Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2024, 21:27

General

  • Target

    1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe

  • Size

    1.8MB

  • MD5

    2bb95070d042293ee003a71c9f37aec3

  • SHA1

    b14e8139a5fdd06647633ea0ef1808cdda18c4aa

  • SHA256

    1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a

  • SHA512

    5d60bd6e94ad6e38701bdc13853b6f3a50f3f02927119658723478fe4ece4c862d4c45f18585bc88636993ff0d500921d6d297ea7744165e1b32d5757c620455

  • SSDEEP

    49152:r0kr1xYlUv0VBmrycByGFuJZGhx17xwHRrt1HHNja8+ne+:r3rIE0Vc5VuJZqvwxrt1HHwK

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

stealc

Botnet

puma

C2

http://185.215.113.206

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29155

Extracted

Family

lumma

C2

https://crisiwarny.store/api

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 25 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 58 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Embeds OpenSSL 2 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 45 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe
        "C:\Users\Admin\AppData\Local\Temp\1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Users\Admin\AppData\Local\Temp\1001698001\9fb4de9c62.exe
            "C:\Users\Admin\AppData\Local\Temp\1001698001\9fb4de9c62.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2888
            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1576
              • C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe
                "C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2032
                • C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1652
                  • C:\Users\Admin\AppData\Roaming\bwr04ql4wU.exe
                    "C:\Users\Admin\AppData\Roaming\bwr04ql4wU.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2548
                  • C:\Users\Admin\AppData\Roaming\Nu5hew6BoM.exe
                    "C:\Users\Admin\AppData\Roaming\Nu5hew6BoM.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2840
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 96
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2924
              • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:1860
              • C:\Users\Admin\AppData\Local\Temp\1000474001\gold.exe
                "C:\Users\Admin\AppData\Local\Temp\1000474001\gold.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1076
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 636
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:4416
              • C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe
                "C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                PID:2496
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                  7⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:4756
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7849758,0x7fef7849768,0x7fef7849778
                    8⤵
                      PID:2564
                    • C:\Windows\system32\ctfmon.exe
                      ctfmon.exe
                      8⤵
                        PID:3140
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:2
                        8⤵
                          PID:3656
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:8
                          8⤵
                            PID:3716
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:8
                            8⤵
                              PID:2492
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:1
                              8⤵
                              • Uses browser remote debugging
                              PID:3824
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:1
                              8⤵
                              • Uses browser remote debugging
                              PID:3916
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1364 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:2
                              8⤵
                                PID:3472
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3252 --field-trial-handle=1264,i,13852114224459011846,14238358206942935443,131072 /prefetch:1
                                8⤵
                                • Uses browser remote debugging
                                PID:3484
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                              7⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:3676
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                              7⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:3772
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 748
                              7⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:3616
                          • C:\Users\Admin\AppData\Local\Temp\1000569001\myrdx.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000569001\myrdx.exe"
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:3636
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3736
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 52
                              7⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:3908
                          • C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            PID:4240
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                              7⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              PID:3992
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7849758,0x7fef7849768,0x7fef7849778
                                8⤵
                                  PID:4148
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:2
                                  8⤵
                                    PID:996
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:8
                                    8⤵
                                      PID:2760
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1476 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:8
                                      8⤵
                                        PID:4460
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:4608
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:4216
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1208 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:2
                                        8⤵
                                          PID:2276
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2256 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:1
                                          8⤵
                                          • Uses browser remote debugging
                                          PID:2548
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3496 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:8
                                          8⤵
                                            PID:2992
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3516 --field-trial-handle=1196,i,12926213636539912156,6528460817027031592,131072 /prefetch:8
                                            8⤵
                                              PID:4524
                                        • C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:1056
                                        • C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:2888
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat
                                            7⤵
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            PID:2644
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              8⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3252
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "wrsa opssvc"
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2620
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              8⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3320
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3504
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c md 197036
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1476
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3868
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5080
