43c-28b30941369e} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" gpu

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2368 -parentBuildID 20240401114208 -prefsHandle 2340 -prefMapHandle 2336 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f674e14-8fe5-48d2-a929-0f4daab733f9} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" socket

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2940 -childID 1 -isForBrowser -prefsHandle 2960 -prefMapHandle 2956 -prefsLen 24739 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a4b48ca-2f9f-449d-8171-448ec58a0185} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3056 -childID 2 -isForBrowser -prefsHandle 3064 -prefMapHandle 3096 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd62a415-d0f2-435a-8aba-bd2b0a96ecea} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4640 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4636 -prefMapHandle 4632 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7432ad03-b2b2-4e59-b334-55e885d59c64} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" utility

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 3 -isForBrowser -prefsHandle 5596 -prefMapHandle 5588 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a46a23b2-052d-4d92-b8a3-ab5bab67a13d} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5828 -childID 4 -isForBrowser -prefsHandle 5744 -prefMapHandle 5748 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2e6618d-32ba-4d96-876c-8d6649bdcffd} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 5 -isForBrowser -prefsHandle 5964 -prefMapHandle 5968 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54f3f29a-39ba-465b-a7fb-ade8abb282ec} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\source_prepared.pyc"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\Downloads\source_prepared.pyc

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6156 -childID 6 -isForBrowser -prefsHandle 5968 -prefMapHandle 6164 -prefsLen 29235 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cafedfe-cea5-454a-ba3f-22d7e173a2e6} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6596 -childID 7 -isForBrowser -prefsHandle 6588 -prefMapHandle 6584 -prefsLen 27170 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b45f0a8-5d26-4ef7-a2fa-4f0bf0ede288} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab

Network

Country Destination Domain Proto
US 8.8.8.8:53 spocs.getpocket.com udp
US 34.149.97.1:443 firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net udp
N/A 127.0.0.1:49803 tcp
N/A 127.0.0.1:49810 tcp
FR 172.217.20.196:443 www.google.com tcp
FR 172.217.20.196:443 www.google.com tcp
FR 172.217.20.196:443 www.google.com udp
GB 88.221.134.209:80 ciscobinary.openh264.org tcp
FR 172.217.20.174:443 redirector.gvt1.com tcp
FR 172.217.20.174:443 redirector.gvt1.com udp
GB 74.125.175.38:443 r1---sn-aigzrnsr.gvt1.com tcp
GB 74.125.175.38:443 r1---sn-aigzrnsr.gvt1.com udp

Files

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t10v9lxo.default-release\activity-stream.discovery_stream.json.tmp

MD5 b7b2a534f8ba8339e2afbdf75fed2df5
SHA1 e27bb2ee2764e4c5ab80a48dcf23963a304d9f64
SHA256 44a21d8b0e8c5d3c6e36bd7e6ce81261ec07643b1c4cd2815dce31301bdcff88
SHA512 b1bf7cac88118d5e7ff439c9d4dcf2bf3bc3e209c0918f6d0a054773084b42744b3a66a9701bd1805de4834d8b4c693b9ec66c0e38922090055fa1bd9e495855

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\datareporting\glean\pending_pings\9e3b3135-bd53-432b-b711-2d6ced1aa3a5

MD5 6fe5f4b1a6ef83ae796ff0ff54a02fd9
SHA1 d29323ebd0b4f74cafc85ba50929ac0cd9aac0ac
SHA256 5a895af7743612bbb015252a9d36a9f34031bd03e5dac8f441ae736e22a57a6b
SHA512 0ca312b29a891bb3455d61c6ec08a1b351a29c19057fc46502c69e258d128b55906e533d21c5cc2feb8821d7fe3bf1f1e9211037eed2d6c2be7f09b91f92e25e

C:\Users\Admin\Downloads\lCx6aA_c.pyc.part

MD5 570f198746afd85965169e816b15c53b
SHA1 44036e9f22834ea855273463feaf4f91e29cd8ea
SHA256 7286bf38b8dc83cf59642eb3ca9552945790cc7a8186482ba3a6875a03f36b85
SHA512 0e22b06ca08d0b6f0b750aa2e91b67124799ffbdbb344515a8de6fcaff44966d787c4964f157441f2db1cfe566836a366d1af8c9e1e1387c7ede85ab7c87f609

