Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 12:49

General

  • Target

    ab3fcb84f4c0d74438e53e432978cbd7876e8dbb7bb54c6208d23becd3ea7b4c.exe

  • Size

    1.8MB

  • MD5

    cc25b82161c253d79a731c4ece950e9e

  • SHA1

    646da450ff3af5cd72bd84603ba8198ad78b6c55

  • SHA256

    ab3fcb84f4c0d74438e53e432978cbd7876e8dbb7bb54c6208d23becd3ea7b4c

  • SHA512

    923ac16d25a602bb44dd4f2f3436a1a80beb71f888d684ce2d3a02a89a7feb7bed9fb4939fb8f0b4be4fc506c62a2cf29104c6f68a72f0537a78c783821b72d0

  • SSDEEP

    49152:BXfHVpfKeVf5JU7CWkzXTyHLei+cqK+Y:tVpfKkf47CWmTyHiiXG

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

C2

xclient.fahrerscheinonlineholen.de:2489

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Enumerates VirtualBox registry keys 2 TTPs 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 45 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab3fcb84f4c0d74438e53e432978cbd7876e8dbb7bb54c6208d23becd3ea7b4c.exe
    "C:\Users\Admin\AppData\Local\Temp\ab3fcb84f4c0d74438e53e432978cbd7876e8dbb7bb54c6208d23becd3ea7b4c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\1007892001\a61c7520bf.exe
        "C:\Users\Admin\AppData\Local\Temp\1007892001\a61c7520bf.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\1007893001\717e5e0159.exe
        "C:\Users\Admin\AppData\Local\Temp\1007893001\717e5e0159.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe
            "C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"
            5⤵
            • Executes dropped EXE
            PID:2768
          • C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe
            "C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2992
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 624
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1972
          • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe
            "C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3456
            • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3632
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll, Main
                7⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2708
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\cred64.dll, Main
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2612
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\cred64.dll, Main
                  8⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3996
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    9⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Network Configuration Discovery: Wi-Fi Discovery
                    PID:3404
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\551809350426_Desktop.zip' -CompressionLevel Optimal
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2912
          • C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe
            "C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3808
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3704
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3152
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3624
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4048
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
              6⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1984
          • C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe
            "C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe"
            5⤵
            • Executes dropped EXE
            PID:2856
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2856 -s 80
              6⤵
              • Loads dropped DLL
              PID:2760
          • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe
            "C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1772
          • C:\Users\Admin\AppData\Local\Temp\1019368001\f3a4eba23c.exe
            "C:\Users\Admin\AppData\Local\Temp\1019368001\f3a4eba23c.exe"
            5⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2232
          • C:\Users\Admin\AppData\Local\Temp\1019369001\32a9e2984e.exe
            "C:\Users\Admin\AppData\Local\Temp\1019369001\32a9e2984e.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1040
          • C:\Users\Admin\AppData\Local\Temp\1019370001\dc75aa8158.exe
            "C:\Users\Admin\AppData\Local\Temp\1019370001\dc75aa8158.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:376
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
              6⤵
              • Loads dropped DLL
              PID:3832
              • C:\Windows\system32\mode.com
                mode 65,10
                7⤵
                  PID:540
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4000
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_7.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2172
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_6.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3344
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_5.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3588
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_4.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3828
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_3.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3984
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_2.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2804
                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                  7z.exe e extracted/file_1.zip -oextracted
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2720
                • C:\Windows\system32\attrib.exe
                  attrib +H "in.exe"
                  7⤵
                  • Views/modifies file attributes
                  PID:2192
                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                  "in.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:2248
                  • C:\Windows\system32\attrib.exe
                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                    8⤵
                    • Views/modifies file attributes
                    PID:2148
                  • C:\Windows\system32\attrib.exe
                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                    8⤵
                    • Views/modifies file attributes
                    PID:3052
                  • C:\Windows\system32\schtasks.exe
                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                    8⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2888
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell ping 127.0.0.1; del in.exe
                    8⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2620
                    • C:\Windows\system32\PING.EXE
                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                      9⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:1808
            • C:\Users\Admin\AppData\Local\Temp\1019371001\f9b1bf880b.exe
              "C:\Users\Admin\AppData\Local\Temp\1019371001\f9b1bf880b.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:340
            • C:\Users\Admin\AppData\Local\Temp\1019372001\04398f2f26.exe
              "C:\Users\Admin\AppData\Local\Temp\1019372001\04398f2f26.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1620
            • C:\Users\Admin\AppData\Local\Temp\1019373001\e672a2ed74.exe
              "C:\Users\Admin\AppData\Local\Temp\1019373001\e672a2ed74.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2836
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:864
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1500
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2004
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3684
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3732