                                            • C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pif
                                              Jurisdiction.pif T
                                              8⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:4152
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4396
                                        • C:\Users\Admin\AppData\Local\Temp\1000828001\12.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000828001\12.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:2220
                                        • C:\Users\Admin\AppData\Local\Temp\1000833001\c18c78286f.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000833001\c18c78286f.exe"
                                          6⤵
                                          • Drops startup file
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1272
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            7⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3624
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "RegAsm.exe" && timeout 1 && del RegAsm.exe && Exit"
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3820
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /f /im "RegAsm.exe"
                                                9⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2684
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout 1
                                                9⤵
                                                • System Location Discovery: System Language Discovery
                                                • Delays execution with timeout.exe
                                                PID:4452
                                        • C:\Users\Admin\AppData\Local\Temp\1000845001\77ea41b2d7.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000845001\77ea41b2d7.exe"
                                          6⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4588
                                        • C:\Users\Admin\AppData\Local\Temp\1000846001\0ee5fe4a64.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000846001\0ee5fe4a64.exe"
                                          6⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Modifies system certificate store
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1768
                                    • C:\Users\Admin\AppData\Local\Temp\1001735001\608768a190.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001735001\608768a190.exe"
                                      4⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Windows security modification
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2488
                                    • C:\Users\Admin\AppData\Local\Temp\1001772001\e97c150d7c.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001772001\e97c150d7c.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Modifies system certificate store
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2140
                                    • C:\Users\Admin\AppData\Local\Temp\1001773001\d3c19d0280.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001773001\d3c19d0280.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4220
                                    • C:\Users\Admin\AppData\Local\Temp\1001774001\d6a88dcd38.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001774001\d6a88dcd38.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:4520
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4548
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM chrome.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4624
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM msedge.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4668
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM opera.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4712
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM brave.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4756
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                          PID:4800
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                            6⤵
                                            • Checks processor information in registry
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:4808
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.0.1866607962\364655573" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1156 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c3eafac-c90f-4f3a-a026-f14c80c8c97a} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 1356 121d6158 gpu
                                              7⤵
                                                PID:5068
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.1.725568066\1966424711" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e7e3113-9e63-4122-99a2-6c6f810649a3} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 1536 d72d58 socket
                                                7⤵
                                                  PID:3092
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.2.1350364167\1074899871" -childID 1 -isForBrowser -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7fb18e2-bb7b-4d4d-b4ee-f276a30db7ae} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 2104 1a8cb058 tab
                                                  7⤵
                                                    PID:3420
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.3.220171737\218816142" -childID 2 -isForBrowser -prefsHandle 2772 -prefMapHandle 2768 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fa8c3dc-8a9e-46cb-aeba-37a4dfaa99c3} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 2812 1d558258 tab
                                                    7⤵
                                                      PID:2904
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.4.1884515193\1193139479" -childID 3 -isForBrowser -prefsHandle 3728 -prefMapHandle 3724 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9997b144-ed89-4c0c-a913-8913fd188fd9} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 3740 d65258 tab
                                                      7⤵
                                                        PID:1496
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.5.1420585966\1524955536" -childID 4 -isForBrowser -prefsHandle 3844 -prefMapHandle 3848 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd0b6030-0a11-47c6-a860-44d668eccf9d} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 3832 1ecfcf58 tab
                                                        7⤵
                                                          PID:764
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4808.6.1685314437\1518908435" -childID 5 -isForBrowser -prefsHandle 4012 -prefMapHandle 4016 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {276e6a71-6961-4f34-b2b7-b5d6eb1619c0} 4808 "\\.\pipe\gecko-crash-server-pipe.4808" 4000 1ecfd558 tab
                                                          7⤵
                                                            PID:2724
                                                    • C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4976
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 728
                                                        5⤵
                                                        • Loads dropped DLL
                                                        • Program crash
                                                        PID:3800
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4404
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4208
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit
                                                  2⤵
                                                  • Drops startup file
                                                  • System Location Discovery: System Language Discovery
                                                  PID:904
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:3396
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                    PID:1044

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    a1e71a58157d2009a5b644f4c410652f

