Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 10:26

General

  • Target

    458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe

  • Size

    1.8MB

  • MD5

    cd86e4c2fbaf81cb17606d69108fff47

  • SHA1

    97117dadf1a95214ceaf1d1d9337dae317c6a358

  • SHA256

    458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e

  • SHA512

    42393ee97337b197a176032276b9da8bd3ba26d5e5a36751130271422a9cb0a91d50a22c9f75e4de77083b47d8b6c7f54c5f1ebccd09f97dbba8eb6591554748

  • SSDEEP

    49152:1hYf1buEc90mDAkzorHA/GJKEmQVhiln:Mf1qEcvDTSNXmQVh6

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

https://ratiomun.cyou

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 46 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe
    "C:\Users\Admin\AppData\Local\Temp\458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe
        "C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Users\Admin\AppData\Local\Temp\is-QFGGL.tmp\stories.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-QFGGL.tmp\stories.tmp" /SL5="$60130,3300783,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\system32\net.exe" pause raf_encoder_1252
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3044
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 pause raf_encoder_1252
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1996
          • C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe
            "C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:860
      • C:\Users\Admin\AppData\Local\Temp\1011459001\5da218c60b.exe
        "C:\Users\Admin\AppData\Local\Temp\1011459001\5da218c60b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:352
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1836
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            5⤵
            • Blocklisted process makes network request
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1220
          • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
            "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2400
          • C:\Users\Admin\AppData\Local\Temp\1002824001\615bfec018.exe
            "C:\Users\Admin\AppData\Local\Temp\1002824001\615bfec018.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2784
          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
            "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2216
              • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
                "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                PID:408
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3252
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                  8⤵
                    PID:4040
                    • C:\Windows\system32\wusa.exe
                      wusa /uninstall /kb:890830 /quiet /norestart
                      9⤵
                      • Drops file in Windows directory
                      PID:4036
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop UsoSvc
                    8⤵
                    • Launches sc.exe
                    PID:3888
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                    8⤵
                    • Launches sc.exe
                    PID:3316
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop wuauserv
                    8⤵
                    • Launches sc.exe
                    PID:3420
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop bits
                    8⤵
                    • Launches sc.exe
                    PID:2816
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop dosvc
                    8⤵
                    • Launches sc.exe
                    PID:3952
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3248
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3992
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3852
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3888
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe delete "QKJNEQWA"
                    8⤵
                    • Launches sc.exe
                    PID:3348
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                    8⤵
                    • Launches sc.exe
                    PID:4032
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop eventlog
                    8⤵
                    • Launches sc.exe
                    PID:3252
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start "QKJNEQWA"
                    8⤵
                    • Launches sc.exe
                    PID:3280
                • C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe
                  "C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2484
                  • C:\Users\Admin\AppData\Local\Temp\is-F9T2V.tmp\stail.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-F9T2V.tmp\stail.tmp" /SL5="$801DE,3485671,54272,C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe"
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    PID:1852
                    • C:\Windows\SysWOW64\net.exe
                      "C:\Windows\system32\net.exe" pause raf_encoder_1252
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2068
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 pause raf_encoder_1252
                        10⤵
                        • System Location Discovery: System Language Discovery
                        PID:2196
                    • C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe
                      "C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i
                      9⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:1268
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c Set-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" -Name "lDBNode57" -Value "C:\ProgramData\DNodedbtable\DNodedbtable.exe"
                        10⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2152
            • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe
              "C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1492
            • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
              "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              PID:672
              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2280
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                  7⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:3004
            • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe
              "C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2056
            • C:\Users\Admin\AppData\Local\Temp\1005388001\d263f2c36a.exe
              "C:\Users\Admin\AppData\Local\Temp\1005388001\d263f2c36a.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              PID:2388
            • C:\Users\Admin\AppData\Local\Temp\1005389001\fe7cb2c4b9.exe
              "C:\Users\Admin\AppData\Local\Temp\1005389001\fe7cb2c4b9.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              PID:2700
        • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
          "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1808
        • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe
          "C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2392
        • C:\Users\Admin\AppData\Local\Temp\1012333001\Go.exe
          "C:\Users\Admin\AppData\Local\Temp\1012333001\Go.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2152
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\MsContainer\P69CZ8d7qXWcyOsB66pHSLt72y6yplqEAs.vbe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2708
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\MsContainer\GHGhSTUsO1Bq4f5yX2eWVB.bat" "
              5⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:1240
              • C:\MsContainer\chainportruntimeCrtMonitor.exe
                "C:\MsContainer/chainportruntimeCrtMonitor.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2984
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\OSPPSVC.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious use of AdjustPrivilegeToken
                  PID:956
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\22qWW4iIz6.bat"
                  7⤵
                    PID:2796
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:2572
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        8⤵
                          PID:620
                        • C:\Users\Admin\AppData\Local\Temp\OSPPSVC.exe