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                6⤵
                  PID:540
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    7⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:3484
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.0.1049601050\161055444" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1096 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {48b29c76-4c3b-4c34-9bf2-949b7c0aeb34} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 1332 a4eca58 gpu
                      8⤵
                        PID:3920
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.1.19769574\1257396384" -parentBuildID 20221007134813 -prefsHandle 1548 -prefMapHandle 1544 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5b9ccbf-a916-4687-9d8a-f5780273fa40} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 1560 a4ed658 socket
                        8⤵
                          PID:1608
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.2.1646899988\754813401" -childID 1 -isForBrowser -prefsHandle 2220 -prefMapHandle 2216 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85eaaa9f-8e31-4820-bb9d-760c193ab785} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 2232 b662858 tab
                          8⤵
                            PID:2044
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.3.1177437753\715543856" -childID 2 -isForBrowser -prefsHandle 2656 -prefMapHandle 2652 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce7c04ac-da67-429b-9f80-e742e81901ee} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 2668 1d125358 tab
                            8⤵
                              PID:1864
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.4.857735447\472892152" -childID 3 -isForBrowser -prefsHandle 3776 -prefMapHandle 3408 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3186df7-6ce4-4eb7-b332-d3d451387c2a} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 3788 1ff3da58 tab
                              8⤵
                                PID:3820
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.5.1006626630\1373236990" -childID 4 -isForBrowser -prefsHandle 3900 -prefMapHandle 3904 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3fbc2ef0-b8a5-4d8c-9561-3d2127ab3d80} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 3888 1ff3dd58 tab
                                8⤵
                                  PID:3488
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3484.6.1838961779\338893392" -childID 5 -isForBrowser -prefsHandle 4068 -prefMapHandle 4072 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {23e77953-f2d5-46a1-8c25-eb6930e3a242} 3484 "\\.\pipe\gecko-crash-server-pipe.3484" 4060 1ff3f558 tab
                                  8⤵
                                    PID:3728
                            • C:\Users\Admin\AppData\Local\Temp\1019374001\1511e3d0c1.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019374001\1511e3d0c1.exe"
                              5⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:764
                            • C:\Users\Admin\AppData\Local\Temp\1019375001\d112be923e.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019375001\d112be923e.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1856
                            • C:\Users\Admin\AppData\Local\Temp\1019376001\d6fc817379.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019376001\d6fc817379.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:1240
                            • C:\Users\Admin\AppData\Local\Temp\1019377001\2352e0496c.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019377001\2352e0496c.exe"
                              5⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Drops file in Program Files directory
                              • Modifies system certificate store
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1348
                              • C:\Program Files\Windows Media Player\graph\graph.exe
                                "C:\Program Files\Windows Media Player\graph\graph.exe"
                                6⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2688
                            • C:\Users\Admin\AppData\Local\Temp\1019378001\e7555e7712.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019378001\e7555e7712.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:2212
                            • C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:1928
                              • C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe
                                "C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:3744
                              • C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe
                                "C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:1768
                              • C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe
                                "C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:1032
                              • C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe
                                "C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe"
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Modifies system certificate store
                                PID:2316
                            • C:\Users\Admin\AppData\Local\Temp\1019380001\eb995ac460.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019380001\eb995ac460.exe"
                              5⤵
                              • Enumerates VirtualBox registry keys
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:3940
                            • C:\Users\Admin\AppData\Local\Temp\1019381001\0de5233bbc.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019381001\0de5233bbc.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:776
                        • C:\Users\Admin\AppData\Local\Temp\1007894001\8fa789d12b.exe
                          "C:\Users\Admin\AppData\Local\Temp\1007894001\8fa789d12b.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Loads dropped DLL
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1720
                        • C:\Users\Admin\AppData\Local\Temp\1007895001\39f0d2c7cd.exe
                          "C:\Users\Admin\AppData\Local\Temp\1007895001\39f0d2c7cd.exe"
                          3⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2896
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {A9A27ECD-42B2-4DF0-9996-06438103A899} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
                      1⤵
                        PID:2380
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:3652
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3592
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                            3⤵
                            • Drops file in System32 directory
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1828
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:3948
                        • C:\Users\Admin\AppData\Roaming\XClient.exe
                          C:\Users\Admin\AppData\Roaming\XClient.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3496
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:1348
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                              PID:3400
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              3⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:540
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:1868
                          • C:\Users\Admin\AppData\Roaming\XClient.exe
                            C:\Users\Admin\AppData\Roaming\XClient.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2336