                                                    SHA1

                                                    cac1b5406bec9ad6eedc670a45ef1c27f34ae662

                                                    SHA256

                                                    b21cdfd7ba7f306e14647da58c701dba9088e90098612460b3e2420ad97befc7

                                                    SHA512

                                                    a51e81f6eb58efe75ca6c7d9a5ca757445ae73c4de5c2d99b523d0eec74b619430250b078c75088c201be1a6d5c15afeec20fb222b51271fe5b4ea5e90d64d83

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    40B

                                                    MD5

                                                    9ca337524816226bf5da651706d62f51

                                                    SHA1

                                                    6f8a551c620e75e45b2340aac6720452d2886a26

                                                    SHA256

                                                    ba3dc56f607d63a68f065d56b69cefc8ab6dd4991fa972d80a1ff4ee388f4877

                                                    SHA512

                                                    97d45a79a646fe20a2ac9ef7aa142fe9483d95a6d2d9d007e7043f1b0776fbdf10616ba3fc93acd15404549bdd8c6e58706a76774fba18958dc8c1e76acc6e88

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    979c29c2917bed63ccf520ece1d18cda

                                                    SHA1

                                                    65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                    SHA256

                                                    b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                    SHA512

                                                    e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                    SHA1

                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                    SHA256

                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                    SHA512

                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    18e723571b00fb1694a3bad6c78e4054

                                                    SHA1

                                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                    SHA256

                                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                    SHA512

                                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    60e3f691077715586b918375dd23c6b0

                                                    SHA1

                                                    476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                    SHA256

                                                    e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                    SHA512

                                                    d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp

                                                    Filesize

                                                    32KB

                                                    MD5

                                                    1d56d0a5c5aff58ea0d4a7bbca0d252b

                                                    SHA1

                                                    f8b55161f3b954de734902868c9bf3f1cd72efdb

                                                    SHA256

                                                    0c7f6eaec6e15bd98339c231d7df16fbbc1b87d8ecc28b3d763ade54d8358652

                                                    SHA512

                                                    361b249f81c7c9247f7762c1d380e9b37f616d6fc6f8031b2e89b9a79019795a4deed9fcaf75bbeeaa18955f282ff999ec54033e5c1c1bbcf572c779513099c8

                                                  • C:\Users\Admin\AppData\Local\Temp\063565911205

                                                    Filesize

                                                    45KB

                                                    MD5

                                                    d55ed9a681bd127a172730e860046123

                                                    SHA1

                                                    c45ab760909762449614f2c32d9d549ba4fdcc5f

                                                    SHA256

                                                    a19308c48fd7dbe6725e7a2d20c9a95539770ee14ef6777e08d7349924ec34e0

                                                    SHA512

                                                    140dad641d69ffe7bc4b45db20f8b67b0265438f9bd9f2a4aa3ec3c54cbb70e949e88062f78c89aeaba5e75ba472a8834ecc5de8a39201fb88243bc01c283a95

                                                  • C:\Users\Admin\AppData\Local\Temp\1000004001\zxcv.exe

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    a5cf5de46ec3f0a677e94188b19e7862

                                                    SHA1

                                                    d07e3fd100c423662dbb3ed85713ff7b87c52e60

                                                    SHA256

                                                    450ac7367b33ac0d26ee08c5371ba668d9d3331a8c119520eb5ca4a46f91973c

                                                    SHA512

                                                    1d2d91625f971f71670a36340092ab9ac0a35a4ac791a46ee8b055894cdf3b7fc7030e4d27f973d738b85295c31a4bfbe5c033b07a5f7ebf10508d75043c1ab1

                                                  • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                    Filesize

                                                    307KB

                                                    MD5

                                                    68a99cf42959dc6406af26e91d39f523

                                                    SHA1

                                                    f11db933a83400136dc992820f485e0b73f1b933

                                                    SHA256

                                                    c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                    SHA512

                                                    7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                  • C:\Users\Admin\AppData\Local\Temp\1000474001\gold.exe

                                                    Filesize

                                                    4.1MB

                                                    MD5

                                                    9e675bbaf944eeee4f1e7428a5b22c95

                                                    SHA1

                                                    6714982450cc5d21b6c1df2a0603755f6bc41d07

                                                    SHA256

                                                    deddd900cd271a593bc41f4218b1e2aab3465f210ec92d4597c44bb79414e755

                                                    SHA512

                                                    a853288db2c220b8e3fca72a01cdc147055b58a336fc1c58120c3973462ae83d510c7da5e1073d225e7aa122fcd3354c6e23b1d48de9d2e24c5cc26d1d7cd2c0