                          "C:\Users\Admin\AppData\Local\Temp\OSPPSVC.exe"
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1328
              • C:\Users\Admin\AppData\Local\Temp\1012341001\c9cd79b90c.exe
                "C:\Users\Admin\AppData\Local\Temp\1012341001\c9cd79b90c.exe"
                3⤵
                • Enumerates VirtualBox registry keys
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2332
              • C:\Users\Admin\AppData\Local\Temp\1012344001\rhnew.exe
                "C:\Users\Admin\AppData\Local\Temp\1012344001\rhnew.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:2980
              • C:\Users\Admin\AppData\Local\Temp\1012345001\92c8a074e3.exe
                "C:\Users\Admin\AppData\Local\Temp\1012345001\92c8a074e3.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:2960
              • C:\Users\Admin\AppData\Local\Temp\1012346001\365d070dce.exe
                "C:\Users\Admin\AppData\Local\Temp\1012346001\365d070dce.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:1672
              • C:\Users\Admin\AppData\Local\Temp\1012347001\dc9403b770.exe
                "C:\Users\Admin\AppData\Local\Temp\1012347001\dc9403b770.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1996
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1440
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:236
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:908
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2940
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2892
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  4⤵
                    PID:2520
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                      5⤵
                      • Checks processor information in registry
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1984
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.0.2106722855\1010166208" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3810e8fe-d92c-4858-9b72-9619e0d04385} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 1296 110d6458 gpu
                        6⤵
                          PID:1508
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.1.734666965\299769965" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1496 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {37d5c1fb-69d0-4a85-8cb2-f7d02e02f4a6} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 1512 e71858 socket
                          6⤵
                            PID:1496
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.2.1302206247\2139456364" -childID 1 -isForBrowser -prefsHandle 2236 -prefMapHandle 2176 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d09ce69-b63f-4626-b6b1-d063a02cc0eb} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 2212 1ad8e358 tab
                            6⤵
                              PID:3376
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.3.2125226944\1166439192" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {06b797e4-faca-4d57-98d9-b9d069a61fcc} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 2908 1c134358 tab
                              6⤵
                                PID:3688
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.4.1639077199\1586109417" -childID 3 -isForBrowser -prefsHandle 3804 -prefMapHandle 3800 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f44e308c-e46f-44f6-a4e2-50d4e12a359f} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 3816 1ebd2858 tab
                                6⤵
                                  PID:3836
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.5.1196817513\339648316" -childID 4 -isForBrowser -prefsHandle 3928 -prefMapHandle 3932 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f15c40dd-2870-4f74-b678-7b8248128505} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 3916 20d63058 tab
                                  6⤵
                                    PID:3840
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1984.6.477319671\1273655813" -childID 5 -isForBrowser -prefsHandle 4092 -prefMapHandle 4100 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {40f19e6c-a653-444d-8138-4c4e38ec2680} 1984 "\\.\pipe\gecko-crash-server-pipe.1984" 4080 20d64e58 tab
                                    6⤵
                                      PID:3892
                              • C:\Users\Admin\AppData\Local\Temp\1012348001\c03394e2e7.exe
                                "C:\Users\Admin\AppData\Local\Temp\1012348001\c03394e2e7.exe"
                                3⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Windows security modification
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4036
                              • C:\Users\Admin\AppData\Local\Temp\1012349001\2aee811258.exe
                                "C:\Users\Admin\AppData\Local\Temp\1012349001\2aee811258.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:4432
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\OSPPSVC.exe'" /f
                            1⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:236
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\OSPPSVC.exe'" /rl HIGHEST /f
                            1⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:1220
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\OSPPSVC.exe'" /rl HIGHEST /f
                            1⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:2160
                          • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                            C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                            1⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            PID:3640
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                              2⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2904
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                              2⤵
                                PID:3740
                                • C:\Windows\system32\wusa.exe
                                  wusa /uninstall /kb:890830 /quiet /norestart
                                  3⤵
                                  • Drops file in Windows directory
                                  PID:3340
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop UsoSvc
                                2⤵
                                • Launches sc.exe
                                PID:1292
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                2⤵
                                • Launches sc.exe
                                PID:4036
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop wuauserv
                                2⤵
                                • Launches sc.exe
                                PID:2848
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop bits
                                2⤵
                                • Launches sc.exe
                                PID:3572
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop dosvc
                                2⤵
                                • Launches sc.exe
                                PID:296
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                2⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4044
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                2⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1292
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                2⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3276
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                2⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3496
                              • C:\Windows\system32\conhost.exe
                                C:\Windows\system32\conhost.exe
                                2⤵
                                  PID:3852
                                • C:\Windows\system32\cmd.exe
                                  cmd.exe
                                  2⤵
                                  • Blocklisted process makes network request
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3572
                              • C:\Windows\system32\conhost.exe
                                \??\C:\Windows\system32\conhost.exe "-183290300913826641131090405894-19823135521632705976983944594305313014888278074"
                                1⤵
                                  PID:3340

