Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 04:57

General

  • Target

    c76c145d2353add63c1613c52cc9d4c2d908d383f1d649e7a3b6f7ef2df07d54N.exe

  • Size

    1.9MB

  • MD5

    66ed66dcc805b24b838f870ca59fdad0

  • SHA1

    c2c542011ee48bf78fd3fb6cb18936bb2d33e1ba

  • SHA256

    c76c145d2353add63c1613c52cc9d4c2d908d383f1d649e7a3b6f7ef2df07d54

  • SHA512

    86f3de4683af15c23d4aab426ef26f338d587ae4c9efd4ce126fccf35466b3bb3b946035a68c81e4a44a819dd59ef014c2568818320940ce160d67a25012b4b8

  • SSDEEP

    49152:+o9WZ9aelvwdMtecFU3u/HVAiFdLwPrJ5/D3wlUgGkWGG1:l9WZXws1a3UHeiyrjD3wlUgrU

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

lumma

C2

https://drawwyobstacw.sbs

https://condifendteu.sbs

https://ehticsprocw.sbs

https://vennurviot.sbs

https://resinedyw.sbs

https://enlargkiw.sbs

https://allocatinow.sbs

https://mathcucom.sbs

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 45 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c76c145d2353add63c1613c52cc9d4c2d908d383f1d649e7a3b6f7ef2df07d54N.exe
    "C:\Users\Admin\AppData\Local\Temp\c76c145d2353add63c1613c52cc9d4c2d908d383f1d649e7a3b6f7ef2df07d54N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\1000004001\L2G.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\L2G.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Users\Admin\AppData\Local\Temp\1000004001\L2G.exe
          "C:\Users\Admin\AppData\Local\Temp\1000004001\L2G.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:488
          • C:\Users\Admin\AppData\Roaming\F6BP5CChxs.exe
            "C:\Users\Admin\AppData\Roaming\F6BP5CChxs.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Users\Admin\AppData\Roaming\4s3ljW0DHm.exe
            "C:\Users\Admin\AppData\Roaming\4s3ljW0DHm.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 52
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1052
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2008
      • C:\Users\Admin\AppData\Local\Temp\1000354001\af3c5ff5a7.exe
        "C:\Users\Admin\AppData\Local\Temp\1000354001\af3c5ff5a7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2780
      • C:\Users\Admin\AppData\Local\Temp\1000355001\d4c325238c.exe
        "C:\Users\Admin\AppData\Local\Temp\1000355001\d4c325238c.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2300
          • C:\Users\Admin\1000350002\97baa53022.exe
            "C:\Users\Admin\1000350002\97baa53022.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1964
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2692
          • C:\Users\Admin\AppData\Local\Temp\1000357001\08a80f40c9.exe
            "C:\Users\Admin\AppData\Local\Temp\1000357001\08a80f40c9.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Windows security modification
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2272
          • C:\Users\Admin\AppData\Local\Temp\1000401001\num.exe
            "C:\Users\Admin\AppData\Local\Temp\1000401001\num.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3000
          • C:\Users\Admin\AppData\Local\Temp\1000403001\16a4646575.exe
            "C:\Users\Admin\AppData\Local\Temp\1000403001\16a4646575.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:752
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
              PID:1256
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000406041\do.ps1"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:892
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
                6⤵
                  PID:3032
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                    7⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2524
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.0.1624141387\1376852157" -parentBuildID 20221007134813 -prefsHandle 1164 -prefMapHandle 1156 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50792d54-72d3-4c82-a857-9e2354577f1d} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 1284 109f5758 gpu
                      8⤵
                        PID:2276
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.1.378213598\346391359" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {74ef2d5b-e0d8-4c72-b366-c7c22a1e235e} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 1520 42f0858 socket
                        8⤵
                          PID:1764
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.2.1121635678\19426335" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d83e19c9-fed9-4a4b-808a-81ff459c49fb} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 2084 19d51e58 tab
                          8⤵
                            PID:1092
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.3.1068742256\838910885" -childID 2 -isForBrowser -prefsHandle 2792 -prefMapHandle 2788 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55e0f576-98de-4769-a4b0-95eb4301ab02} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 2804 1d6c8b58 tab
                            8⤵
                              PID:1672
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.4.1685049534\80464690" -childID 3 -isForBrowser -prefsHandle 1836 -prefMapHandle 1832 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {baa82d98-c1a1-405a-a52c-b2dc5a4b450f} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 3724 17b86b58 tab
                              8⤵
                                PID:3676
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.5.95114473\410932843" -childID 4 -isForBrowser -prefsHandle 3800 -prefMapHandle 3804 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {86554404-85fa-44dc-a248-88fcfec7ae9c} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 3720 19fc7258 tab
                                8⤵
                                  PID:3700
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2524.6.887720817\1174177595" -childID 5 -isForBrowser -prefsHandle 3968 -prefMapHandle 3972 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7284209e-fdd6-4418-bc60-4a5c326f3c18} 2524 "\\.\pipe\gecko-crash-server-pipe.2524" 3952 1a097058 tab
                                  8⤵
                                    PID:3724
                        • C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:1728
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            4⤵
                              PID:2528
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              4⤵
                                PID:2116
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies system certificate store
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2760
                            • C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              PID:1908
                              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:2648
                                • C:\Users\Admin\AppData\Local\Temp\1000091001\2927.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000091001\2927.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:2580
                                  • C:\Users\Admin\AppData\Local\Temp\is-JK8B3.tmp\2927.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-JK8B3.tmp\2927.tmp" /SL5="$901D2,922170,832512,C:\Users\Admin\AppData\Local\Temp\1000091001\2927.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Modifies system certificate store
                                    PID:2180
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-I2HM7.tmp\my.bat""
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2168
                                • C:\Users\Admin\AppData\Local\Temp\1000094001\JavUmar1.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000094001\JavUmar1.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  PID:1280
                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3452
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3460
                            • C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1924
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c start context.exe
                                4⤵
                                  PID:1932
                                  • C:\Users\Admin\AppData\Local\Temp\context.exe
                                    context.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2144
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 728
                                      6⤵
                                      • Loads dropped DLL
                                      • Program crash
                                      PID:1620
                              • C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe"
                                3⤵
                                • Drops startup file
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2956
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:280
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "InstallUtil.exe" && timeout 1 && del InstallUtil.exe && Exit"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1148
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "InstallUtil.exe"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2500
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout 1
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Delays execution with timeout.exe
                                      PID:3656
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {820B9CB8-FE74-4103-B2CC-C3FF0A090FA6} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
                            1⤵
                              PID:3548
                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:1440