                                                  • C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe

                                                    Filesize

                                                    7.5MB

                                                    MD5

                                                    563e12ffd633cfb480ab1f3153676d22

                                                    SHA1

                                                    28f104d5d1336c20a99d5bc3208d74351e3d8c90

                                                    SHA256

                                                    b7439cb886010a0f42601044ff3b1ff2cd11873a6e16b6682cba31e052f5865d

                                                    SHA512

                                                    1a2bcaa8b42a25f8a014d2549787430046814a72baf16e798b21226b8003abef6a71e4831d92a90b8b810e47257beb79e18a4c1930c2f0ea2817a2ace8676e6c

                                                  • C:\Users\Admin\AppData\Local\Temp\1000569001\myrdx.exe

                                                    Filesize

                                                    515KB

                                                    MD5

                                                    a904ae8b26c7d421140be930266ed425

                                                    SHA1

                                                    c2e246b9197c18d6d40d9477a8e9a2d74a83b0e2

                                                    SHA256

                                                    9d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84

                                                    SHA512

                                                    2dbd601a564f7ffc1609bfb05ed55d57afb9bdd9bec1e9091deb53fcfa9fa02a7ba59825f2b9c3777d2016d724a8263808331356f569a1ecae585422e040f3be

                                                  • C:\Users\Admin\AppData\Local\Temp\1000802001\1.exe

                                                    Filesize

                                                    7.0MB

                                                    MD5

                                                    bf43acacd11d09300691cf9449c386d1

                                                    SHA1

                                                    ff7d6f2fbad4851cea65811fb1f5df83184510f5

                                                    SHA256

                                                    9415e13f69bce584aa0e94ba833d689f892d27960f6b6b353f439e4aee32b1aa

                                                    SHA512

                                                    170a2695ac6c918c4f3b5da6d59b2de4bbf454f3abe9fe4ffb9b32314f8e4731773923fe04acb66c31ddb47877a9dbd500d8a561532fa1a152feb69f4a945cdb

                                                  • C:\Users\Admin\AppData\Local\Temp\1000808001\12.exe

                                                    Filesize

                                                    392KB

                                                    MD5

                                                    66eeb677cf7f1d2adeb2e9e399352221

                                                    SHA1

                                                    67aa141f061cd105d94feebcb9ed9fc04d74dee6

                                                    SHA256

                                                    b40577b666e050337e96d5147d32f5195d3cdee4f2b56b854dd3a29543281aa0

                                                    SHA512

                                                    b4dc8e5976a5ce0adc66f70e033b29a228eb6a555a72b01be6336418dff22072e288b4da20fe5e51f0811d09b73df9c40f212480b4822dfbae99e074efde4e42

                                                  • C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    5d97c2475c8a4d52e140ef4650d1028b

                                                    SHA1

                                                    da20d0a43d6f8db44ff8212875a7e0f7bb223223

                                                    SHA256

                                                    f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf

                                                    SHA512

                                                    22c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee

                                                  • C:\Users\Admin\AppData\Local\Temp\1000833001\c18c78286f.exe

                                                    Filesize

                                                    514KB

                                                    MD5

                                                    26d8d52bac8f4615861f39e118efa28d

                                                    SHA1

                                                    efd5a7ccd128ffe280af75ec8b3e465c989d9e35

                                                    SHA256

                                                    8521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f

                                                    SHA512

                                                    1911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733

                                                  • C:\Users\Admin\AppData\Local\Temp\1001698001\9fb4de9c62.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    8b2720771b1238a002e8426d2f59607b

                                                    SHA1

                                                    af72719f9fdcf58ee444c1fafb18820a158f6121

                                                    SHA256

                                                    69f227d861d3959beb039721e2dad6b4f68e652ba74671f90b877cd01c866dda

                                                    SHA512

                                                    6f64d7340b085ccd98996a3326f940855d7b8cd96d0ddfdf348709f56d7ddf5b3ec754c08a9012add3d74b68e7133215985bd11b82e6321334573f9d7a20a50e