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp

                                  Filesize

                                  27KB

                                  MD5

                                  7d5fada0904c23788a5e29862e9cc718

                                  SHA1

                                  2eadd8d093f90297342c2f30ebe2fb2295e26b42

                                  SHA256

                                  a7118f330af4256f6253de20c65bb5f0e728a721fc3ec2af605d343eb0baad52

                                  SHA512

                                  528a611f8dccad0a251f82f8fef889bb894b4f87533ed5a76ec3fde43c1eb9bf5879beb89f6210c99f90ed416fd31f9a64cf2b8891899c19ef4499bdc66163ec

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                  Filesize

                                  15KB

                                  MD5

                                  96c542dec016d9ec1ecc4dddfcbaac66

                                  SHA1

                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                  SHA256

                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                  SHA512

                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                • C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\sqlite3.dll

                                  Filesize

                                  630KB

                                  MD5

                                  e477a96c8f2b18d6b5c27bde49c990bf

                                  SHA1

                                  e980c9bf41330d1e5bd04556db4646a0210f7409

                                  SHA256

                                  16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                  SHA512

                                  335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                                  Filesize

                                  2.7MB

                                  MD5

                                  df92abd264b50c9f069246a6e65453f0

                                  SHA1

                                  f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                                  SHA256

                                  bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                                  SHA512

                                  a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                                • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                  Filesize

                                  307KB

                                  MD5

                                  68a99cf42959dc6406af26e91d39f523

                                  SHA1

                                  f11db933a83400136dc992820f485e0b73f1b933

                                  SHA256

                                  c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                  SHA512

                                  7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  0984009f07548d30f9df551472e5c399

                                  SHA1

                                  a1339aa7c290a7e6021450d53e589bafa702f08a

                                  SHA256

                                  80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be

                                  SHA512

                                  23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9

                                • C:\Users\Admin\AppData\Local\Temp\1002824001\615bfec018.exe

                                  Filesize

                                  2.8MB

                                  MD5

                                  6a3268db51b26c41418351e516bc33a6

                                  SHA1

                                  57a12903fff8cd7ea5aa3a2d2308c910ac455428

                                  SHA256

                                  eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                                  SHA512

                                  43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                                • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                                  Filesize

                                  429KB

                                  MD5

                                  c07e06e76de584bcddd59073a4161dbb

                                  SHA1

                                  08954ac6f6cf51fd5d9d034060a9ae25a8448971

                                  SHA256

                                  cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                                  SHA512

                                  e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                                • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe

                                  Filesize

                                  6.3MB

                                  MD5

                                  7b5e89271f2f7e9a42d00cd1f1283d0f

                                  SHA1

                                  8e2a8d2f63713f0499d0df70e61db3ce0ff88b4f

                                  SHA256

                                  fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a

                                  SHA512

                                  3779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22

                                • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                                  Filesize

                                  429KB

                                  MD5

                                  ce27255f0ef33ce6304e54d171e6547c

                                  SHA1

                                  e594c6743d869c852bf7a09e7fe8103b25949b6e

                                  SHA256

                                  82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                                  SHA512

                                  96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                                • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe

                                  Filesize

                                  3.6MB

                                  MD5

                                  378706614b22957208e09fc84fceece8

                                  SHA1

                                  d35e1f89f36aed26553b665f791cd69d82136fb8

                                  SHA256

                                  df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d

                                  SHA512

                                  bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e

                                • C:\Users\Admin\AppData\Local\Temp\1005388001\d263f2c36a.exe

                                  Filesize

                                  4.9MB

                                  MD5

                                  834caa1ea7e5fadc7aa0735eed542c0e

                                  SHA1

                                  1c077c5230136337722a6c127ddbe2ebb49f67b3

                                  SHA256

                                  c6502746b552f7a74d91fd5e6574e5059b6e4a6b027f1b3ca68a2d604756c074

                                  SHA512

                                  4d8e99d401c0025c38eae93a8b6b41804e83a104a92753eb4a48e9d27c6c901948d7ca0cebaf6771031259039346bb3a2582cce32550bfcba06757edd9b1fe7d

                                • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe

                                  Filesize

                                  3.4MB

                                  MD5

                                  ab354e8d26e5639dfa7990bcdcff85d9

                                  SHA1

                                  d668a91997fd2679bd6bb8ac0b465206906514d6

                                  SHA256

                                  2fc032c86b89cba2b840e69c74bf36552db072c43e2b2ea86503fc4958e59eec

                                  SHA512

                                  cfc97c00f8d0df222852853bb37160eb62e983fa0471ad2fbd4957cb1bc5a2bc438a615a769f8fc4f67b7d31aff5ebefa345b8e40d101745b8e8f3467a527f9d