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              0d17d991e44853bf961c2a37d950a15a

                              SHA1

                              8a3c23f5b4b4c217bdc6e910b236d4a0b8a01cba

                              SHA256

                              a99e855afe8c6e6931c1a21e765097784b51d6b89aaf363a7d6bea744325532b

                              SHA512

                              33c67d555c4254d4044d011c49054d3c7304f92cc6c215dd4f738e913f6c81c7aef88465419b7ab9444a0601ed55009ea9bffcab8f745e7e5b29b2e43d567e32

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              9dca4d32bd7af2639ad479eb6cc800a6

                              SHA1

                              b88dff37eb72512f32f13630f6c73142bae76e0f

                              SHA256

                              64c012a7beeeb0d4189ca80956f1ab1f4447881576a44598565c09a21b733309

                              SHA512

                              d0dd5879f33eab470d1f7512041d1e610a09817363fb33e073ed8e046cb4a344bc5a71b4af3733029cdf7c476503d3c0567a427001cee807a8462ea9b56f2524

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              eb16cf5c0821a319100409767c714e2f

                              SHA1

                              0b179c0e613d29d85dd87807a44060ba04410d83

                              SHA256

                              c13a83ce64ecc00fc17a967062ab19aca97908f6996ab8bf16a961ed6fea13ce

                              SHA512

                              44b5fbaa67ede6c2fa711f644158f7ee6e59eb1084fd4fc69495775dab5654617a3b614d3282dac28dc07788d77be584707fe723f2588b52c8b0edd8bcce20da