                                                  • C:\Users\Admin\AppData\Local\Temp\1001735001\608768a190.exe

                                                    Filesize

                                                    2.6MB

                                                    MD5

                                                    2d0218072ae23eb7b7ec78dfdec917ca

                                                    SHA1

                                                    cff62e0bc78dd1a196ac01137dc87117c93c5804

                                                    SHA256

                                                    3110a198fe21039ba773c8228b43ec38dfd3927a52012fddad5131c833bcd62a

                                                    SHA512

                                                    3e66a09f338710f258f07f92d9745623aab17d32153960e2c77840d317d592b39755b0f3a8709583b0c4136ae1d8bda6a250b0abba666a0829d46966a1b79dd3

                                                  • C:\Users\Admin\AppData\Local\Temp\1001772001\e97c150d7c.exe

                                                    Filesize

                                                    2.9MB

                                                    MD5

                                                    34303ae95155e9f0086d41a36d81cada

                                                    SHA1

                                                    77353b7f8ff4e2fd8496d868a80b275e010a3165

                                                    SHA256

                                                    381ecf04c61ee4081f7663931d1cb6502cb54927f412ad4792b08ed5a43ca682

                                                    SHA512

                                                    6beaf50d0859d7330e127b83d5b5991b2a957a3dd1f6072a664185ef8fd89fb963b56c8b5f2355d7bd966d71ac95a33642788650259cafee602f467c79e83df5

                                                  • C:\Users\Admin\AppData\Local\Temp\1001774001\d6a88dcd38.exe

                                                    Filesize

                                                    898KB

                                                    MD5

                                                    73633e9e983c8ccce2723e45bbf94ed6

                                                    SHA1

                                                    acd2f4c59ff82886b820374bc2c9c68628c1eb5b

                                                    SHA256

                                                    1b0594fc43ee290c3b2dd5a1a2739b6f9f411ee0c5c3e36e8db3f7a17269a85e

                                                    SHA512

                                                    a5b344c709022af93c11d738fc6bb9c2399e00c9b79229614846e5c911ca541f56ced5bbf2d3b983cf5eb1c5dcd7ad204994a0a810269b8c5d8bdbf77013cfda

                                                  • C:\Users\Admin\AppData\Local\Temp\1001775001\num.exe

                                                    Filesize

                                                    307KB

                                                    MD5

                                                    791fcee57312d4a20cc86ae1cea8dfc4

                                                    SHA1

                                                    04a88c60ae1539a63411fe4765e9b931e8d2d992

                                                    SHA256

                                                    27e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d

                                                    SHA512

                                                    2771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c

                                                  • C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pif

                                                    Filesize

                                                    872KB

                                                    MD5

                                                    18ce19b57f43ce0a5af149c96aecc685

                                                    SHA1

                                                    1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                    SHA256

                                                    d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                    SHA512

                                                    a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                  • C:\Users\Admin\AppData\Local\Temp\Beijing.bat

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    2a84a77ad125a30e442d57c63c18e00e

                                                    SHA1

                                                    68567ee0d279087a12374c10a8b7981f401b20b8

                                                    SHA256

                                                    0c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769

                                                    SHA512

                                                    9d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a

                                                  • C:\Users\Admin\AppData\Local\Temp\CabBF98.tmp

                                                    Filesize

                                                    70KB

                                                    MD5

                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                    SHA1

                                                    1723be06719828dda65ad804298d0431f6aff976

                                                    SHA256

                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                    SHA512

                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                  • C:\Users\Admin\AppData\Local\Temp\TarC008.tmp

                                                    Filesize

                                                    181KB

                                                    MD5

                                                    4ea6026cf93ec6338144661bf1202cd1

                                                    SHA1

                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                    SHA256

                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                    SHA512

                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                  • C:\Users\Admin\AppData\Local\Temp\Tmp34E7.tmp

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    1420d30f964eac2c85b2ccfe968eebce

                                                    SHA1

                                                    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                    SHA256

                                                    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                    SHA512

                                                    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    2bb95070d042293ee003a71c9f37aec3