                                • C:\Users\Admin\AppData\Local\Temp\1011459001\5da218c60b.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  067c6ef230959088881de3230053d406

                                  SHA1

                                  157ee7d102bed9882bbf854792642e719ad3a4e2

                                  SHA256

                                  8644c1f9990ec50818dd925d03b01bacfb10f340f566ebd71d1c8fd70512cb56

                                  SHA512

                                  a9295a726ba66ec04b81122b683584360debdac2c5a661c94e4a933a7167dda2d5660a1982165c5d72e56344a168e221709dfda110354ed1ddd47cdc9053ccb2

                                • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  5fa72774e9d750628857a68d84275833

                                  SHA1

                                  7eebff7d14817544cc11829e354c1dfc7f603628

                                  SHA256

                                  a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56

                                  SHA512

                                  9ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838

                                • C:\Users\Admin\AppData\Local\Temp\1012041001\e6dA9xd.exe

                                  Filesize

                                  612B

                                  MD5

                                  e3eb0a1df437f3f97a64aca5952c8ea0

                                  SHA1

                                  7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                  SHA256

                                  38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                  SHA512

                                  43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  ff4cf493ac5f7663d1cfc243e6646eb7

                                  SHA1

                                  ff7184eae695580f1e86fac340925c7f01f4de6d

                                  SHA256

                                  72a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748

                                  SHA512

                                  1eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b

                                • C:\Users\Admin\AppData\Local\Temp\1012333001\Go.exe

                                  Filesize

                                  2.2MB

                                  MD5

                                  c9059dfb76ad9e011d4e11608ccc98cc

                                  SHA1

                                  c7ec739a977cc99a19e39103e2a20d59a6094508

                                  SHA256

                                  906e30690506eb761b3f84f7ae1146db9dc796e60d87303173fc99370485c58f

                                  SHA512

                                  da494d85e5689c65f2369bcff41479ec9a797322c761e18138c1e2397e0879986dc9bca64d9cdc20999902db90fdec8f94ad36184997d396433ab1a7c2e1b9ce

                                • C:\Users\Admin\AppData\Local\Temp\1012341001\c9cd79b90c.exe

                                  Filesize

                                  4.2MB

                                  MD5

                                  928d3b616e73c926bc35d596c432a62b

                                  SHA1

                                  83f772926daa9beb0f1a60b0a5145685be6f82cd

                                  SHA256

                                  cc9929b67e24ad058371096529fda098fc1171df19097b4a05e79e3641b8d71f

                                  SHA512

                                  6bb0d25b857fb48ccf81b51c4348ff240083ff8069d8d96bf9b62df9534f6c0891c6954afb30ca5a43ee0d096396a8cd42dcfafff4b0152663ca75bcf3177ade

                                • C:\Users\Admin\AppData\Local\Temp\1012344001\rhnew.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  f7286fef9317fe91e24cda721ec0be81

                                  SHA1

                                  0e0197c0f87200f7c1ebb4bba314f7bb875a638c

                                  SHA256

                                  4dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62

                                  SHA512

                                  314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e

                                • C:\Users\Admin\AppData\Local\Temp\1012345001\92c8a074e3.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  8c230debcaa0241cdf437c61b620b77a

                                  SHA1

                                  9a16380b7a2f8328b04f060791f7ad52466c374f

                                  SHA256

                                  572a83147fc938c1ff176431438955f77fc5dd10cedca752fd7da8bab4506b6d

                                  SHA512

                                  de539b4e190bc279969ba97513da91d903fef0eae7d91844f820665e9c1ebd303c5641b39229f5810771d7a590842bd30f41c3627ec694bc2799ce06a1a22132

                                • C:\Users\Admin\AppData\Local\Temp\1012347001\dc9403b770.exe

                                  Filesize

                                  945KB

                                  MD5

                                  8517a8167dc00d5cb9b5f0ab6a170552

                                  SHA1

                                  d1592531656e09f8aaf724c27e785e1b30498940

                                  SHA256

                                  bbec4bc64a4a9ae0c765b71fcdc033b430f50c56b1f5a0e581a3d8117795c11b

                                  SHA512

                                  854482678dd01d889b80d794fcc804cc567dc121149beb64b07c4f98a9d476ba99473c0a7f80819156fb41fd73f67bffdf36a6520e19b3912b5d5bc6d293e012