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp

                              Filesize

                              34KB

                              MD5

                              4925ca9643ab3c336f0625e91abaf08d

                              SHA1

                              8f8ecf9641e0b4d69bf660fa4907407b44b0e9bb

                              SHA256

                              c0d22358b1c04bcf853a07c168f5ab403c7aa595fe77b5ac9adb19ae23d0ab59

                              SHA512

                              9cac2df7bea2ad9ba6cbea3ab44ee3544a29c685f6d747279eca986fd1c47f406601bccd1a9a990f956eb0b286b7115860689a4f52b8dd330a610bbd6218ebcd

                            • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                              Filesize

                              2.5MB

                              MD5

                              eab5dd4b0d7f9e18d26862b312600f93

                              SHA1

                              9278a96cff76785646971f8252d70ab14328ee24

                              SHA256

                              631d8bebaa32e939ece2d304bf739987941cbb4a0e4a1326074e355e508e0c0c

                              SHA512

                              9efcbdc853b81b0a378e8ea8cf5779edf614b8534970927a68b91be1d6958ea11a63ddd47f132fc6956b53bbe53bda2d0cc143f7b6298f162f8a82e64b75248e

                            • C:\Users\Admin\AppData\Local\Temp\1000004001\L2G.exe

                              Filesize

                              1.2MB

                              MD5

                              fdcc2baa8fa2bde596233495b2732870

                              SHA1

                              bfa3f40faa71ac5bb377f4d867f833d10ef34f05

                              SHA256

                              b31098cf6d7db5186c813df14bdc1b0bda234103643bd5d2619ddd82752f1e5b

                              SHA512

                              88b5de68b36b6e1e419bdb1d5d55306b1bf497a38c9d90d3c18219603107384afd7ef14c9a25a1998db44ca5953b0c8afdc6c800f3c20f4e3013b892d9dff2ca

                            • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                              Filesize

                              307KB

                              MD5

                              68a99cf42959dc6406af26e91d39f523

                              SHA1

                              f11db933a83400136dc992820f485e0b73f1b933

                              SHA256

                              c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                              SHA512

                              7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                            • C:\Users\Admin\AppData\Local\Temp\1000091001\2927.exe

                              Filesize

                              1.7MB

                              MD5

                              f734d3c885625d361b085cfc8af1fc25

                              SHA1

                              63ebbfac1ae03d7db04bf55523f07f3f4aa2b534

                              SHA256

                              1fc070d52f6c24eb6e83d5e9474d63868d47509a8aea3687782ebf61ebe97cfd

                              SHA512

                              e798e083f0f7c8d51988d105cdd1ca388befbd68f9045c980b689eb183ce99e512821f9dbc48cdfc9db03f507e61c26113279f7e3a5c150eee1dad09756e7024

                            • C:\Users\Admin\AppData\Local\Temp\1000094001\JavUmar1.exe

                              Filesize

                              6.3MB

                              MD5

                              bfe2f72aaf59ad12fe5479d4936d9d52

                              SHA1

                              1eb38144e825af65babd0f1e5651f74123413c93

                              SHA256

                              8ad7c506b6c146384ab9b6effd12c9bd586518100e35c4fcb4744b40d10bf25a

                              SHA512

                              e1e070feec3cc1ef4506976d6c839564f9a2487fbdfeb77c29027c3c0634f8990f3e48aba0560030e8f823ee48ca2055f16256d1d87e68b565dd8bbfcc4bdba7

                            • C:\Users\Admin\AppData\Local\Temp\1000354001\af3c5ff5a7.exe

                              Filesize

                              1.8MB

                              MD5

                              cb8c50fb3cbfef8419c3990024d0d272

                              SHA1

                              d8dfead2abe73665a26ebf8e4f6089e2c91ee1bf

                              SHA256

                              b119c34ac3b9423df0c4ff87a311580fd816715a86fd5b237c48cd53bf05dc8a

                              SHA512

                              27c3c1488ccfbeded1fd6cdba2bfa63fa6474e271d04c3981cb06466236c665eb6510860c3612d23a9afde4d99b00c5c090a16a35a5506bb0ab8032f42202434