                                                    SHA1

                                                    b14e8139a5fdd06647633ea0ef1808cdda18c4aa

                                                    SHA256

                                                    1401511f4d1c46b152541afbbdc0d5c2f893a0f7da70bd135a3efcca0d59759a

                                                    SHA512

                                                    5d60bd6e94ad6e38701bdc13853b6f3a50f3f02927119658723478fe4ece4c862d4c45f18585bc88636993ff0d500921d6d297ea7744165e1b32d5757c620455

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    d32f0b2ae3e0b50bf2ae5e75487a4bd6

                                                    SHA1

                                                    6c3c3c7e304a64c14af194f7cd80e3bed4cc14dd

                                                    SHA256

                                                    8bb6339169904186b0d6e10f427e0bf033fbb91fad2d3f8db3cfea5d1397f925

                                                    SHA512

                                                    3f87555e1b2d32e03c4c450db9c8b7c42f194ebdca43488a874414ddbebfed0967e522ce092fa748193326944fc257a18d61e5409b24031015b736a8a75ba7f4

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    3bfbd15af42a01841124ad4e56cf6320

                                                    SHA1

                                                    b00f8c1a0fd0434f83630cfec8d5504454e77154

                                                    SHA256

                                                    5322341ba0751b44f1e9eabf9dca536263e95bace1035cf0e2e14feed1d11271

                                                    SHA512

                                                    3f16726efae1cf4339f213a6a6ae0dd06567fd0a3b75b15ab1e09d14bfe9c23e2ad24900db3169457a0aaaf6194abef129c283530a29c4a721d18f56b95c7643

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    0e846b58cfbaf3a47baa10c9d4e6a4f2

                                                    SHA1

                                                    8e8746cb2a218c4098767fe93906bfc7bef26445

                                                    SHA256

                                                    e717de4fd3c828469cebb9ac29e2cc52b2b62a082a72663df4838a52192ae6ac

                                                    SHA512

                                                    dbfce70b24be39e0fc00f4ff78d2b833ef9ae5655cbfe4c597df8289c03c9dd171697580b744a0182cd1fe48d650a44717748b1bc5f1da7137c5375700162a3e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\16b7b7a3-e0c9-4410-8edd-2ebb4dc798e5

                                                    Filesize

                                                    745B

                                                    MD5

                                                    623d79d7daf2e3aa746529acbb0bb518

                                                    SHA1

                                                    6a22a11b9c6e1d83020bde59632dfee314adeb04

                                                    SHA256

                                                    ef3211f7ab2799d30118fc781cb71745715afe0aa1ea6234c433a95bac3717c4

                                                    SHA512

                                                    c9fea4bf47a3dcd644ba8ce86b5897592b44b901d77cb58f455349ae7576bd7fff0abcb777832287d831ebdf268a30b1b43aa4240bc9ad44f5f19f62e4f3cd0b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\789a60d2-f266-4cba-9e17-ec97affff4fd

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    c2e784f54cf0d96b3c5b7eca97bcb87c

                                                    SHA1

                                                    c26b07b1875573c2b08345e6ec8b194d82f9d147

                                                    SHA256

                                                    e8dbb506fee489498b7327ca986a7abe269deaa8f8f713e5f6f54a8dc6e0c47f

                                                    SHA512

                                                    62b6f6622a6df9cbce23cf7c92ed4b3efd018160e7c56d21a97da9532408a3f7577b381e2247318c16f4e294d178ab4563d5c54eb0eb7469f5eafb7ae9f8ea45

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs-1.js

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    6760c29b0a4044f02b4da5394318f830

                                                    SHA1

                                                    f23fa93e773847bbeb03fb652b15c80d0429f679

                                                    SHA256

                                                    e4f7635198143818d8624cca0800cd60ea72e8062013c6db06e78ed75759b1f6

                                                    SHA512

                                                    6fab1726c1b8995da5e1b2970979d0004164584827a708a42e639aa16b33d4f8407cc7678a41cc92da077f23e4032f513f1de0383804c476e0340af6689c19cf

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs.js

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    022edeaaa5abebb432a93d8e7b6bf587