                                • C:\Users\Admin\AppData\Local\Temp\1012348001\c03394e2e7.exe

                                  Filesize

                                  2.6MB

                                  MD5

                                  80a4a9bd8cdb150cbc228ad88557260f

                                  SHA1

                                  057931385a2bd410d5c5502a2f6461471fa0377f

                                  SHA256

                                  10ee97136471d63c17d88a987c7b7282b87c2456f7082310c79fe9c2b6e6ffa1

                                  SHA512

                                  ff5117d04af0459b8dc7f6f747026fbc9538954db44489d151a85cdcc238563964593326691dcfa440b6ab379e276074c2c9f231255cd5b844e1bb5cce8a0146

                                • C:\Users\Admin\AppData\Local\Temp\1012349001\2aee811258.exe

                                  Filesize

                                  1.9MB

                                  MD5

                                  032aa8264c2ccbdd008693fd9c29a1fb

                                  SHA1

                                  86a99c6498d68c8af759afd61ed56637a46bb016

                                  SHA256

                                  eab9619df6b82520165d2b4455fbdf147077932f8f53b80d6adb9501e822cdbc

                                  SHA512

                                  bb5c07246b6bbac5ccfd26fd32e4f8fb1b337590593475ee8a289bb92a502d7f95c7f74dcfdf0c71389290ee4c415fb1328618d081e3c7dbb31a3a5c7aa8a679

                                • C:\Users\Admin\AppData\Local\Temp\Cab5CB3.tmp

                                  Filesize

                                  70KB

                                  MD5

                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                  SHA1

                                  1723be06719828dda65ad804298d0431f6aff976

                                  SHA256

                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                  SHA512

                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                • C:\Users\Admin\AppData\Local\Temp\Cjag5QGzXj

                                  Filesize

                                  46KB

                                  MD5

                                  02d2c46697e3714e49f46b680b9a6b83

                                  SHA1

                                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                                  SHA256

                                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                  SHA512

                                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                • C:\Users\Admin\AppData\Local\Temp\Tar5F16.tmp

                                  Filesize

                                  181KB

                                  MD5

                                  4ea6026cf93ec6338144661bf1202cd1

                                  SHA1

                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                  SHA256

                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                  SHA512

                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                • C:\Users\Admin\AppData\Local\Temp\a8RwB4OtLD

                                  Filesize

                                  92KB

                                  MD5

                                  f98745d81e8b84f39630844a63afc1ee

                                  SHA1

                                  d7977c2dab5de25630f7d869f9b16a8502cd3bb3

                                  SHA256

                                  9c34e13f0d2852fb4a8a53a4727a59d24691a507edb6ff1965024a6147799a83

                                  SHA512

                                  e6b1bf12139e627d6aa2b25c9d7e8ebab1e86fc3025655bf88bc735413f55b10490f0237b8d11fd5db0eb6045f6176e93228c70d8e940a62ea4324816c31a3dd

                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  cd86e4c2fbaf81cb17606d69108fff47

                                  SHA1

                                  97117dadf1a95214ceaf1d1d9337dae317c6a358

                                  SHA256

                                  458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e

                                  SHA512

                                  42393ee97337b197a176032276b9da8bd3ba26d5e5a36751130271422a9cb0a91d50a22c9f75e4de77083b47d8b6c7f54c5f1ebccd09f97dbba8eb6591554748

                                • C:\Users\Admin\AppData\Local\Temp\is-QFGGL.tmp\stories.tmp

                                  Filesize

                                  689KB

                                  MD5

                                  e672d5907f1ce471d9784df64d8a306b

                                  SHA1

                                  6d094cae150d72b587c5480c15127d7059e16932

                                  SHA256

                                  9f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5

                                  SHA512

                                  9cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                  Filesize

                                  442KB

                                  MD5

                                  85430baed3398695717b0263807cf97c

                                  SHA1

                                  fffbee923cea216f50fce5d54219a188a5100f41

                                  SHA256

                                  a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                  SHA512

                                  06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                  Filesize

                                  8.0MB

                                  MD5

                                  a01c5ecd6108350ae23d2cddf0e77c17

                                  SHA1

                                  c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                  SHA256

                                  345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                  SHA512

                                  b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                • C:\Users\Admin\AppData\Local\Temp\uUwPNB0PHw

                                  Filesize

                                  20KB

                                  MD5

                                  c9ff7748d8fcef4cf84a5501e996a641

                                  SHA1

                                  02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                                  SHA256

                                  4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                                  SHA512

                                  d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QG5QOGDMALOA5BJCQF0N.temp

                                  Filesize

                                  7KB

                                  MD5

                                  13dc309359cf8c715d573947e02242d5

                                  SHA1

                                  c4c7c9328554cbe0c21a050c6c21434195184697

                                  SHA256

                                  1ebb6cb1ea9e85ea978d320265a2bba5cdbccaef9ce4a15783b9e80e32217a04

                                  SHA512

                                  d62cf68b407c5931eb5fd27fc676b4d428e68fc552329a4a3de562fb4e89aa48a44432e60370673afc041889cce1c8bb15939450e756c8668c9a771a89d46efb