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          25KB

                          MD5

                          cd14cef58d2289e3e293c37b18def8de

                          SHA1

                          5f07ccf9990671229eb1d3ee17efc19b3b8d666c

                          SHA256

                          47ed3bf0b1677298d5ef600bba438330779490ff483daf4e9ba8bdbf9f5055e9

                          SHA512

                          7c3f2d8c86e0f9e6e4ba3c28863bd4e9067da9113a44e72a9b2e7b25a36d5bf04a987b2c050122281fad46c7723818cf55bf7885e116cb239097655433b781ad

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1007892001\a61c7520bf.exe

                          Filesize

                          2.8MB

                          MD5

                          6573693c2c60cf961bccc52212548798

                          SHA1

                          2feebb1fa6bb01383984b487e81a2ea95a30dd46

                          SHA256

                          69d63576968a32f9c76ca14bbf10993300fe50799a396f87ca58612c8838ef2f

                          SHA512

                          8da5314aef5c69193589a49db2eeb8853c4ac1acabb823ec4be0acc4b9683b4e8c4c686dff134c44a8191008c5b6dbf1484b163a418e1f160524927afe6bd420

                        • C:\Users\Admin\AppData\Local\Temp\1007893001\717e5e0159.exe

                          Filesize

                          3.0MB

                          MD5

                          7dc7a8d2e9d44cae10b9b55b65585ddc

                          SHA1

                          3e78d38a9ce837926831ea27a0efb1a262877334

                          SHA256

                          efbfd7a968dc584c166551f171937da09dd94178b8c27e09f5eab73d1641d0d0

                          SHA512

                          e33388557fcea27a9d5be98eb2dc308be8d5d8d3afcb0e27d8834a96c95ba41f97c47f59de8227fd13667e8692e9063162b1d60a84161f57e4f8905f6d6483fe

                        • C:\Users\Admin\AppData\Local\Temp\1007894001\8fa789d12b.exe

                          Filesize

                          1.8MB

                          MD5

                          7d259326e9642c8a13d30573dafe3d90

                          SHA1

                          fc5ba1d2215d2785b5223f501ce0254973adad2c

                          SHA256

                          cb6b4bb0b3fc19a3626bd33f40f4399e667db405f4ac56b69b2b271816df371b

                          SHA512

                          ddb2e84a2f3e88eda5f4c847a7bb836fc7eff26d6d47d5e74bc27180f6f346b78cb5d4aa35040b6be0f24e53651024ea59a9623f83c939762ccc216a567e4fbb

                        • C:\Users\Admin\AppData\Local\Temp\1007895001\39f0d2c7cd.exe

                          Filesize

                          4.2MB

                          MD5

                          4a09a81ebf7bee536d365270fcb2f9ac

                          SHA1

                          5d6388be06c33c95a80c35f960394eda8baf603e

                          SHA256

                          05fd14fc6511ac0a2c1460c5a17470ae35993174bbcbe7e8d0e9a36ca148aa66

                          SHA512

                          8bf24c9d3c18930fd0d0f83a6ab28204ebe178119b36c1034d0e594040eedba5849769a078ebd82dccc0624b2cc3cd3815c5a928bdf34ef6c4da79d422a4f7ad

                        • C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe

                          Filesize

                          2.5MB

                          MD5

                          87330f1877c33a5a6203c49075223b16

                          SHA1

                          55b64ee8b2d1302581ab1978e9588191e4e62f81

                          SHA256

                          98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                          SHA512

                          7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                        • C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe

                          Filesize

                          1.2MB

                          MD5

                          545b933cac5def6ec43ca2cb6eac9d8e

                          SHA1

                          f2740a1062032cc280d54c4cfe6a1ff3c6ce1c76

                          SHA256

                          efce8cc629bb9f443613c7ec97b65020b514b9ee497d472ef24fed21bceb86c4

                          SHA512

                          f4853f10933edbf7df0ca6138bb423e5dfb18cf6431068a776a0c53ea226f176d263b9514066b88861360b161ba922b618f306f1936a95e1071fc70926418caa

                        • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe

                          Filesize

                          429KB

                          MD5

                          51ff79b406cb223dd49dd4c947ec97b0

                          SHA1

                          b9b0253480a1b6cbdd673383320fecae5efb3dce

                          SHA256

                          2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                          SHA512

                          c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                        • C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe

                          Filesize

                          88KB

                          MD5

                          07e410214a2aeb8f577e407154252f3c

                          SHA1

                          697fac558b66c0476c3f04d80764fa75eb6de77d

                          SHA256

                          12e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114

                          SHA512

                          470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc

                        • C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe

                          Filesize

                          8.7MB

                          MD5

                          1c848c274240a7b5561550c4867c336f

                          SHA1

                          fe286e578f0652077cd858850939a152835dcc6c

                          SHA256

                          8b5af8709908fa9da7792816d03feb6287ded45a9cb5a5afd4f061113638a092

                          SHA512

                          7d96fd7398ce1a3199ea4cb0c7bc4e0f7b76692d9200dd27499b3f96e50a0b91cc77169ad542be46c74fc09e13a84597d180c4c4f0fd23ce45e8c3fa99c8042d

                        • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe

                          Filesize

                          641KB

                          MD5

                          f6af9584b24dd2a354c1bf537de92823

                          SHA1

                          6b8c53df9af8899b5e63cba976550e2b16f0ca4b

                          SHA256

                          844eb87f5468d53e5fc694c975cf67867de111aae283e9ec7567abff23f6cf3c

                          SHA512

                          6bfee0a7436e88f92598cda8c9d78d7dcd61638a02c5c3df537ad2af54d64ee78a546b0208ced0c7dab272aae65a34cceb2c609ead57200798a510c407b1e177

                        • C:\Users\Admin\AppData\Local\Temp\1019370001\dc75aa8158.exe

                          Filesize

                          4.2MB

                          MD5

                          3a425626cbd40345f5b8dddd6b2b9efa

                          SHA1

                          7b50e108e293e54c15dce816552356f424eea97a

                          SHA256

                          ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                          SHA512

                          a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                        • C:\Users\Admin\AppData\Local\Temp\1019371001\f9b1bf880b.exe

                          Filesize

                          1.8MB

                          MD5

                          bf56486b61f1a99182f133ac8a3937e6

                          SHA1

                          36df5535aa7ac556ae518109824e06c99ea99245

                          SHA256

                          5fd0d95b773360005ba3a149d3f63e3998be1c1b78e91d17d03c79d2168bbb1e

                          SHA512

                          45e3b6019f707bc53408fe1862df69446ed5be8934df97d0d92d6339ad55e9f4a8affbb831ee12305d4c9bed3098b3816f5fd450f70f1c2e1d0dff5ca34b05f5

                        • C:\Users\Admin\AppData\Local\Temp\1019373001\e672a2ed74.exe

                          Filesize

                          947KB

                          MD5

                          fd7aa6a3eb85d4e29403d5ec15d19029

                          SHA1

                          934a72f6f8c67d220cba9cf9940318fde2794337

                          SHA256

                          f6d1fc23858d2ea98530a86f79a6d21c28602af0d38aa2b14a8d6dfdbdf290e1

                          SHA512

                          6f3d1febc8c1b5931edc322530989e4198db8b0de592c741e1814ea315ea96ff4f02af485a89a945a32f0fa393050644f2453c1be9b6d53c65d78e3bd05a5f59

                        • C:\Users\Admin\AppData\Local\Temp\1019374001\1511e3d0c1.exe

                          Filesize

                          2.6MB

                          MD5

                          46dfc30934fdf5265bb94682c9df6cef

                          SHA1

                          7b795842a8307a310b3175efea0091feda29b44a

                          SHA256

                          04253ef0c2e4aa2b6a05a0e69eb0e01ed1c0052479febfa94c50c938e1fb15fd

                          SHA512

                          711a760332345511faa0e4dcd478e7b075ef8f9f2423a82d4961623cae8dab3c094d3092f06056778c2b984f6bfc9308370202c3085de98531f7a197b7537f7c

                        • C:\Users\Admin\AppData\Local\Temp\1019375001\d112be923e.exe

                          Filesize

                          1.8MB

                          MD5

                          15709eba2afaf7cc0a86ce0abf8e53f1

                          SHA1

                          238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                          SHA256

                          10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                          SHA512

                          65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                        • C:\Users\Admin\AppData\Local\Temp\1019377001\2352e0496c.exe

                          Filesize

                          591KB

                          MD5

                          3567cb15156760b2f111512ffdbc1451

                          SHA1

                          2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                          SHA256

                          0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                          SHA512

                          e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                        • C:\Users\Admin\AppData\Local\Temp\1019379001\fb454aaec9.exe

                          Filesize

                          758KB

                          MD5

                          afd936e441bf5cbdb858e96833cc6ed3

                          SHA1

                          3491edd8c7caf9ae169e21fb58bccd29d95aefef

                          SHA256

                          c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                          SHA512

                          928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                        • C:\Users\Admin\AppData\Local\Temp\1019380001\eb995ac460.exe