                                                    SHA1

                                                    86d6636a9027c971a5e4ee78f18a61887f2925db

                                                    SHA256

                                                    d4365e17ec609553b9ea9862808ed193d2c43281d5d2848a3b7ec4d7a6affd53

                                                    SHA512

                                                    215030495bc69e50ddf1ee373f09ecea239a4410e08d1b37be76d614a09b85c7550e1f1b5e62b68b524196336212d5caaea19c1184d230121201c647c7771f2d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs.js

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    9b6cc5f01ee8dada9838c4275cd83cbd

                                                    SHA1

                                                    58cf5ec12885d4051216dbcd4fa6e3bd7875f274

                                                    SHA256

                                                    e47580019ab7ecfab9848a0cb8395f53d15015dc418b4caf344ced9400de8d0a

                                                    SHA512

                                                    744bc65cec5eb0abfd43e9457ea4aa7baddf055aa9a080127f62d075a2c145d0db68690c267d15a33bdb1e9230e04d2218d359de28618c53f6d9ec80f02b0983

                                                  • C:\Users\Admin\AppData\Roaming\Nu5hew6BoM.exe

                                                    Filesize

                                                    340KB

                                                    MD5

                                                    131d164783db3608e4b2e97428e17028

                                                    SHA1

                                                    c00064a0f4952f5a37093cd7631f5921f9c00387

                                                    SHA256

                                                    05053f2a6db0f5352295ce4ca7146618ddb175f1ff4cdcd93a055a039c098e5f

                                                    SHA512

                                                    020b22527d0e555509897ce2df876bf2a30e3fc976cd86e52335104cf0f9db152caa8b46650a8bd0022b3cbaf3d20e0201322e3617e00eb0f25c6fcba245c505

                                                  • \ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • \ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • \Users\Admin\AppData\Local\Temp\1001773001\d3c19d0280.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    aa9612d185f329e0f4b0a9525de3b0e1

                                                    SHA1

                                                    21ad52db3ebef421c02c82070c1ee13ad6c03620

                                                    SHA256

                                                    c732cac1942cf6a53dbad592bd7599b3410b8f9f090f79060ddd0f6e4d3abd6b

                                                    SHA512

                                                    5df5ba18ba7a1ea921e3953859010712a776ea598a7e5f169716ccd0b68bf4ab57d8cb451f42277965b59e816f4664d1c4356726f7600837c464816c3c13aa66

                                                  • \Users\Admin\AppData\Roaming\bwr04ql4wU.exe

                                                    Filesize

                                                    331KB

                                                    MD5

                                                    fd381b2627904d8365229d1ddd7e221f

                                                    SHA1

                                                    d7bcbabb6cd84875cc76f8170833ac679cd7d915

                                                    SHA256

                                                    ed5ac0c0d07595eb99ccc7346faab8504eb03000da1012abc1009c0cfbd4d4b9

                                                    SHA512

                                                    2b1e15b539d55b92f31c61cff954dafa61a44f7ccf75d113ab57ad54e9a8cbde304a285d0583663a206f648fd4f3b63257dbedf3df608d0391353ffb4aa78daf

                                                  • memory/1076-297-0x00000000003C0000-0x0000000000CD8000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/1076-309-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-1414-0x0000000004D80000-0x0000000004DD4000-memory.dmp

                                                    Filesize

                                                    336KB

                                                  • memory/1076-1398-0x0000000002BC0000-0x0000000002C0C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/1076-1397-0x0000000004FF0000-0x0000000005072000-memory.dmp

                                                    Filesize

                                                    520KB

                                                  • memory/1076-306-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-307-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-311-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-313-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-315-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-317-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-319-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-323-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-325-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-329-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-331-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-327-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-321-0x0000000005840000-0x0000000005949000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/1076-299-0x0000000005840000-0x000000000594E000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1076-298-0x0000000004EE0000-0x0000000004FEE000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1076-293-0x00000000003C0000-0x0000000000CD8000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/1272-2329-0x000000001B0E0000-0x000000001B162000-memory.dmp