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin

                                  Filesize

                                  2KB

                                  MD5

                                  14757a37302e023be06c8aee6369eddd

                                  SHA1

                                  2bef11e09f3f36cccd1945b6d5c81b329b6e1613

                                  SHA256

                                  8e870be928203413def8c0cac8dd6236948c5abf5ce15b1510649d0e6b31ffa2

                                  SHA512

                                  8e892987503bbf98c010dd8bb4b7ce94e2dbce86eb36e75caf2a5b0a6a8fc93299545458f51b8502b46a47bd377ed152c710fefcded951fea7525289e69cd303

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\8eea6a3e-41ef-4709-969d-2504bfc9c305

                                  Filesize

                                  11KB

                                  MD5

                                  eea47e858852e22f013f653ef7b50335

                                  SHA1

                                  00767439e06729590dc60e6ce598ac55c0395a07

                                  SHA256

                                  a824067105834b4cafdbba09b10af7ba70b0121320f8b63b9180f4d26e96f408

                                  SHA512

                                  3db5fe1977328450496a2606153c6706cc0e8d1e75663f86e55ac516afee98a07ef4621d02f5864bae60e1118a5f06c1b1dd755a166fafab997bca52789fccad

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\8fa87999-6266-4400-bcdd-3d7eb1c5ae61

                                  Filesize

                                  745B

                                  MD5

                                  072b07de62dde8fda5361a13b62759b9

                                  SHA1

                                  413622481b954ce5d3c81fc9d16c03b4d878a7da

                                  SHA256

                                  9fe6528fd4b74e19daa3fec837e74462097018240bd37f4cefc36f7138f75063

                                  SHA512

                                  8b4bb122178ab798419fd27831639e69a44e500f0a3a44476b32168cb6983770498bfe95453fcf14048477e071bde37d4e4eefe331a3a022e08f7f4b84876015

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                  Filesize

                                  997KB

                                  MD5

                                  fe3355639648c417e8307c6d051e3e37

                                  SHA1

                                  f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                  SHA256

                                  1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                  SHA512

                                  8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                  Filesize

                                  116B

                                  MD5

                                  3d33cdc0b3d281e67dd52e14435dd04f

                                  SHA1

                                  4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                  SHA256

                                  f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                  SHA512

                                  a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                  Filesize

                                  479B

                                  MD5

                                  49ddb419d96dceb9069018535fb2e2fc

                                  SHA1

                                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                  SHA256

                                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                  SHA512

                                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                  Filesize

                                  372B

                                  MD5

                                  8be33af717bb1b67fbd61c3f4b807e9e

                                  SHA1

                                  7cf17656d174d951957ff36810e874a134dd49e0

                                  SHA256

                                  e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                  SHA512

                                  6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                  Filesize

                                  11.8MB

                                  MD5

                                  33bf7b0439480effb9fb212efce87b13

                                  SHA1

                                  cee50f2745edc6dc291887b6075ca64d716f495a

                                  SHA256

                                  8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                  SHA512

                                  d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                  Filesize

                                  1KB

                                  MD5

                                  688bed3676d2104e7f17ae1cd2c59404

                                  SHA1

                                  952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                  SHA256

                                  33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                  SHA512

                                  7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                  Filesize

                                  1KB

                                  MD5

                                  937326fead5fd401f6cca9118bd9ade9

                                  SHA1

                                  4526a57d4ae14ed29b37632c72aef3c408189d91

                                  SHA256

                                  68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                  SHA512

                                  b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js

                                  Filesize

                                  7KB

                                  MD5

                                  d13c22c1a7a3df1ce9c754864623a602

                                  SHA1

                                  9b30873d699a638a045ff9b5afeff550eaf0100e

                                  SHA256

                                  820fe95da42c5d073cb42506f61bbbb6618cf515f49dca2c0f6b1bb8f9d238e2

                                  SHA512

                                  77ca67bc3243e3108c1ecee584f2ae1a184f1967deed1c9a3b5355a821e2e569b14fe486dd61a3adfb07445c734842d1a61def3496d098b10992345c8e464984

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js

                                  Filesize

                                  6KB

                                  MD5

                                  d698664ef420903754fd9660b02a9f7f

                                  SHA1

                                  dcd71a872bc5046ba2bc7e1e2041be1f1e93aaca

                                  SHA256

                                  425df08f8dd1d1b4703b11c32ce94f6cf0f201b181e6234d84c0685869d2df0b

                                  SHA512

                                  fe8a94f7be3c3c29caeaf86cf00c7ca1d98362f94ff8c683e4fabcf1c10282f8f66e7ff378ae8ed0d5f808d015ca722f637d36d07fa1cb133e6152caff92d81e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js