                          Filesize

                          4.3MB

                          MD5

                          d2b6983ba17597222ebd82bffb6885ff

                          SHA1

                          8bddba09abebe631016751b7c292d941cd85bb36

                          SHA256

                          9f5fc1608cb64a1fb6d1f0259d45442eefa2de8aafa5fe26b7df35b12cbbcdf8

                          SHA512

                          d06a1e92cbe77bf935c9e1ff87a249d50f66ad6025e7c62073b2cd05fa795688e50243660bc45f76ae7c322e2872a7d248c1a079eeb81317a9249bfef45690f0

                        • C:\Users\Admin\AppData\Local\Temp\1019381001\0de5233bbc.exe

                          Filesize

                          1.3MB

                          MD5

                          669ed3665495a4a52029ff680ec8eba9

                          SHA1

                          7785e285365a141e307931ca4c4ef00b7ecc8986

                          SHA256

                          2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                          SHA512

                          bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                        • C:\Users\Admin\AppData\Local\Temp\551809350426

                          Filesize

                          54KB

                          MD5

                          28e06632b1b58f23c5f8860ec7552013

                          SHA1

                          aa3b1a48faf826f22bea31ea0c160f60b4295f63

                          SHA256

                          8c2c163e51f764e79473d26aba9bb41eaea7033dc3e27669a548ac7b4aea3707

                          SHA512

                          f5a537b4b7c9c05a81a8a2a5a814537fbd349107809026bbd97db8994ff848470a7f14888675c5e8b786380045fba35be26a53205435af2810022372ab973255

                        • C:\Users\Admin\AppData\Local\Temp\Cab6837.tmp

                          Filesize

                          70KB

                          MD5

                          49aebf8cbd62d92ac215b2923fb1b9f5

                          SHA1

                          1723be06719828dda65ad804298d0431f6aff976

                          SHA256

                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                          SHA512

                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                        • C:\Users\Admin\AppData\Local\Temp\Tar6878.tmp

                          Filesize

                          181KB

                          MD5

                          4ea6026cf93ec6338144661bf1202cd1

                          SHA1

                          a1dec9044f750ad887935a01430bf49322fbdcb7

                          SHA256

                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                          SHA512

                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                          Filesize

                          458KB

                          MD5

                          619f7135621b50fd1900ff24aade1524

                          SHA1

                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                          SHA256

                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                          SHA512

                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                        • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                          Filesize

                          3.3MB

                          MD5

                          045b0a3d5be6f10ddf19ae6d92dfdd70

                          SHA1

                          0387715b6681d7097d372cd0005b664f76c933c7

                          SHA256

                          94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                          SHA512

                          58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                          Filesize

                          440B

                          MD5

                          3626532127e3066df98e34c3d56a1869

                          SHA1

                          5fa7102f02615afde4efd4ed091744e842c63f78

                          SHA256

                          2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                          SHA512

                          dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          442KB

                          MD5

                          85430baed3398695717b0263807cf97c

                          SHA1

                          fffbee923cea216f50fce5d54219a188a5100f41

                          SHA256

                          a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                          SHA512

                          06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          8.0MB

                          MD5

                          a01c5ecd6108350ae23d2cddf0e77c17

                          SHA1

                          c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                          SHA256

                          345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                          SHA512

                          b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                        • C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll

                          Filesize

                          124KB

                          MD5

                          7fe5b933ed9391ea24647479c80e904e

                          SHA1

                          963721e46b8056e2e883c598e95d7daa7bdf8d9b

                          SHA256

                          2e12355cb9b11c923dc06f195399d678bc46680e982856d9405f64e7563fe8b3

                          SHA512

                          82d92d0c5155fff5ce97099cb9e78422ff328e0c516fbab7634e624215366c2191ec6ff6fe8d939268275c6770accb208af7ac69c3cc13c9188a49ef41339bb0

                        • C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\cred64.dll

                          Filesize

                          1.2MB

                          MD5

                          d862c12a4467ebae581a8c0cc3ea2211

                          SHA1

                          9e797375b9b4422b2314d3e372628643ccf1c5db

                          SHA256

                          47f8a270b27c18bab9013f4a8f0ee6e877e4050bd4018d682eb502bcfd5bff6d

                          SHA512

                          cf6545df4a244bb7dc699a565759f97c759ba19bcc9ad9ad91a20cd07aee19cbe10eb82dd21416b717581b34dc4f24ba6d43a00e7d8018b8be133dbbc9e8113c

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          66d31c7693656e86397453e72b2d8bbb