                                                    Filesize

                                                    520KB

                                                  • memory/1272-2318-0x0000000000970000-0x00000000009F6000-memory.dmp

                                                    Filesize

                                                    536KB

                                                  • memory/1576-1701-0x0000000006680000-0x00000000068E1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1576-1420-0x0000000006CB0000-0x00000000075C8000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/1576-146-0x00000000010D0000-0x0000000001584000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1576-290-0x0000000006CB0000-0x00000000075C8000-memory.dmp

                                                    Filesize

                                                    9.1MB

                                                  • memory/1576-86-0x0000000006680000-0x00000000068E1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1576-87-0x0000000006680000-0x00000000068E1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1576-178-0x00000000010D0000-0x0000000001584000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1576-52-0x00000000010D0000-0x0000000001584000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1576-272-0x00000000010D0000-0x0000000001584000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1576-1702-0x0000000006680000-0x00000000068E1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1652-120-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-117-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-111-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-138-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-122-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-123-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-107-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-113-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-115-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1652-119-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1652-109-0x0000000000400000-0x00000000004E0000-memory.dmp

                                                    Filesize

                                                    896KB

                                                  • memory/1860-88-0x00000000012E0000-0x0000000001541000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1860-1429-0x00000000012E0000-0x0000000001541000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1860-180-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                    Filesize

                                                    972KB

                                                  • memory/2140-271-0x0000000000060000-0x000000000036F000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2140-233-0x0000000000060000-0x000000000036F000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2400-5-0x00000000000C0000-0x000000000058B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2400-2-0x00000000000C1000-0x00000000000EF000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/2400-16-0x00000000000C0000-0x000000000058B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2400-0-0x00000000000C0000-0x000000000058B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2400-1-0x00000000779F0000-0x00000000779F2000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2400-10-0x00000000000C0000-0x000000000058B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2400-17-0x0000000006A50000-0x0000000006F1B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2400-3-0x00000000000C0000-0x000000000058B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2488-208-0x00000000002D0000-0x000000000057A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2488-145-0x00000000002D0000-0x000000000057A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2488-236-0x00000000002D0000-0x000000000057A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2488-144-0x00000000002D0000-0x000000000057A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2488-104-0x00000000002D0000-0x000000000057A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2548-143-0x0000000000B50000-0x0000000000BA8000-memory.dmp

                                                    Filesize

                                                    352KB

                                                  • memory/2628-292-0x0000000006350000-0x000000000665F000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2628-18-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-1464-0x0000000006970000-0x0000000007026000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2628-101-0x0000000006350000-0x00000000065FA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2628-54-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-1557-0x0000000006970000-0x0000000007026000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2628-179-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-203-0x0000000006350000-0x00000000065FA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2628-231-0x0000000006350000-0x000000000665F000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2628-38-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-2434-0x0000000006350000-0x00000000065B1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2628-230-0x0000000006350000-0x000000000665F000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2628-36-0x0000000006970000-0x0000000006E24000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2628-1455-0x0000000006350000-0x00000000065B1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2628-1411-0x0000000006970000-0x0000000007026000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2628-23-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-22-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-273-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-291-0x0000000006350000-0x000000000665F000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2628-20-0x00000000012C0000-0x000000000178B000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2628-19-0x00000000012C1000-0x00000000012EF000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/2628-1396-0x0000000006970000-0x0000000007026000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2628-103-0x0000000006970000-0x0000000006E24000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2840-142-0x00000000008D0000-0x000000000092A000-memory.dmp

                                                    Filesize

                                                    360KB

                                                  • memory/2888-39-0x0000000000DF0000-0x00000000012A4000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2888-50-0x0000000000DF0000-0x00000000012A4000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3736-1648-0x0000000000400000-0x0000000000452000-memory.dmp

                                                    Filesize

                                                    328KB

                                                  • memory/4220-1413-0x0000000000840000-0x0000000000EF6000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/4220-1761-0x0000000000840000-0x0000000000EF6000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/4220-1611-0x0000000000840000-0x0000000000EF6000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/4976-1758-0x0000000000F70000-0x00000000011D1000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/4976-1456-0x0000000000F70000-0x00000000011D1000-memory.dmp

                                                    Filesize

                                                    2.4MB