                                  Filesize

                                  6KB

                                  MD5

                                  3106c0eb32558a9a812c9d5d4a0b17b5

                                  SHA1

                                  0b20fd54e3fffa6a9874bf8d6df7c0ade9efdb79

                                  SHA256

                                  37b9795613e05fbfcb3433a6092e16d23cd03c5cb33f6a0e575cc18f9e241146

                                  SHA512

                                  a92bf43fc95479e78f5ee3d14ee5c36a9d7313e5abc2c5eba14cada9dd5dff717437cbdb0dfd64db0ba235bd14801101c9b0d1dcc7a0ca93df646c4be560f0dc

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\sessionstore-backups\recovery.jsonlz4

                                  Filesize

                                  4KB

                                  MD5

                                  2afd6d751ab678c3aabcdaa19a904f36

                                  SHA1

                                  97eaffef4b9da81f18c18145750f0d1fd695d17b

                                  SHA256

                                  afd95160c8d7d6a3e1bc1ffc5ec9585bb3f5cc7762c5f9b8ddc93162c177e9cb

                                  SHA512

                                  82a4c8b44cd4682d9214928073216c675e247c5190278dad3bbe87a17def5f45f025fd09c1e5ec6dfb922636634a73869df782644e9991326bf3f71a84a37e73

                                • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                  Filesize

                                  124KB

                                  MD5

                                  0d3418372c854ee228b78e16ea7059be

                                  SHA1

                                  c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                                  SHA256

                                  885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                                  SHA512

                                  e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                                • \ProgramData\mozglue.dll

                                  Filesize

                                  593KB

                                  MD5

                                  c8fd9be83bc728cc04beffafc2907fe9

                                  SHA1

                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                  SHA256

                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                  SHA512

                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                • \ProgramData\nss3.dll

                                  Filesize

                                  2.0MB

                                  MD5

                                  1cc453cdf74f31e4d913ff9c10acdde2

                                  SHA1

                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                  SHA256

                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                  SHA512

                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                • \Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe

                                  Filesize

                                  2.8MB

                                  MD5

                                  afd04fa333896b4f59f3a51217178dbe

                                  SHA1

                                  a16de3095779162c4ecbeb7b8ec25f6d379e7434

                                  SHA256

                                  5b97db42f23530b3db307d9593a4d0cc5572f3474e37ac5b30dbad74b088c73a

                                  SHA512

                                  123ee4edb55e9fa1dfbd2028fe82ec9ea88dcc793e893259cd620aa0767d16c93b02561dd4a8bfb2738c3c98387bcc55bda881a1af047132f2bc0e020ce385e7

                                • \Users\Admin\AppData\Local\Temp\is-PNSOG.tmp\_isetup\_iscrypt.dll

                                  Filesize

                                  2KB

                                  MD5

                                  a69559718ab506675e907fe49deb71e9

                                  SHA1

                                  bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                  SHA256

                                  2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                  SHA512

                                  e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                • \Users\Admin\AppData\Local\Temp\is-PNSOG.tmp\_isetup\_shfoldr.dll

                                  Filesize

                                  22KB

                                  MD5

                                  92dc6ef532fbb4a5c3201469a5b5eb63

                                  SHA1

                                  3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                  SHA256

                                  9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                  SHA512

                                  9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                • memory/352-112-0x00000000000F0000-0x00000000005AF000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/352-129-0x0000000006DA0000-0x000000000725F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/352-208-0x0000000006DA0000-0x000000000725F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/352-127-0x00000000000F0000-0x00000000005AF000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/352-126-0x0000000006DA0000-0x000000000725F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/860-89-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/860-535-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/860-616-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/860-207-0x0000000060900000-0x0000000060992000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/860-149-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/860-88-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/860-364-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/860-206-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/956-582-0x000000001B690000-0x000000001B972000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/956-583-0x0000000001E90000-0x0000000001E98000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1220-151-0x00000000002E0000-0x0000000000541000-memory.dmp

                                  Filesize

                                  2.4MB

                                • memory/1220-216-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                  Filesize

                                  972KB

                                • memory/1220-345-0x00000000002E0000-0x0000000000541000-memory.dmp

                                  Filesize

                                  2.4MB

                                • memory/1268-598-0x0000000060900000-0x0000000060992000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/1268-597-0x0000000000400000-0x00000000006DF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/1328-637-0x0000000000C90000-0x0000000000E82000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/1492-346-0x0000000000330000-0x000000000098B000-memory.dmp