                          SHA1

                          dd37e95dd0d70ab70115d944b5bbec11c6019857

                          SHA256

                          de2f9a42221da7fb08d8aa9b506c054ef792a3eef3b8eb8ac7998fb1f6c0fd46

                          SHA512

                          f66f946a28e91d424178c896d639b6cee00967f8ba27dedd32e901052d2a5f7e95f87967d100c249b64d2ac0238495be0c6bddcd304e477dbf16d530a9f38b28

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          2KB

                          MD5

                          056fed49af664a1493cd84c55c0cf602

                          SHA1

                          9f1b6943f30ba37b44d7f110b3a611930e622935

                          SHA256

                          ef0ef7a7101200f0a6b8c76bd64c404e199742ff13490625917c9b8c1d95b847

                          SHA512

                          f70f95709b175ff6a9c02572383f4f0d7a4cf19161667ed8179b77231774a16781ebb48f500bfadf0efce7a69624c13a4cd87c37c0eb58daa3823768e3151338

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\05219a48-3691-4c92-8ca8-7ca56b105e7c

                          Filesize

                          745B

                          MD5

                          c71fc25fafebe25657ce0841b8b738dc

                          SHA1

                          68f0b3cbffd52dc622db6d1219daaa89eebba2b9

                          SHA256

                          fe572033063acb275526ac2a293e945618c062292a6ae1c3b25cc6db35761951

                          SHA512

                          526765cc41d90ff083fe1a8a4f7e7c100c9430a430e43f46ee3d90827079d2ee1e7c86d04066248533a9b1bea37eafe3a430a29f761e25e057076d56cbca926e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\17014d9f-1289-4889-9942-bde80121b08b

                          Filesize

                          11KB

                          MD5

                          2f0901bf749bacef64bb2e309822fe14

                          SHA1

                          eac5c53ff41fb1bda7560869a7e6e1f63b537f79

                          SHA256

                          3cd187373b402f00c41d75949f3a14ac4fc069e62f299825d38cb5dc1c22e7e9

                          SHA512

                          893ea7fd86d8671edcb63006a9352e1d374ffa2e7d11f75b6b5b4280563154c1600968b836ee263551c08e190d99909eb9067a293ab6f019be50d06d37057cee

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                          Filesize

                          997KB

                          MD5

                          fe3355639648c417e8307c6d051e3e37

                          SHA1

                          f54602d4b4778da21bc97c7238fc66aa68c8ee34

                          SHA256

                          1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                          SHA512

                          8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          3d33cdc0b3d281e67dd52e14435dd04f

                          SHA1

                          4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                          SHA256

                          f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                          SHA512

                          a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                          Filesize

                          479B

                          MD5

                          49ddb419d96dceb9069018535fb2e2fc

                          SHA1

                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                          SHA256

                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                          SHA512

                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                          Filesize

                          372B

                          MD5

                          8be33af717bb1b67fbd61c3f4b807e9e

                          SHA1

                          7cf17656d174d951957ff36810e874a134dd49e0

                          SHA256

                          e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                          SHA512

                          6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                          Filesize

                          11.8MB

                          MD5

                          33bf7b0439480effb9fb212efce87b13

                          SHA1

                          cee50f2745edc6dc291887b6075ca64d716f495a

                          SHA256

                          8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                          SHA512

                          d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                          Filesize

                          1KB

                          MD5

                          688bed3676d2104e7f17ae1cd2c59404

                          SHA1

                          952b2cdf783ac72fcb98338723e9afd38d47ad8e

                          SHA256

                          33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                          SHA512

                          7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                          Filesize

                          1KB

                          MD5

                          937326fead5fd401f6cca9118bd9ade9

                          SHA1

                          4526a57d4ae14ed29b37632c72aef3c408189d91

                          SHA256

                          68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                          SHA512

                          b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                          Filesize

                          7KB

                          MD5

                          d89343d6140675870e6091ebbacd37a3

                          SHA1

                          ac5a461b332d8f6689dbc26e6219328ab07a67c8

                          SHA256

                          42c4218ea20d6e886e7622d24e2dc05b5fdeec3907011a263fe3262bbdaba806

                          SHA512

                          90813c94ffd801c86144fcdb6729c9a5bfc9d63e166db47c479b29ee22e293eab3bab1975abcd81f643caf61de514f9532cb9f0d7bb0e436d2151f94cfbb0b8b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                          Filesize

                          6KB

                          MD5

                          0ce979cec394439918301ee09178f99c

                          SHA1

                          62ca6df30d1e4fefb76b26f367ad4766dab9649b

                          SHA256

                          094e1681dcd105486d57205263e4e1a52f44688b817e6d5741289fee4b776568

                          SHA512

                          62ad9debe27252291c0549ab0a08464bb114e0627cd111b3506d5553e36544e882c657f471f72c491aa9b03f771f06b810f8b3cb99ca745be58f504537e5bea6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                          Filesize