                            • C:\Users\Admin\AppData\Local\Temp\1000355001\d4c325238c.exe

                              Filesize

                              1.8MB

                              MD5

                              0fc27c0002fbc0bd2b12a9d1f2ea1e62

                              SHA1

                              62825572806c3fe7e9bae07d11c1715515f3bfa2

                              SHA256

                              0bc7213acebaca1189d247b25ff0e7a8df49238316a6820665e52e1c69a57fba

                              SHA512

                              cb4e08e0937ac44e1da6c81aacd9744af94f41499698d531e7c98e279eef991aa38087f526a5225e91e52bd733b4ac0634198141e52cef994723d55008564f85

                            • C:\Users\Admin\AppData\Local\Temp\1000357001\08a80f40c9.exe

                              Filesize

                              1.6MB

                              MD5

                              43c8149c71665eaf7ca9e4872a6f58c0

                              SHA1

                              dd48dd01958de5478e2deedd8baeec5a99b5f823

                              SHA256

                              068cb904381b362898d258c4dcc7f94bc8e1cdf0c2f3b7a2b9af4f4073e93399

                              SHA512

                              3d18713d72da039930ce8a12ee36322806f795a5db235677785df77ccbf4698242ca0bd36fef87a73c62640fc1a5d6618c87162e95813c24d5731bfdeff56801

                            • C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe

                              Filesize

                              314KB

                              MD5

                              ff5afed0a8b802d74af1c1422c720446

                              SHA1

                              7135acfa641a873cb0c4c37afc49266bfeec91d8

                              SHA256

                              17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                              SHA512

                              11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                            • C:\Users\Admin\AppData\Local\Temp\1000401001\num.exe

                              Filesize

                              307KB

                              MD5

                              791fcee57312d4a20cc86ae1cea8dfc4

                              SHA1

                              04a88c60ae1539a63411fe4765e9b931e8d2d992

                              SHA256

                              27e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d

                              SHA512

                              2771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c

                            • C:\Users\Admin\AppData\Local\Temp\1000403001\16a4646575.exe

                              Filesize

                              2.9MB

                              MD5

                              45c34d5fb3160b8b3ee77db6c9a068c2

                              SHA1

                              eaff4e023d702cb8e65d8f7858035a8c2d98827a

                              SHA256

                              b74a30d5c8dd4923a1e16a94963e0a7ba27120ac1f90222613f3d7f2ca4f07ea

                              SHA512

                              efee8508bb40f9982dfd5dd3b6e14f49df36827b4fc98eb2ebc6040b8e04fb9ec6602ecd00ac6b2079efbc9c92d35f52c0e17d39c2d47e90fb086d142874d863

                            • C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe

                              Filesize

                              416KB

                              MD5

                              f5d7b79ee6b6da6b50e536030bcc3b59

                              SHA1

                              751b555a8eede96d55395290f60adc43b28ba5e2

                              SHA256

                              2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                              SHA512

                              532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                            • C:\Users\Admin\AppData\Local\Temp\1000406041\do.ps1

                              Filesize

                              2KB

                              MD5

                              7ba537d48ce1c8a2bff3fb660bbdc665

                              SHA1

                              53a23738f65ccdcb29a7ed42a90060caf860e5c3

                              SHA256

                              dc2811fd6fc3f139fc9d1419913fd5598ed3c1f0ec94f0754edfabb10d171593

                              SHA512

                              898abb12822494f281078f7583dbbbbe09ecb8e064338e3b0ed6cd1bf51fcae22437a8b42269b498d1138ec46be7b62d133008a80d864ac7e21feb8ef7e30c80

                            • C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe

                              Filesize

                              6KB

                              MD5

                              c042782226565f89ce3954489075e516

                              SHA1

                              256dd5ba42837a33c7aa6cb71cef33d5617117ee

                              SHA256

                              a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6

                              SHA512

                              9f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd

                            • C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe

                              Filesize

                              1.1MB

                              MD5

                              ed9393d5765529c845c623e35c1b1a34

                              SHA1

                              d3eca07f5ce0df847070d2d7fe5253067f624285

                              SHA256

                              53cd2428c9883acca7182781f22df82c38f8cc115dc014b68e32f8b1cdbf246a

                              SHA512

                              565f66ef604b10d5be70920d9813e58f5bde174d6a6d30eb8654f467775da8a665c555b7e4127fc22f8a5a5b54466137bde228fd932335517dd017d0ea51f3f8