                                  Filesize

                                  6.4MB

                                • memory/1564-27-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-211-0x00000000068F0000-0x0000000006D83000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1564-325-0x00000000068F0000-0x0000000006D7B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/1564-326-0x00000000068F0000-0x0000000006D83000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1564-169-0x00000000068F0000-0x0000000006DAF000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1564-109-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-660-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-322-0x00000000068F0000-0x0000000006D7B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/1564-445-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-280-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-328-0x00000000068F0000-0x0000000006D83000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1564-447-0x00000000068F0000-0x0000000006D7B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/1564-457-0x00000000068F0000-0x0000000006D7B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/1564-111-0x00000000068F0000-0x0000000006DAF000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1564-110-0x00000000068F0000-0x0000000006DAF000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1564-25-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-26-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-20-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-548-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-209-0x00000000068F0000-0x0000000006D83000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1564-24-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-22-0x0000000000EA0000-0x0000000001365000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1564-21-0x0000000000EA1000-0x0000000000ECF000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/1672-661-0x0000000000980000-0x0000000000E60000-memory.dmp

                                  Filesize

                                  4.9MB

                                • memory/1808-391-0x0000000001240000-0x00000000016D3000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1808-530-0x0000000001240000-0x00000000016D3000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1808-214-0x0000000001240000-0x00000000016D3000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1808-347-0x0000000001240000-0x00000000016D3000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1836-446-0x0000000000350000-0x000000000080F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1836-131-0x0000000000350000-0x000000000080F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1836-150-0x00000000064E0000-0x0000000006741000-memory.dmp

                                  Filesize

                                  2.4MB

                                • memory/1836-549-0x0000000000350000-0x000000000080F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1836-281-0x0000000000350000-0x000000000080F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1836-188-0x00000000064E0000-0x00000000067DB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1836-1072-0x00000000064E0000-0x0000000006741000-memory.dmp

                                  Filesize

                                  2.4MB

                                • memory/1836-324-0x00000000064E0000-0x00000000067DB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1836-1069-0x00000000064E0000-0x0000000006741000-memory.dmp

                                  Filesize

                                  2.4MB

                                • memory/1836-213-0x0000000000350000-0x000000000080F000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1836-304-0x00000000064E0000-0x00000000067DB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1836-190-0x00000000064E0000-0x00000000067DB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1836-152-0x00000000064E0000-0x0000000006741000-memory.dmp

                                  Filesize

                                  2.4MB

                                • memory/1852-506-0x00000000033E0000-0x00000000036BF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/1852-596-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/1852-599-0x00000000033E0000-0x00000000036BF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/2056-531-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/2056-532-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/2056-602-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/2056-533-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/2056-534-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/2296-1-0x0000000077890000-0x0000000077892000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2296-0-0x0000000000D90000-0x0000000001255000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2296-19-0x0000000007160000-0x0000000007625000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2296-18-0x0000000000D90000-0x0000000001255000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2296-5-0x0000000000D90000-0x0000000001255000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2296-3-0x0000000000D90000-0x0000000001255000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2296-2-0x0000000000D91000-0x0000000000DBF000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/2332-618-0x0000000000E30000-0x0000000001ADC000-memory.dmp

                                  Filesize

                                  12.7MB

                                • memory/2388-641-0x0000000000AA0000-0x0000000000F80000-memory.dmp

                                  Filesize

                                  4.9MB

                                • memory/2392-552-0x0000000001010000-0x000000000149B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/2392-456-0x0000000001010000-0x000000000149B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/2392-448-0x0000000001010000-0x000000000149B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/2392-323-0x0000000001010000-0x000000000149B000-memory.dmp

                                  Filesize

                                  4.5MB

                                • memory/2484-595-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/2484-495-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/2784-189-0x0000000000230000-0x000000000052B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/2784-366-0x0000000000230000-0x000000000052B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/2784-321-0x0000000000230000-0x000000000052B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/2784-509-0x0000000000230000-0x000000000052B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/2904-842-0x0000000019F80000-0x000000001A262000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/2904-843-0x00000000009A0000-0x00000000009A8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2956-180-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/2956-41-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/2984-554-0x0000000000310000-0x000000000031E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2984-561-0x0000000000340000-0x000000000034E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2984-550-0x0000000000900000-0x0000000000AF2000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/2984-556-0x0000000000340000-0x000000000035C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/2984-563-0x0000000000350000-0x000000000035C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2984-565-0x0000000000360000-0x000000000036C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2984-559-0x00000000004F0000-0x0000000000508000-memory.dmp

                                  Filesize

                                  96KB

                                • memory/2984-557-0x0000000000320000-0x000000000033C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/2988-182-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/2988-86-0x0000000003BB0000-0x0000000003E8F000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/2988-130-0x0000000003BB0000-0x0000000003E8F000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/3252-819-0x000000001B550000-0x000000001B832000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/3252-820-0x0000000001D60000-0x0000000001D68000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4036-881-0x0000000001230000-0x00000000014D8000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/4036-880-0x0000000001230000-0x00000000014D8000-memory.dmp

                                  Filesize

                                  2.7MB