                          7KB

                          MD5

                          a81fed99221edeba644ed209e31e76ed

                          SHA1

                          5a29e85f1e44d6317ed1e8b11aa54209ac032d35

                          SHA256

                          f48344d2262d8dd381466002d47a0380280b6daa08acb7591f2a25970ed47fe2

                          SHA512

                          51f7200106fa4333ec912374f905800bf90ce11def4ebd407088d042390ead377c16db6050412ffa0eeb9e3c1d185be37afaece8b547c2e463784edad9a3bb5c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          2d893594787dcad4867171b408e78252

                          SHA1

                          606431a1794f9be55333c6004e01764f26b8db2b

                          SHA256

                          86bc409d00be778727165f919d52d850f9bf14dd49c020a3fbf5f3cddcc9384a

                          SHA512

                          6e38255a90eb3c5dc43fda11576584354190e328a7c65ce58bf55546743831f2c159d547a601de3f9306cdd01d256cbde5143dca09cbb440d25f4b10152f05c0

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          e9d621207f1cad314f625dbe32d66755

                          SHA1

                          9dd32dc8c6d6f2ff3743ab7669627e0b046c6706

                          SHA256

                          b3f89cc3ab15551fbbd952dd51dca5e0244cfcfe7c90f1f20c70ed321bf9d482

                          SHA512

                          13d971b942e7601920f02d699c82722e4ce562a1c4b00f46ca88433f8ec8219143a955b4d1d9f794ed16364d4e19c4902c3f13ad98be121affa1f747172c8da7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4

                          Filesize

                          4KB

                          MD5

                          5dab7fb807dc39c26d69c31c2f9b0648

                          SHA1

                          ffeb686e56842ce33d8750cf1a8b71f24897c04f

                          SHA256

                          92c2c30d2490f4c2186b1fa638bc1740f00f921a346382079158cc699b36fd0c

                          SHA512

                          78ab4269f8cf3966561705524c85077af2ecc73a0b0ca042d50f783717810c19e13928aae4d1f2769ed98602f0ec6f8235e5c8c72baf1753f3e8edfe2c5f1778

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          184KB

                          MD5

                          3dc733f51b6c47c0e57ae7035b9abacf

                          SHA1

                          d4c28a6f9d4bae9e297440a46726a2cb3e2504ba

                          SHA256

                          aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1

                          SHA512

                          e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067

                        • \Users\Admin\AppData\Local\Temp\1WNw85wF4459DEW04Ed\Y-Cleaner.exe

                          Filesize

                          1.4MB

                          MD5

                          a8cf5621811f7fac55cfe8cb3fa6b9f6

                          SHA1

                          121356839e8138a03141f5f5856936a85bd2a474

                          SHA256

                          614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c

                          SHA512

                          4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd

                        • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                          Filesize

                          1.8MB

                          MD5

                          cc25b82161c253d79a731c4ece950e9e

                          SHA1

                          646da450ff3af5cd72bd84603ba8198ad78b6c55

                          SHA256

                          ab3fcb84f4c0d74438e53e432978cbd7876e8dbb7bb54c6208d23becd3ea7b4c

                          SHA512

                          923ac16d25a602bb44dd4f2f3436a1a80beb71f888d684ce2d3a02a89a7feb7bed9fb4939fb8f0b4be4fc506c62a2cf29104c6f68a72f0537a78c783821b72d0

                        • \Users\Admin\AppData\Roaming\gdi32.dll

                          Filesize

                          630KB

                          MD5

                          905363a3b55e87a2a2a4a9868fe676fb

                          SHA1

                          d46ecb7cba202857f4825166aeed5fd31b7e815d

                          SHA256

                          54951383b8490ac501ea3b9e34522309ac68483f5413f230da3ad99342139b37

                          SHA512

                          5aeacbeedbf23105560a5c0e10455d0effb51da1c0ecc4d16572a26d6f359c2214250cf11a8277f3faa5cd81ccc9296825b783caeb60702c37489bfde735384d

                        • memory/540-2267-0x0000000001D90000-0x0000000001D98000-memory.dmp

                          Filesize

                          32KB

                        • memory/540-2266-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/764-1749-0x0000000001370000-0x000000000161E000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/764-1750-0x0000000001370000-0x000000000161E000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/1656-62-0x0000000000380000-0x000000000068D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1656-73-0x0000000000380000-0x000000000068D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1720-117-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/1720-1464-0x0000000000400000-0x0000000000C4D000-memory.dmp