                            • C:\Users\Admin\AppData\Local\Temp\CabFB71.tmp

                              Filesize

                              70KB

                              MD5

                              49aebf8cbd62d92ac215b2923fb1b9f5

                              SHA1

                              1723be06719828dda65ad804298d0431f6aff976

                              SHA256

                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                              SHA512

                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                            • C:\Users\Admin\AppData\Local\Temp\TarFB9F.tmp

                              Filesize

                              181KB

                              MD5

                              4ea6026cf93ec6338144661bf1202cd1

                              SHA1

                              a1dec9044f750ad887935a01430bf49322fbdcb7

                              SHA256

                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                              SHA512

                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                            • C:\Users\Admin\AppData\Local\Temp\Tmp1DAF.tmp

                              Filesize

                              2KB

                              MD5

                              1420d30f964eac2c85b2ccfe968eebce

                              SHA1

                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                              SHA256

                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                              SHA512

                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                            • C:\Users\Admin\AppData\Local\Temp\is-JK8B3.tmp\2927.tmp

                              Filesize

                              3.1MB

                              MD5

                              bba584f217419c351e6ae092c664271d

                              SHA1

                              972ba560cdff81c57ce852687e9b3e85542d2c61

                              SHA256

                              b6e4f561c0b627441f052fc40bf2dcab04c4320da15205f24e64b40d55fa4151

                              SHA512

                              04fd9a7fa34fc8056d3ac8006cdccbd98c42389424c5301981d3223645eb9792ac23d8202fc9948e97bd02832d0635607586783ccd53e2643ad43175acccf6e1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              442KB

                              MD5

                              85430baed3398695717b0263807cf97c

                              SHA1

                              fffbee923cea216f50fce5d54219a188a5100f41

                              SHA256

                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                              SHA512

                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              8.0MB

                              MD5

                              a01c5ecd6108350ae23d2cddf0e77c17

                              SHA1

                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                              SHA256

                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                              SHA512

                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              2KB

                              MD5

                              537daebc0e06aa6d33939588b6a6caf4

                              SHA1

                              ec895de309abfa2797170459ecd2e4446706f0c5

                              SHA256

                              fc7077ccef896a6a8334b784eeab20512edd207f72de00cd561ea20a4b4df8ac

                              SHA512

                              a1edc48ac333f74765e8d70e0fd46d77022da6de2b4a0b111930282356c2a4bcf028fe09b27acbd458e60cd502ce3fe585d17cf3c9b38e74810002a7b3e25827

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\3bfc9c05-f2a8-4457-a80e-ea160f22bdd3

                              Filesize

                              745B

                              MD5

                              bce936e7af246dab1ac194b893770c4c

                              SHA1

                              579449e1b66e40ad9e02d94228916cae63032169

                              SHA256

                              1626fa8a6fafeee62e44b138a21baf2b1e016eafea7f30a48c7a89a11ae001a9

                              SHA512

                              f49c60aaa18383fd0c701f9a91a6566e46b789147ce76788327bda675668182dde9a8460757a98c6619b4c12ed1201fe44c076af90b64643dac807d26f7142bd

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\6e98119e-322c-4795-a759-da29a5614f11

                              Filesize

                              11KB

                              MD5

                              b8e8a101ea6607f940c8ce33e859e0f5

                              SHA1

                              3a0182509f81b5d003a52f26d460916d15ddd7ec

                              SHA256

                              09cafef0299da8b9f2e4b7ff6dca9712611225c0a88f4f16e7703ef9511aecb0

                              SHA512

                              aca0b6681a1fc881cd23744328c07ba3309ba04e0bd81711b85df9903d578652e07a15e86fd49343a615cddae6d4a758b0699044f1bf1b076321e35f6afed06a