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\datareporting\glean\db\data.safe.tmp

MD5 e283706cfa34ad2f94462c6b3b24514c
SHA1 59e61af4c9c3bdd2f0f005606b9ecf029efb94c4
SHA256 626be39b8da3e2db886e6f1cc7988dcf7246d283beec584d1413d6680397ef9e
SHA512 9fb9d221ef1e8db030622487a3afc7fda76da10925547762b91cbbbc00bf153a7d5c2214ad1671c059731273871f67aabf602e784056d6f020fec61d0b32aa27

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\datareporting\glean\pending_pings\ff68d73d-c72d-419e-bca9-ce1e4d251f88

MD5 926bcd613cccc50689816ce019aac2d1
SHA1 92cfa9ab2c9a30d7ac6d8614fc610104de3f982c
SHA256 01f244c8e3100b0fd1e6904bbb53e5337e298552bb1d320c8ec52006406d1817
SHA512 cb86880c626f75b5a21ff5641a45ddd65a869dabb392f62434ec37751e35d12d24d5ba4b0a85ff18b8cff09d5bd2a3ea4d2607eeb889ec96383acc4d6b223728

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\datareporting\glean\db\data.safe.tmp

MD5 69b96771acafea7c0e7604e6075189d0
SHA1 f105a2ca69d45f73fa070dd19db70fd4bd75cace
SHA256 6ab2554ac697d838f340c5136480ffba9a53945fe773de87ff32b0e2a7645133
SHA512 139996e71aebcddcad56e5fac13e7ee6692cb1540f92ae1fbc053fd62b60cb776ab8d2dbdf9ee013fb194c91d857b370abef1f3114f536e0611036573e77759b

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t10v9lxo.default-release\activity-stream.discovery_stream.json

MD5 16b95cd91a641852440d6fdd966dc466
SHA1 1e30f3850f929d362d6f53e8d0afbab60557135d
SHA256 d0370e6f5bbd58ad7fa05da59ba4597f321b4529d1f5c0c539b0636f88040296
SHA512 77fa85f4d9512204e02fbd1a44c68fd4dcdf3d4e3460e0dc474b913cbd54148287ce44b0bc6bb7b324145c21194b2f44733e1b44f503787cb2c89c9994a95fa5

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\datareporting\glean\db\data.safe.tmp

MD5 3b4764402668d392ba889e3daa8da890
SHA1 268e7efabe427eeb04921191f85f5471a146c736
SHA256 95e58227f90409487a2d2adcbe9110ef14072f66677d3e5828958a009fa2136d
SHA512 4a82511aee7fae65d94deccd6928c11bb6864b4bf8718f24dafd1ec14d3a26d1f5df8c1bb0da8614b597a439138845c6c70e8d8ddfa4b4e21461c85c54cadcb8

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\prefs.js

MD5 6419734a72dab5109863d5fb57557d94
SHA1 65bd6e8f1b14d4d04b0b1fd01c037813a868e6fa
SHA256 690621a8329f867331bba3b4ee6f3c1fb0026ee037ecbe908fd266cd9c0b1fc6
SHA512 6a2a32df27cf4c3addaae63c876d35c3c7aea1b8e8a4fa4c28f2b6c5d83aefd621dce99c369e4b63468a11ffb26abe61536798a0ac7590fdeabf612a25c67715

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\prefs.js

MD5 1a8dcc3c25addba23936e0d44b4f8c54
SHA1 eebb73a7f52951d9f42626cd90deacbb87d16f00
SHA256 97dfc650ab6e3ac6f405f4c53276dbba7a621f0590a870e93844dadbc1b4d789
SHA512 41f2c1916f7b9c6a87279673a64e780fdb882639c915805a47c72d71314b56d3c82d1e1f76d37bdd27fbe4faede5595008231ee046dd0c9318455d602b2dfa6d