                          Filesize

                          8.3MB

                        • memory/1720-156-0x0000000000400000-0x0000000000C4D000-memory.dmp

                          Filesize

                          8.3MB

                        • memory/1720-94-0x0000000000400000-0x0000000000C4D000-memory.dmp

                          Filesize

                          8.3MB

                        • memory/1720-139-0x0000000000400000-0x0000000000C4D000-memory.dmp

                          Filesize

                          8.3MB

                        • memory/1772-1479-0x0000000001150000-0x00000000011F6000-memory.dmp

                          Filesize

                          664KB

                        • memory/1828-2224-0x00000000028F0000-0x00000000028F8000-memory.dmp

                          Filesize

                          32KB

                        • memory/1828-2223-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2036-113-0x00000000002C0000-0x00000000005CD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2036-76-0x00000000002C0000-0x00000000005CD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2036-1601-0x0000000006BB0000-0x0000000007824000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2036-1498-0x0000000006BB0000-0x0000000007824000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2036-138-0x00000000002C0000-0x00000000005CD000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2172-45-0x0000000001070000-0x000000000156B000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/2172-43-0x0000000001070000-0x000000000156B000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/2432-0-0x0000000000C80000-0x0000000001144000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2432-17-0x0000000000C80000-0x0000000001144000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2432-18-0x0000000006FB0000-0x0000000007474000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2432-4-0x0000000000C80000-0x0000000001144000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2432-3-0x0000000000C80000-0x0000000001144000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2432-2-0x0000000000C81000-0x0000000000CAF000-memory.dmp

                          Filesize

                          184KB

                        • memory/2432-1-0x00000000771B0000-0x00000000771B2000-memory.dmp

                          Filesize

                          8KB

                        • memory/2620-1593-0x0000000002A70000-0x0000000002A78000-memory.dmp

                          Filesize

                          32KB

                        • memory/2620-1592-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2848-59-0x0000000006C40000-0x0000000006F4D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2848-58-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-91-0x0000000007260000-0x0000000007AAD000-memory.dmp

                          Filesize

                          8.3MB

                        • memory/2848-61-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-88-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-20-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-93-0x0000000007260000-0x000000000775B000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/2848-95-0x0000000007260000-0x000000000775B000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/2848-110-0x0000000006C40000-0x0000000006F4D000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2848-21-0x0000000000221000-0x000000000024F000-memory.dmp

                          Filesize

                          184KB

                        • memory/2848-111-0x0000000007260000-0x0000000007ED4000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2848-75-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-42-0x0000000007260000-0x000000000775B000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/2848-44-0x0000000007260000-0x000000000775B000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/2848-22-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-653-0x0000000007260000-0x0000000007ED4000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2848-136-0x0000000007260000-0x0000000007AAD000-memory.dmp

                          Filesize

                          8.3MB

                        • memory/2848-25-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-24-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2848-155-0x0000000000220000-0x00000000006E4000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2896-845-0x0000000000220000-0x0000000000E94000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2896-112-0x0000000000220000-0x0000000000E94000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2896-1405-0x0000000000220000-0x0000000000E94000-memory.dmp

                          Filesize

                          12.5MB

                        • memory/2992-158-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-203-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-1609-0x0000000000760000-0x00000000007B4000-memory.dmp

                          Filesize

                          336KB

                        • memory/2992-185-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-154-0x0000000000A20000-0x0000000000B54000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2992-159-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-161-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-163-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-165-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-167-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-171-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-169-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-173-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-187-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-189-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-175-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-191-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-193-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-177-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-195-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-197-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-199-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-179-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-1364-0x00000000005D0000-0x000000000061C000-memory.dmp

                          Filesize

                          304KB

                        • memory/2992-1363-0x00000000051D0000-0x000000000525A000-memory.dmp

                          Filesize

                          552KB

                        • memory/2992-181-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-183-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-211-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-209-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-207-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-205-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-157-0x0000000004600000-0x0000000004718000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2992-201-0x0000000004600000-0x0000000004713000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3152-1397-0x0000000002980000-0x0000000002988000-memory.dmp

                          Filesize

                          32KB

                        • memory/3152-1396-0x000000001B690000-0x000000001B972000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/3496-2153-0x00000000012F0000-0x000000000130C000-memory.dmp

                          Filesize

                          112KB

                        • memory/3704-1389-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/3704-1390-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                          Filesize

                          32KB

                        • memory/3808-1380-0x00000000012A0000-0x00000000012BC000-memory.dmp

                          Filesize

                          112KB

                        • memory/4048-1411-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/4048-1412-0x0000000002390000-0x0000000002398000-memory.dmp

                          Filesize

                          32KB