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                              Filesize

                              997KB

                              MD5

                              fe3355639648c417e8307c6d051e3e37

                              SHA1

                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                              SHA256

                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                              SHA512

                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              3d33cdc0b3d281e67dd52e14435dd04f

                              SHA1

                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                              SHA256

                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                              SHA512

                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                              Filesize

                              479B

                              MD5

                              49ddb419d96dceb9069018535fb2e2fc

                              SHA1

                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                              SHA256

                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                              SHA512

                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                              Filesize

                              372B

                              MD5

                              8be33af717bb1b67fbd61c3f4b807e9e

                              SHA1

                              7cf17656d174d951957ff36810e874a134dd49e0

                              SHA256

                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                              SHA512

                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                              Filesize

                              11.8MB

                              MD5

                              33bf7b0439480effb9fb212efce87b13

                              SHA1

                              cee50f2745edc6dc291887b6075ca64d716f495a

                              SHA256

                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                              SHA512

                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                              Filesize

                              1KB

                              MD5

                              688bed3676d2104e7f17ae1cd2c59404

                              SHA1

                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                              SHA256

                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                              SHA512

                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                              Filesize

                              1KB

                              MD5

                              937326fead5fd401f6cca9118bd9ade9

                              SHA1

                              4526a57d4ae14ed29b37632c72aef3c408189d91

                              SHA256

                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                              SHA512

                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              db545168a76b9a28d4c419e90ebcabd5

                              SHA1

                              95a3a33e67f191814c85346aedc14bf94425c3a1

                              SHA256

                              cd2e9e3d668b95b5c6af744d509a34ffe88f7739c2423eeb3178d257d3b83ab9

                              SHA512

                              63d3e3a2f57a2b9c9ec73b2a93856352ff7400352353a371af52f2e00b32c5aa3ef129ae0434c1c11a812a2c80c29c63d7c33c0b49cfea8f9e22b58f26dbaab7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              7c478b313283e08dc03d9fca18f0344b

                              SHA1

                              f6d2d8965107f75b1832383eaf448147603493d4

                              SHA256

                              310f5f05350c3c0fd8530f82adbfa4bc81f4225b7f9732635f199c4d70561f73

                              SHA512

                              c667460b1b15a0b3cc2298543b9f7825ec30d59554ad766c13bab28f81c834a4ae6cd8e46c72c7a7f9e3919f193f546f682afbcc7395c1b3a1d7d018dfce8922

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              4794a4cd6832f0e0d1c05198f1281fe8

                              SHA1

                              17eabae42c324ac1772d03481df5c05b3b2b4e7e

                              SHA256

                              55fc65b84338a99111d1fc0678a0236a57931cbe610cef1261903f1d0f84fdd8

                              SHA512

                              8d305da0b3f1360465466a918d5cf3fff41ffc857a30e97f6baafa8f89fc89c88966a7b7b08e580ff0177530b88b1ba82e87501902835ee69fb3d66671cdbd26

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                              Filesize

                              7KB

                              MD5

                              4c09d2c888d79582b35b58c182068de6

                              SHA1

                              9265e563446399f3eb2f84ac7039f43954b169bb

                              SHA256

                              4665faad8d01fd0572315cfa9c1c47097503c8009dd31a078d7b6bf8ef799155

                              SHA512

                              3d3dcfa3dbd33476aedde232cd52a82d79879e818b9985305413a858c6098ba1244bd9704d61e522990373c57909e6f9b5747d49b29dde92b3c9a7c305c36414

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4

                              Filesize

                              4KB

                              MD5

                              b8276ff7684ccbc4e8728650b461c137

                              SHA1

                              ddf282933e40a7eeaf2cc07f772f04de648fc8b0

                              SHA256

                              0902daff5ecb74bcbc54493905dbf75c4ae86830ba629ba08eef534604abefdc

                              SHA512

                              aaf92a4d3b015fc126d37fe8a05d2f0db9c6ef3a127b8f892c58451ec27286a42421b071c09be8525c0adef03dd3f408bbf1777afd998324ef2c2f637177ca31