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\prefs-1.js

MD5 61a582a83e0a7940e42b294cb244c224
SHA1 47cf37bde52b2778d140a6bc869fd3c4d2021e3a
SHA256 1fabac8443578de79c1bccbbdcf1cb6aed21effd18d810c52570c150d19ba3cf
SHA512 fa660d623446e0d22a8588cc23b7bab67fcbac5d879310100a64c369061eb449ae5bf4a0dfc2b0b6cbe4c326b04afe774adc91f335cf1e8a66283f04dcfdcc51

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\AlternateServices.bin

MD5 4727d98e23a088a2c27d747c3072a40a
SHA1 7ea8ce9830a8edb2844e6697aefee5e77f32097d
SHA256 9f1e73479fac116b6b0b9cae0dc3793f1907cedf0a817c757538321aafca6fa5
SHA512 e30d2f9d64bb98d72c3dc3317a654ae5fbb2f2c4ae379881bf9cc04199507f3af1138912a02501290e5f154e03a80676bab252dbc144dc16db6c6d3f3d077a31

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\sessionstore-backups\recovery.baklz4

MD5 1fcdab7184b05121119d0b0a184cb10c
SHA1 2f1e7b2bc9c05aead454d25b581c96447d0f2563
SHA256 d0beda823713aac23a15dcc56149b884034dfe7bf8ea99cec07812d89c80a751
SHA512 c72b2835fd94c505ca06349935c9f5a787b7c82ae605ae7a6263cbc9b8c137308b3b17721b7abd91bc71b3a9e58bd47e5cd17fcb11e3ec8f44307eb7885c48d0

C:\Users\Admin\AppData\Local\Temp\tmpaddon

MD5 09372174e83dbbf696ee732fd2e875bb
SHA1 ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256 c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512 b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

MD5 2a461e9eb87fd1955cea740a3444ee7a
SHA1 b10755914c713f5a4677494dbe8a686ed458c3c5
SHA256 4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA512 34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

MD5 842039753bf41fa5e11b3a1383061a87
SHA1 3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256 d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512 d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\prefs-1.js

MD5 1e3feda3b7f06285742a16399adcd67d
SHA1 1f3d3ce5684145a78dea71a70dc615dc6931c36e
SHA256 b581ffc8832334e34352bbaee01ed1a5c0c7f3d2132e9eb0ce9237bc560aa0fb
SHA512 dad0d0a2f83cfdd6a7d35ba2517b28d00ca7474b68b40cb020a3391475e490bc267f28b6b0cb9fd731d637ddf1d8dfa71d02d80b2d009306d146d380a87efe7f

C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

MD5 0a8747a2ac9ac08ae9508f36c6d75692
SHA1 b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA256 32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA512 59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

MD5 bf957ad58b55f64219ab3f793e374316
SHA1 a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256 bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA512 79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

MD5 daf7ef3acccab478aaa7d6dc1c60f865
SHA1 f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256 bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA512 5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\datareporting\glean\db\data.safe.tmp

MD5 90ecbee48d2ef0471e3dd1aa2188404c
SHA1 afac3ea4615db602bdb853ee3c67c6961b414095
SHA256 9cdf8b46efdc1fd10da9bada4e5afd14a064a19775fba8d88feda04cbdaaca75
SHA512 bfd78aff00cc658a561b83943b3384295af5505003de13bd9a861b2ab916f0e913471dcd96cf7e724ce69749288d9ddbf8e68ee7570fb68724578c2d778c139e

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t10v9lxo.default-release\sessionCheckpoints.json.tmp

MD5 362985746d24dbb2b166089f30cd1bb7
SHA1 6520fc33381879a120165ede6a0f8aadf9013d3b
SHA256 b779351c8c6b04cf1d260c5e76fb4ecf4b74454cc6215a43ea15a223bf5bdd7e
SHA512 0e85cd132c895b3bffce653aeac0b5645e9d1200eb21e23f4e574b079821a44514c1d4b036d29a7d2ea500065c7131aef81cfc38ff1750dbb0e8e0c57fdc2a61