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              184KB

                              MD5

                              9b2577913bc0f102e95b1686d04c3196

                              SHA1

                              18088c2c38b64c718a544c301df7151d71cd8faf

                              SHA256

                              37257ac8a758c8cbfd57943521193edf784d38fcd4aa4230b8202e321be39e63

                              SHA512

                              881f5e0b61be5fd8f4dcfb520329768b8d04dbe6be004cc3f1c63acc23e5422a6f078d2b9b4d14cbd1d181e4bfe23e6a59ab93aa9682af364ccb0879ff50a9b4

                            • \ProgramData\mozglue.dll

                              Filesize

                              593KB

                              MD5

                              c8fd9be83bc728cc04beffafc2907fe9

                              SHA1

                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                              SHA256

                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                              SHA512

                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                            • \ProgramData\nss3.dll

                              Filesize

                              2.0MB

                              MD5

                              1cc453cdf74f31e4d913ff9c10acdde2

                              SHA1

                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                              SHA256

                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                              SHA512

                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                            • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                              Filesize

                              1.9MB

                              MD5

                              66ed66dcc805b24b838f870ca59fdad0

                              SHA1

                              c2c542011ee48bf78fd3fb6cb18936bb2d33e1ba

                              SHA256

                              c76c145d2353add63c1613c52cc9d4c2d908d383f1d649e7a3b6f7ef2df07d54

                              SHA512

                              86f3de4683af15c23d4aab426ef26f338d587ae4c9efd4ce126fccf35466b3bb3b946035a68c81e4a44a819dd59ef014c2568818320940ce160d67a25012b4b8

                            • \Users\Admin\AppData\Local\Temp\is-I2HM7.tmp\idp.dll

                              Filesize

                              232KB

                              MD5

                              55c310c0319260d798757557ab3bf636

                              SHA1

                              0892eb7ed31d8bb20a56c6835990749011a2d8de

                              SHA256

                              54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

                              SHA512

                              e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

                            • \Users\Admin\AppData\Roaming\4s3ljW0DHm.exe

                              Filesize

                              315KB

                              MD5

                              59c9d5bc2cfca695e10f12c6f5f5be3c

                              SHA1

                              64f8568e8beeef61e3c3918b2f6c38c8af42c46e

                              SHA256

                              cac6b02d8f2ae8f58e7e02ab86fc82149bf466a5857d92e3457aabfca468cf47

                              SHA512

                              220b2013d60713e5041ce6422f68aa7753042e1c9ffe8f6644515590d605b6f1701eaf4ecda1f03357a52d04956933261ba02f7948bb652438598211d72b0874

                            • \Users\Admin\AppData\Roaming\F6BP5CChxs.exe

                              Filesize

                              469KB

                              MD5

                              3eba6a9c3a91b6cab9e2cba1620bfc3e

                              SHA1

                              52d195538a8162143cefd745bf9eee7df1f84e9d

                              SHA256

                              664d5913432f1b76c33b37599b46cc5f6324283428dba6b45801de37ee2f8d81

                              SHA512

                              eb9224e84993a19cddc9eaf75bf422f43fa61e73ab59be0b1b20110eeea6ee75e06f863ad327c9c2314e164f00e2b8813d6498bd442203fb457e0e9c34724fb9

                            • memory/488-65-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-67-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/488-57-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-71-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-70-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-59-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-106-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-68-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-61-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-55-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/488-63-0x0000000000400000-0x00000000004FD000-memory.dmp

                              Filesize

                              1012KB

                            • memory/1704-256-0x0000000000070000-0x0000000000535000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1704-253-0x0000000007230000-0x00000000076F5000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1704-205-0x0000000000070000-0x0000000000535000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1728-279-0x0000000000980000-0x00000000009D4000-memory.dmp

                              Filesize

                              336KB

                            • memory/1792-91-0x0000000006490000-0x00000000066F1000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/1792-204-0x0000000006A90000-0x0000000006F55000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-163-0x0000000006A90000-0x000000000712E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1792-92-0x0000000006490000-0x00000000066F1000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/1792-277-0x0000000006A90000-0x000000000712E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1792-278-0x0000000006A90000-0x000000000712E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1792-817-0x0000000006490000-0x00000000066F1000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/1792-90-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-258-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-109-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-112-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-94-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-39-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-371-0x0000000006A90000-0x0000000006F55000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-161-0x0000000006A90000-0x000000000712E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1792-818-0x0000000006490000-0x00000000066F1000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/1792-22-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-20-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1792-19-0x00000000002A1000-0x00000000002CF000-memory.dmp

                              Filesize

                              184KB

                            • memory/1792-16-0x00000000002A0000-0x0000000000773000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1924-343-0x00000000011F0000-0x00000000011F8000-memory.dmp

                              Filesize

                              32KB

                            • memory/1964-511-0x00000000008D0000-0x0000000000F6E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1964-372-0x00000000008D0000-0x0000000000F6E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2008-93-0x0000000000A00000-0x0000000000C61000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2008-438-0x0000000000A00000-0x0000000000C61000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/2008-165-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                              Filesize

                              972KB

                            • memory/2056-111-0x0000000001200000-0x000000000127A000-memory.dmp

                              Filesize

                              488KB

                            • memory/2080-36-0x00000000003C0000-0x000000000079D000-memory.dmp

                              Filesize

                              3.9MB

                            • memory/2144-567-0x00000000001F0000-0x0000000000308000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2180-457-0x0000000000400000-0x000000000071C000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2272-524-0x0000000000D60000-0x00000000011A8000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/2272-610-0x0000000000D60000-0x00000000011A8000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/2272-527-0x0000000000D60000-0x00000000011A8000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/2272-526-0x0000000000D60000-0x00000000011A8000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/2300-257-0x0000000001060000-0x0000000001525000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2300-432-0x000000000A960000-0x000000000AE25000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2300-478-0x0000000006AD0000-0x000000000716E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2300-452-0x0000000001060000-0x0000000001525000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2300-592-0x0000000006AD0000-0x0000000006F18000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/2300-523-0x0000000006AD0000-0x0000000006F18000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/2300-525-0x000000000A960000-0x000000000AE25000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2300-369-0x0000000006AD0000-0x000000000716E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2524-110-0x0000000000C20000-0x0000000000C74000-memory.dmp

                              Filesize

                              336KB

                            • memory/2552-5-0x0000000000820000-0x0000000000CF3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2552-14-0x0000000006BD0000-0x00000000070A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2552-13-0x0000000000820000-0x0000000000CF3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2552-3-0x0000000000820000-0x0000000000CF3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2552-18-0x0000000000820000-0x0000000000CF3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2552-2-0x0000000000821000-0x000000000084F000-memory.dmp

                              Filesize

                              184KB

                            • memory/2552-1-0x00000000777F0000-0x00000000777F2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2552-0-0x0000000000820000-0x0000000000CF3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2580-459-0x0000000000400000-0x00000000004D8000-memory.dmp

                              Filesize

                              864KB

                            • memory/2580-399-0x0000000000400000-0x00000000004D8000-memory.dmp

                              Filesize

                              864KB

                            • memory/2692-433-0x0000000000400000-0x0000000000A9E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2692-466-0x0000000000400000-0x0000000000A9E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2692-464-0x0000000000400000-0x0000000000A9E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2692-479-0x0000000001060000-0x0000000001525000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2692-455-0x0000000000400000-0x0000000000A9E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2760-283-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2760-289-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2760-290-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2760-287-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2760-281-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2760-291-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2760-292-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2760-285-0x0000000000400000-0x0000000000452000-memory.dmp

                              Filesize

                              328KB

                            • memory/2780-344-0x0000000000DA0000-0x000000000143E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2780-463-0x0000000000DA0000-0x000000000143E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2780-430-0x0000000000DA0000-0x000000000143E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2780-164-0x0000000000DA0000-0x000000000143E000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2956-421-0x0000000000DB0000-0x0000000000EC8000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2956-431-0x0000000009EF0000-0x0000000009F74000-memory.dmp

                              Filesize

                              528KB